[SSGdM16]
Juan-Pablo Salazar-Sanchez, Elena Gómez-Martínez, and Miguel de Miguel. Performance analysis of persistence technologies for cloud repositories of models. In JORNADAS DE INGENIERIA DEL SOFTWARE Y BASES DE DATOS, pages 213 -- 226, September 2016. [ bib ]
[BBC+16]
C. Brackmann, D. Barone, A. Casali, R. Boucinha, and S. Muñoz-Hernández. Computational thinking: Panorama of the americas. In 2016 International Symposium on Computers in Education (SIIE), pages 1--6, September 2016. [ bib | DOI ]
Computers cause an impact in almost every single aspect of our lives, however, unfortunately, schools have not been able to keep up with this irreversible evolution. The simple use of technological apparatuses in the classroom does not guarantee the improvement of the learning process, however it can be the medium through which the students find the alternatives for the solution of complex problems. The Computational Thinking is an approach of teaching that uses a diverse range of techniques derived from computers for the resolution of these problems combined with the new competencies of the 21st century (critical thinking, collaboration, etc.). The adoption of the notion of Computing within the basic education schools is a concern in many countries, where the implementation occurs in a strict way. Admittedly, it grows the idea that the Computing discipline is very distinct from the computer classes and that the use of skills from Computing possesses educational (reflection and problem solving, the comprehension that the world is ingrained with the digital technology) and economic (high demand of professionals with good training) benefits. This article, through the vast bibliographic review, describes an international landscape of countries of all Americas, in order to contextualize the reader in respect to the adoption of Computational Thinking within the basic education schools.

Keywords: Companies;Computers;Economics;Electronic mail;Problem-solving;Training;Basic Education;Computational Thinking;Computing at Schools
[MHO16b]
Susana Muñoz-Hernández and Izzeldin Osman. Women empowerment and research productivity through a successful distance phd program. In 10th International Conference on ICT for Development, Education and Training. E-learning Africa, May 2016. [ bib ]
[MHO16a]
Susana Muñoz-Hernández and Izzeldin Osman. Using a productive distance phd program to empower women in academia. In IST-Africa 2016 Conference Proceedings, May 2016. [ bib ]
[HMMH16]
Alejandro Hernández Munuera and Susana Muñoz-Hernández. Improving flexible databases searches using machine learning. Technical report, Babel research group (Universidad Politécnica de Madrid), Madrid, España, January 2016. [ bib | http ]
[GRB+16]
Elena Gómez-Martínez, Ricardo J. Ródriguez, Clara Benac-Earle, Leire Etxeberria, and Miren Illarramendi. A methodology for model-based verification of safety contracts and performance requirements. Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability, 0(0):1748006X16667328, 2016. [ bib | DOI | arXiv | http ]
The verification of safety requirements becomes crucial in critical systems where human lives depend on their correct functioning. Formal methods have often been advocated as necessary to ensure the reliability of software systems, albeit with a considerable effort. In any case, such an effort is cost-effective when verifying safety-critical systems. Often, safety requirements are expressed using safety contracts, in terms of assumptions and guarantees.To facilitate the adoption of formal methods in the safety-critical software industry, we propose a methodology based on well-known modelling languages such as the unified modelling language and object constraint language. The unified modelling language is used to model the software system while object constraint language is used to express the system safety contracts within the unified modelling language. In the proposed methodology a unified modelling language model enriched with object constraint language constraints is transformed to a Petri net model that enables us to formally verify such safety contracts. The methodology is evaluated on an industrial case study. The proposed approach allows an early safety verification to be performed, which increases the confidence of software engineers while designing the system.

[ZFG+16b]
Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Christophe Tartary, Shareeful Islam, Bjorn De Sutter, and Jerome D'Annoville. Attack simulation based software protection assessment method with petri net. International Journal on Cyber Situational Awareness, 1(1):152 -- 181, 2016. [ bib | DOI ]
[ZFG+16a]
Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, and Jerome D'Annoville. Attack simulation based software protection assessment method. In Cyber Security And Protection Of Digital Services, pages 1--8. IEEE, 2016. [ bib ]
[GALM16]
Emilio J. Gallego-Arias, James Lipton, and Julio Mariño. Constraint logic programming with a relational machine. Formal Aspects of Computing, 2016. In press. [ bib ]
[TMVC16a]
Salvador Tamarit, Julio Mariño, Guillermo Vigueras, and Manuel Carro. Proceedings of the First Workshop on Program Transformation for Programmability in Heterogeneous Architectures, 2016. [ bib | http ]
[VCTM16]
Guillermo Vigueras, Manuel Carro, Salvador Tamarit, and Julio Mariño. Towards automatic learning of heuristics for mechanical transformations of procedural code. In Proceedings of the First Workshop on Program Transformation for Programmability in Heterogeneous Architectures, volume abs/1603.03022, 2016. [ bib | http ]
[TMVC16b]
Salvador Tamarit, Julio Mariño, Guillermo Vigueras, and Manuel Carro. Towards a semantics-aware transformation toolchain for heterogeneous systems. In Proceedings of the First Workshop on Program Transformation for Programmability in Heterogeneous Architectures, volume abs/1603.03011, 2016. [ bib | http ]
[LOST16]
M. Llorens, J. Oliver, J. Silva, and S. Tamarit. Dynamic slicing of concurrent specification languages. Parallel Computing, 53:1 -- 22, 2016. [ bib | DOI | http ]
Abstract Dynamic slicing is a technique to extract the part of the program (called slice) that influences or is influenced, in a particular execution, by a given point of interest in the source code (called slicing criterion). Since a single execution is considered, the technique often uses a trace of this execution to analyze data and control dependencies. In this work we present the first formulation and implementation of dynamic slicing in the context of CSP. Most of the ideas presented can be directly applied to other concurrent specification languages such as Promela or CCS, but we center the discussion and the implementation on CSP. We base our technique on a new data structure to represent {CSP} computations called track. A track is a data structure which represents the sequence of expressions that have been evaluated during the computation, and moreover, it is labeled with the location of these expressions in the specification. The implementation of a dynamic slicer for {CSP} is useful for debugging, program comprehension, and program specialization, and it is also interesting from a theoretical perspective because {CSP} introduces difficulties such as heavy concurrency and non-determinism, synchronizations, frequent absence of data dependence, etc.

Keywords: Concurrent programming
[IST16]
David Insa, Josep Silva, and Salvador Tamarit. Where you sit matters? how classroom seating might affect marks. To appear, 2016. [ bib ]
[GN16]
Álvaro García-Pérez and Pablo Nogueira. No solvable lambda-value term left behind. Logical Methods in Computer Science, 12(2):1--43, 2016. [ bib | DOI | http ]
In the lambda calculus a term is solvable iff it is operationally relevant. Solvable terms are a superset of the terms that convert to a final result called normal form. Unsolvable terms are operationally irrelevant and can be equated without loss of consistency. There is a definition of solvability for the lambda-value calculus, called v-solvability, but it is not synonymous with operational relevance, some lambda-value normal forms are unsolvable, and unsolvables cannot be consistently equated. We provide a definition of solvability for the lambda-value calculus that does capture operational relevance and such that a consistent proof-theory can be constructed where unsolvables are equated attending to the number of arguments they take (their `order' in the jargon). The intuition is that in lambda-value the different sequentialisations of a computation can be distinguished operationally. We prove a version of the Genericity Lemma stating that unsolvable terms are generic and can be replaced by arbitrary terms of equal or greater order.

[FEH16]
Lars-Åke Fredlund, Clara Benac Earle, and John Hughes. Automatic grading of programming exercises using property-based testing. In 21st Annual Conference on Innovation and Technology in Computer Science Education ITiCSE 2016, Arequipa, Perú, July 11-13, 2016, pages 47--52. ACM, 2016. [ bib | DOI ]
[GGBE16]
Barbara Gallina, Elena Gómez-Martínez, and Clara Benac Earle. Deriving safety case fragments for assessing mbasafe's compliance with EN 50128. In SPICE, volume 609 of Communications in Computer and Information Science, pages 3--16. Springer, 2016. [ bib ]
[PCMH16]
Víctor Pablos-Ceruelo and Susana Muñoz-Hernández. A framework for modelling real-world knowledge capable of obtaining answers to fuzzy and flexible searches. In Computational Intelligence (SCI, volume 613), pages 281--297. Springer Verlag, 2016. [ bib | DOI ]
[ERC+16]
Elena Gómez-Martínez, Ricardo J. Rodríguez, Clara Benac Earle, Leire Etxeberria Elorza, and Miren Illarramendi Rezabal. A methodology for model-based verification of safety contracts and performance requirements. Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability, 0(0):1748006X16667328, 2016. [ bib | DOI | http ]

This file was generated by bibtex2html 1.98.