CW433
Jon Sneyers, Tom Schrijvers, Bart Demoen
Suspension optimization and in-place updates for optimizing CHR compilation
December 2005
abstract.html / report.pdf (275K) / email to: J. Sneyers

CW432
Bart Jacobs and Frank Piessens
Verifying programs using inspector methods for state abstraction
December 2005
abstract.html / report.pdf (247K) / email to: B. Jacobs

CW431
Nelis Boucke, Tom Holvoet, Tom Lefever, Raf Sempels, Kurt Schelfthout, Danny Weyns, and Jan Wielemans
Applying the architecture tradeoff analysis method (ATAM) to an industrial multi-agent system application
December 2005
abstract.html / Report available on request only/ email to: D. Weyns

CW430
Liesje Demuynck, and Bart De Decker
Anonymous updating of credentials
December 2005
abstract.html / report.pdf (232K) / email to: L. Demuynck

CW429
Jon Sneyers, Tom Schrijvers, and Bart Demoen
Dijkstra's algorithm with Fibonacci heaps: an executable description in CHR
November 2005
abstract.html / report.pdf (167K) / email to: J. Sneyers

CW428
Sam Michiels, Wouter Joosen, Eddy Truyen, and Kristof Verslype
Digital rights management - a survey of existing technologies
November 2005
abstract.html / report.pdf (1.6M) / email to: S. Michiels

CW427
Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten
Dependency analysis of the GatorMail webmail application
September 2005
abstract.html / report.pdf (5.3M) / report without appendices.pdf (1.8M) / email to: L. Desmet

CW426
Maarten Mariën, Rudradeb Mitra, Marc Denecker, Maurice Bruynooghe
Satisfiability checking for PC(ID)
October 2005
abstract.html / report.pdf (222K) / email to: M. Mariën

CW425
Wannes Schols, Nelis Boucke, Danny Weyns, Tom Holvoet
Gradient Field bases order assignment in AGV systems
September 2005
abstract.html / report.pdf (2.6M) / email to: N. Boucké

CW424
Quan Phan and Gerda Janssens
A proposal for region-based memory management for deterministic Mercury programs
September 2005
abstract.html / report.pdf (223K) / email to: Q. Phan

CW423
Bart De Win, Bart Jacobs, Wouter Joosen, Gregory Neven, Frank Piessens, Tine Verhanneman
Formal technologies for information and software security: An annotated bibliography
September 2005
abstract.html / report.pdf (200K) / email to: F. Piessens

CW422
Nikolay Pelov, Marc Denecker, Maurice Bruynooghe
Well-founded and stable semantics of logic programs with aggregates
September 2005
abstract.html / report.pdf (375K) / email to: M. Denecker

CW421
Tom Schrijvers and Thom Frühwirth
Proceedings of CHR 2005, Second Workshop on Constraint Handling Rules
September 2005
abstract.html / report.pdf (4.0M) / email to: T. Schrijvers

CW420
Jon Sneyers, Tom Schrijvers, and Bart Demoen
Guard and continuation optimization for occurrence representations of CHR
July 2005
abstract.html / report.pdf (225K) / email to: J. Sneyers

CW419
Yves Younan, Wouter Joosen, Frank Piessens and Hans Van Den Eynden
Security of memory allocators for C and C++
July 2005
abstract.html / report.pdf (192K) / email to: Y. Younan

CW418
Daan Fierens, Jan Ramon, Hendrik Blockeel, and Maurice Bruynooghe
A comparison of approaches for learning probability trees
July 2005
abstract.html / report.pdf (297K) / email to: D. Fierens

CW417
Olivier Dumont, Vincent Masselus, Peter Zaenen, Johan Wagemans, and Philip Dutré
A perceptual quality scale for image-based relighting of glossy surfaces
June 2005
abstract.html / report.pdf (1.6M) / email to: O. Dumont

CW416
Olivier Dumont, Philip Dutré
Light transport analysis and rendering
June 2005
abstract.html / report.pdf ( 15M) / email to: O. Dumont

CW415
Yves Vandewoude, Peter Ebraert, Yolande Berbers, and Theo D'Hondt
Influence of type systems on dynamic software evolution
June 2005
abstract.html / report.pdf (436K) / email to: Y. Vandewoude

CW414
Jan Ramon
On the convergence of reinforcement learning using a decision tree learner
2005
Cancelled
abstract.html / email to: J. Ramon

CW413
Ares Lagae, and Philip Dutré
Template Poisson disk tiles
May 2005
abstract.html / report.pdf ( 40M) / email to: A. Lagae

CW412
Manh Thang Nguyen, and Danny De Schreye
Polynomial interpretations as a basis for termination analysis of logic programs
May 2005
abstract.html / report.pdf (258K) / revised Augist 2007.pdf (350K) / email to: M.T. Nguyen

CW411
Jon Sneyers, Tom Schrijvers, and Bart Demoen
Guard reasoning for CHR optimization
May 2005
abstract.html / report.pdf (250K) / email to: J. Sneyers

CW410
Marc Denecker and Joost Vennekens
ID-logic in perspective
April 2005
abstract.html / report.pdf ( 83K) / email to: M. Denecker

CW409
Maurice Bruynooghe, John Gallagher, and Wouter Van Humbeeck
Inference of well-typings for logic programs with application to termination analysis
April 2005
abstract.html / report.pdf (211K) / email to: M. Bruynooghe

CW408
Thomas Delaet, Thomas Clijsner, Peter Rigole, Wouter Joosen, and Yolande Berbers
A proposal for decentralized, scalable and automatic IP network configuration: SCNP
April 2005
abstract.html / report.pdf (325K) / email to: T. Delaet

CW407
Marko van Dooren, Eric Steegmans
Combining the robustness of checked exceptions with the flexibility of unchecked exceptions using anchored exception declarations
March 2005
abstract.html / report.pdf (310K) / email to: M. van Dooren

CW406
Tom Goovaerts, Bart De Win, and Wouter Joosen
Security services in mainstream enterprise-oriented middleware platforms
March 2005
abstract.html / report.pdf (559K) / email to: T. Goovaerts

CW405
Yves Vandewoude, Yolande Berbers
DeepCompare: static analysis for runtime software evolution
February 2005
abstract.html / report.pdf (587K) / email to: Y. Vandewoude

CW404
Bert Lagaisse, Bart De Win, and Wouter Joosen
SoBeNet: financial case study - Part 1: requirements and analysis
February 2005
abstract.html / report.pdf (194K) / email to: B. Lagaisse

CW403
Pieter Peers, Vincent Masselus, and Philip Dutré
Free-form acquisition of shape and appearance
February 2005
abstract.html / report.pdf (909K) / email to: P. Peers

CW402
Tom Schrijvers, Bart Demoen, Gregory Duck, Peter Stuckey, and Thom Fruehwirth
Automatic implication checking for CHR constraint solvers
January 2005
abstract.html / report.pdf (197K) / email to: T. Schrijvers

CW401
K.C. Shashidhar, Maurice Bruynooghe, Francky Catthoor and Gerda Janssens
Automatic verification of source code transformations on array-intensive programs: demonstration with real-life examples
May 2008
abstract.html / report.pdf (125K) / email to: M. Bruynooghe

CW400
Muath Sabha, Philip Dutré
A fast texture synthesis technique using spatial neighborhood
September 2005
abstract.html / report.pdf (4.0M) / email to: M. Sabha

CW399
Nele Smeets, Eric Steegmans
A methodology for writing class contracts
January 2005
abstract.html / report.pdf (124K) / email to: N. Smeets

CW398
Nele Smeets, Eric Steegmans
Beyond design by contract: formal specification of composed behaviour
January 2005
abstract.html / report.pdf (247K) / email to: N. Smeets