Multiple sequence alignment of distantly related viral proteins remains a challenge to all currently available alignment methods. The hidden Markovmodel approach offers a new,flex...
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
We explore the automatic generation of test data that respect constraints expressed in the Object-Role Modeling (ORM) language. ORM is a popular conceptual modeling language, prim...
Yannis Smaragdakis, Christoph Csallner, Ranjith Su...
Abstract— Cognitive control - the ability to produce appropriate behavior in complex situations - is a fundamental aspect of intelligence. It is increasingly evident that this co...
The development of a family of applications in a domain can be greatly eased if patterns in the domain are systematically reused. Systematic use of such a pattern can be achieved ...