Context-free session types. Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming. 462–475.(2016).
Controlled Flexibility in Healthcare Processes: A BPMN-Extension Approach. Encyclopedia of E-Health and Telemedicine. 521–535.(2016).
Controlling the granularity of automatic parallel programs. Journal of Computational Science. 17, 620–629.(2016).
A convex hull-based data selection method for data driven models. Applied Soft Computing. 47, 515 - 533.(2016).
Crowdsourced assessment of common genetic contribution to predicting anti-TNF treatment response in rheumatoid arthritis. Nature communications. 7, 12460.(2016).
DEKANT: a static analysis tool that learns to detect web application vulnerabilities. Proceedings of the 25th International Symposium on Software Testing and Analysis. 1–11.(2016).
Design and Implementation of a Consistent Data Store for a Distributed SDN Control Plane. Dependable Computing Conference (EDCC), 2016 12th European. 169–180.(2016).
Design and Verification of Distributed Phasers. European Conference on Parallel Processing. 405–418.(2016).
Designing for geo-referenced in-situ therapeutic scenarios. Information Systems Frontiers. 18, 103–123.(2016).
Detecting and removing web application vulnerabilities with static analysis and data mining. IEEE Transactions on Reliability. 65, 54–69.(2016).
Development technologies impact in web accessibility. Proceedings of the 13th Web for All Conference. 6.(2016).
Distinguishing two probability ensembles with one sample from each ensemble. Theory of Computing Systems. 59, 517–531.(2016).
Effect of Target Size on Non-visual Text-entry. Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services.(2016).
Efficient and Modular Consensus-Free Reconfiguration for Fault-Tolerant Storage. arXiv preprint arXiv:1607.05344.(2016).
Efficient reasoning for inconsistent horn formulae. European Conference on Logics in Artificial Intelligence. 336–352.(2016).
Enforcing Safety and Security Through Non-Intrusive Runtime Verification. the 1st Workshop on Security and Dependability of Critical Embedded Real-Time Systems. 19.(2016).
Equipping WAP with weapons to detect vulnerabilities. Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.(2016).
Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report. Dependable Systems and Networks (DSN), 2016 46th Annual IEEE/IFIP International Conference on. 630–637.(2016).
ER quality control protein network in CF to modulate F508del-CFTR rescued. FEBS JOURNAL. 283, 138–138.(2016).
Evaluating the reliability of ambient-assisted living business processes. Proceedings of the 18th International Conference on Enterprise Information Systems. 528–536.(2016).
Evaluation of runtime cut-off approaches for parallel programs. Proceedings of the 12th International Meeting on High Performance Computing for Computational Science (VECPAR 2016). Springer.(2016).
Extraction of Regulatory Events using Kernel-based Classifiers and Distant Supervision. ACL 2016. 88.(2016).
On Finding Minimum Satisfying Assignments. International Conference on Principles and Practice of Constraint Programming. 287–297.(2016).
A Flexible Recommendation System for Cable TV. arXiv preprint arXiv:1609.02451.(2016).