: The actual benefits of model-driven approaches compared to code-centric development have not been systematically investigated. This paper presents a case study in which function...
Because software security patches contain information about vulnerabilities, they can be reverse engineered into exploits. Tools for doing this already exist. As a result, there is...
Background: Various software tools are available for the display of pairwise linkage disequilibrium across multiple single nucleotide polymorphisms. The HapMap project also presen...
Traditional auctions such as the English and first-price sealed-bid auctions have been adopted as another tool for procurement negotiations. Throughout the past decade many new auc...
In this paper, an educational software aimed to help learning Information Theory basics in a practical way is reported. The software, called IT-tutor-UV, can produce entropy analy...