CW532
Koen Buyens, Bart De Win, Wouter Joosen
Identifying and resolving least privilege violations in software architectures
December 2008
abstract.html / report.pdf (1.6M) / email to: K. Buyens

CW531
Cédric Boon, Pieter Philippaerts, Frank Piessens
Practical experience with the .NET cryptographic API
November 2008
abstract.html / report.pdf (399K) / email to: F. Piessens

CW530
Toon Lenaerts, Philip Dutré
Unified SPH model for fluid-shell simulations
November 2008
abstract.html / report.pdf (788K) / email to: T. Lenaerts

CW529
Nelis Boucké and Tom Holvoet
Formal specification of traceable and information preserving composition of structural models in Haskell
October 2008
abstract.html / report.pdf (892K) / email to: N. Boucké

CW528
Leander Schietgat, Celine Vens, Jan Struyf, Hendrik Blockeel, Dragi Kocev, Saso Dzeroski
Predicting gene function in S. cerevisiae and A. thaliana using hierarchical multi-label decision tree ensembles
October 2008
abstract.html / report.pdf (798K) / email to: L. Schietgat

CW527
Eddy Truyen, and Wouter Joosen
An object model with feature-based dispatch for context-sensitive behaviour in distributed systems
October 2008
abstract.html / report.pdf (390K) / email to: E. Truyen

CW526
Frédéric Vogels, Bart Jacobs, Frank Piessens
A machine checked soundness proof for an intermediate verification language: extended version
October 2008
abstract.html / report.pdf (915K) / email to: F. Piessens

CW525
Frans Sanen
Interactions and AOSD: Past, current and future
September 2008
abstract.html / report.pdf (3.4M) / email to: F. Sanen

CW524
Bart De Decker, Vincent Naessens, Jorn Lapon, Pieter Verhaeghe
Kritische beoordeling van het gebruik van de Belgische elektronische identiteitskaart
May 2008
abstract.html / report.pdf (148K) / email to: B. De Decker

CW523
Kristof Verslype, Pieter Verhaeghe, Jorn Lapon, Girma Nigusse, Vincent Naessens, Bart De Decker
A privacy-preserving ticketing system
October 2008
abstract.html / report.pdf (318K) / email to: K. Verslype

CW522
Kristof Verslype, Jorn Lapon, Pieter Verhaeghe, Vincent Naessens, Bart De Decker
PetAnon: A privacy-preserving e-petition system based on Idemix
October 2008
abstract.html / report.pdf (173K) / email to: K. Verslype

CW521
Peter Van Weert
Compiling Constraint Handling Rules to Java: a reconstruction
August 2008
abstract.html / report.pdf (538K) / email to: P. Van Weert

CW520
Bart Jacobs en Frank Piessens
The VeriFast program verifier
August 2008
abstract.html / report.pdf (185K) / email to: B. Jacobs

CW519
Peter Van Weert
Optimization of CHR propagation rules: Extended report
August 2008
abstract.html / report.pdf (405K) / email to: P. Van Weert

CW518
Tom Schrijvers, John Gallagher, Maurice Bruynooghe
From monomorphic to polymorphic well-typings and beyond. Extended report
June 2008
abstract.html / report.pdf (179K) / email to: T. Schrijvers

CW517
Frans Sanen, Mario Sudholt, Lodewijk Bergmans, Ruzanna Chitchyan, Johan Fabry, Katharina Mehner
Workshop proceedings ADI08
July 2008
abstract.html / report.pdf (1.7M) / email to: F. Sanen

CW516
Bart Jacobs, Frank Piessens
Subsystems: Provably safe exception handling (status report)
May 2008
abstract.html / report.pdf (537K) / email to: B. Jacobs

CW515
Riccardo Scandariato, Koen Yskout, Thomas Heyman, Wouter Joosen
Architecting software with security patterns
April 2008
abstract.html / report.pdf (394K) / email to: R. Scandariat

CW514
Koen Yskout, Thomas Heyman, Riccardo Scandariato, Wouter Joosen
Security patterns: 10 years later
April 2008
abstract.html / report.pdf (439K) / email to: K. Yskout

CW513
Ares Lagae, Philip Dutré
Accelerating ray tracing using constrained tetrahedralizations
April 2008
abstract.html / report.pdf (3.1M) / email to: A. Lagae

CW512
Dries Vanoverberghe and Frank Piessens
A caller-side inline reference monitor for object-oriented intermediate language: Extended version
March 2008
abstract.html / report.pdf (734K) / email to: D. Vanoverberghe

CW511
Bart Elen, Sam Michiels, Wouter Joosen, Pierre Verbaeten
dEVOLVe: Middleware Support for software maintenance in Distributed, EVOLVing Environments
March 2008
abstract.html / report.pdf (539K) / email to: B. Elen

CW510
Bart Demoen, Phuong-Lan Nguyen
Environment reuse in the WAM
February 2008
abstract.html / report.pdf (197K) / email to: B. Demoen

CW509
Nelson Matthys, Sam Michiels, Wouter Joosen, Pierre Verbaeten
A comprehensive analysis of an intelligent platform for supply chain management
February 2008
abstract.html / report.pdf (1.2M) / email to: N. Matthys

CW508
Aram Hovsepyan, Stefan Van Baelen, Yolande Berbers, Wouter Joosen
Generic Reusable Concern Compositions (GReCCo): Description and case study
January 2008, Revised April 2008
abstract.html / report.pdf (437K) / email to: S. Van Baelen

CW507
Martin Sulzmann, Tom Schrijvers, Peter J. Stuckey
Type inference for GADTs via Herbrand constraint abduction
January 2008
abstract.html / report.pdf (214K) / email to: T. Schrijvers

CW506
Dean Voets, Paolo Pilozzi, Danny De Schreye
A new approach to termination analysis of CHR
January 2008
abstract.html / report.pdf (294K) / email to: D. Voets