It is difficult to apply existing software development methods to security concerns. Using software for security testing purposes, in particular, is hard to do. The fact that ther...
Background: High throughput laboratory techniques generate huge quantities of scientific data. Laboratory Information Management Systems (LIMS) are a necessary requirement, dealin...
James A. Morris, Simon A. Gayther, Ian J. Jacobs, ...
Background: RNA-dependent gene silencing is becoming a routine tool used in laboratories worldwide. One of the important remaining hurdles in the selection of the target sequence,...
The recent evolution in mobile devices, combined with rapid advancements in identification techniques, has lead to new opportunities for mobile application developers: mobile appli...
William Van Woensel, Sven Casteleyn, Olga De Troye...
Current software systems contain increasingly more elements that have not usually been considered in software engineering research and studies. Source artifacts, understood as the...