CW599
Roeland Schoukens, Ares Lagae and Philip Dutré
Perceptual selection of illumination components
November 2010
abstract.html / report.pdf (8.4M) / email to: A. Lagae

CW598
Kim Wuyts, Thomas Heyman, Riccardo Scandariato, Christophe Huygens, and Wouter Joosen
Towards a reference framework for legal compliance: a detailed overview
October 2010
The legal reasons the report is not public. Please contact the authors.
abstract.html / email to: K. Wuyts

CW597
Nima Taghipour, Daan Fierens, Hendrik Blockeel
Probabilistic logical learning for biclustering: A case study with surprising results
October 2010
abstract.html / report.pdf (365K) / email to: N. Taghipour

CW596
Tias Guns, Siegfried Nijssen, Luc De Raedt
k-Pattern set mining under constraints
October 2010
abstract.html / report.pdf (760K) / email to: T. Guns

CW595
Tom Schrijvers, Bruno C.d.S. Oliveira
The monad zipper
September 2010
abstract.html / report.pdf (727K) / email to: T. Schrijvers

CW594
Dominique Devriese and Frank Piessens
Explicitly recursive grammar combinators - The implementation of some grammar algorithms - Technical report
September 2010
abstract.html / report.pdf (376K) / email to: D. Devriese

CW593
Koen Yskout, Riccardo Scandariato, Wouter Joosen
Change patterns: Co-evolving requirements and architecture
August 2010
abstract.html / report.pdf (4.9M) / email to: K. Yskout

CW592
Dave Clarke, Michiel Helvensteijn, and Ina Schaefer
Abstract delta modeling
August 2010
abstract.html / report.pdf (363K) / email to: D. Clarke

CW591
Pavel Brazdil, Rui Leite, Joaquin Vanschoren and Francisco Queiros
Using active testing and meta-level information for selection of classification algorithms
August 2010
abstract.html / report.pdf (347K) / email to: J. Vanschoren

CW590
Bart Jacobs and Frank Piessens
Expressive modular fine-grained concurrency specification (Extended version)
July 2010
abstract.html / report.pdf (Version July 2010) (318K) / report.pdf (Revised version August 2010) (453K) / erratum.pdf (to July version) ( 59K) / email to: B. Jacobs

CW589
Naeem Muhammad, Nelis Boucké, and Yolande Berbers
Parallelism viewpoint: An architecture viewpoint to model parallelism behaviour of parallelism-intensive software systems
June 2010
abstract.html / report.pdf (448K) / email to: N. Muhammad

CW588
Peter Van Weert and Leslie De Koninck
Proceedings of the 7th International Workshop on Constraint Handling Rules
May 2010
abstract.html / report.pdf (1.6M) / email to: P. Van Weert

CW587
Jan Vossaert, Pieter Verhaeghe, Bart De Decker, Vincent Naessens
Towards a general purpose identity card
June 2010
abstract.html / report.pdf (227K) / email to: P. Verhaeghe

CW586
Theofrastos Mantadelis and Gerda Janssens
Variable compression in ProbLog
May 2010
abstract.html / report.pdf (394K) / email to: T. Mantadelis

CW585
Nick Nikiforakis, Francesco Gadaleta, Yves Younan and Wouter Joosen
On the privacy of file sharing services
May 2010
abstract.html / report.pdf (173K) / email to: N. Nikiforakis

CW584
Bernd Gutmann, Ingo Thon, and Luc De Raedt
Learning the parameters of probabilistic logic programs from interpretations
June 2010
abstract.html / report.pdf (268K) / email to: B. Gutmann

CW583
Bernd Gutmann, Angelika Kimmig, Kristian Kersting, and Luc De Raedt
Parameter estimation in ProbLog from annotated queries
April 2010
abstract.html / report.pdf (449K) / email to: B. Gutmann

CW582
Dries Vanoverberghe, Frank Piessens
Precise and progressing compositional symbolic execution
April 2010
abstract.html / report.pdf (962K) / email to: D. Vanoverberghe

CW581
Daan Fierens
Improving the efficiency of Gibbs sampling for probabilistic logical models by means of program specialization
April 2010
abstract.html / report.pdf (234K) / email to: D. Fierens

CW580
Luc De Raedt and Ingo Thon
Probabilistic rule learning
April 2010
abstract.html / report.pdf (532K) / email to: I. Thon

CW579
Danny Weyns, Sam Malek, Jesper Andersson
Z specifications of FORMS - FOrmal Reference Model for Self-adaptation
June 2010
abstract.html / report.pdf (419K) / email to: D. Weyns

CW578
Bart Jacobs, Jan Smans, and Frank Piessens
Verification of imperative programs: The VeriFast approach. A draft course text
March 2010
abstract.html / report.pdf (340K) / email to: B. Jacobs

CW577
Ilya Sergey, Dave Clarke and Alexander Podkhalyuzin
Automatic refactorings for Scala programs
March 2010
abstract.html / report.pdf (286K) / email to: I. Sergey

CW576
Koen Yskout, Riccardo Scandariato, Wouter Joosen
Using change patterns to incorporate evolving trust relationships into a software architecture
March 2010
abstract.html / report.pdf (2.3M) / email to: K. Yskout

CW575
Koen Buyens, Riccardo Scandariato, Wouter Joosen
Automated detection and resolution of least privilege violations in software architectures
January 2010
abstract.html / report.pdf (583K) / email to: K. Buyens

CW574
Dominic Orchard and Tom Schrijvers
Haskell type constraints unleashed: Companion report
January 2010
abstract.html / report.pdf (262K) / email to: T. Schrijvers

CW573
K. Rustan M. Leino, Peter Müller, Jan Smans
Deadlock-free channels and locks
January 2010
abstract.html / report.pdf (306K) / email to: J. Smans