Collection's Items (Sorted by Title in Ascending order): 1 to 20 of 36
Issue Date | Title | Author(s) |
2013 | Automated theorem proving for the systematic analysis of an infusion pump | Michael Douglas Harrison; Paolo Masci; José Creissac Campos; Curzon,P |
2013 | Certified computer-aided cryptography: Efficient provably secure machine code from high-level implementations | José Bacelar Almeida; Manuel Barbosa; Barthe,G; Dupressoir,F |
2013 | Combining static and dynamic analysis for the reverse engineering of Web applications | Silva,CE; José Creissac Campos |
2015 | Continuity as a computational effect | Renato Jorge Neves; Martins,ManuelA.; Luís Soares Barbosa; Hofmann,Dirk |
2013 | Data Abstraction in Coordination Constraints | José Paiva Proença; Clarke,D |
2013 | DATAFLASKS: an epidemic dependable key-value substrate | Francisco Almeida Maia; Miguel Marques Matos; Ricardo Pereira Vilaça; José Orlando Pereira; Rui Carlos Oliveira; Riviere,E |
2013 | Depth Cues and Perceived Audiovisual Synchrony of Biological Motion | Carlos Loureiro Silva; Mendonca,C; Mouta,S; Silva,R; José Creissac Campos; Santos,J |
2015 | Distance Perception in Immersive Environments - The Role of Photorealism | Silva,C; José Creissac Campos; Santos,J; Basso,D; Mouta,S; 5599 |
2014 | Efficient State-based CRDTs by Delta-Mutation | Paulo Sérgio Almeida; Ali Shoker; Carlos Baquero |
2015 | Eventually Consistent Register Revisited | Zawirski,M; Carlos Baquero; Bieniusa,A; Preguiça,NM; Shapiro,M |
2013 | Executable modelling of dynamic software product lines in the ABS language | Muschevici,R; Clarke,D; José Paiva Proença |
2015 | A Feature-based Classification of Model Repair Approaches | Nuno Moreira Macedo; Tiago,J; Alcino Cunha |
2013 | Formal verification of side-channel countermeasures using self-composition | José Bacelar Almeida; Manuel Barbosa; Jorge Sousa Pinto; Vieira,B |
2013 | A Generic Scheme and Properties of Bidirectional Transformations | Hugo Pereira Pacheco; Nuno Moreira Macedo; Alcino Cunha; Voigtländer,Janis |
2013 | Interactive interaction constraints | José Paiva Proença; Clarke,D |
2013 | Interactive Verification of Safety-Critical Software | da Cruz,D; Henriques,PR; Jorge Sousa Pinto |
2013 | A Model-based Approach for Test Cases Generation | Silva,JC; José Luís Silva; José Creissac Campos; João Alexandre Saraiva |
2013 | On the relationship between functional encryption, obfuscation, and fully homomorphic encryption | Alwen,J; Manuel Barbosa; Farshim,P; Gennaro,R; Gordon,SD; Tessaro,S; Wilson,DA |
2013 | On the semantic security of functional encryption schemes | Manuel Barbosa; Farshim,P |
2015 | Proceedings of the 4th International Workshop on Bidirectional Transformations co-located with Software Technologies: Applications and Foundations, STAF 2015, L'Aquila, Italy, July 24, 2015 | Alcino Cunha; Kindler,E |
Collection's Items (Sorted by Title in Ascending order): 1 to 20 of 36