Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Programs designed from scratch often start with just a set of classes. Classes can be instantiated and so deliver the objects that are the carriers of information and function. In...
Collection attributes, as defined by Boyland, can be used as a mechanism for concisely specifying cross-referencelike properties such as callee sets, subclass sets, and sets of v...
We study a class of delay differential equations which have been used to model hematological stem cell regulation and dynamics. Under certain circumstances the model exhibits self-...