Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Abstract. This paper considers the use of dependent types to capture information about dynamic resource usage in a static type system. Dependent types allow us to give (explicit) p...
Background: Most software packages for whole genome association studies are non-graphical, purely text based programs originally designed to run with UNIX-like operating systems. ...
Background: Comparative genomics is the analysis and comparison of genomes from different species. This area of research is driven by the large number of sequenced genomes and hea...
Mohamed Ibrahim Abouelhoda, Stefan Kurtz, Enno Ohl...
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...