A few years ago a portal for bachelor and master theses from Flemish university colleges was established by means of the open source repository software DoKS. At present approxima...
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
This paper describes the Patient Record Manager and the Workflow toolset of the wirelessbased e-health system Ward-In-Hand, developed inside an IST European project and currently ...
Christodulos Pappas, Eva Coscia, Gabriella Dodero,...
This paper presents the main characteristics and capabilities of Usability Logger software tool, used in the usability evaluation of Human Computer interaction interfaces. Usabilit...
A replay tool aiming to reproduce a program's execution interposes itself at an appropriate replay interface between the program and the environment. During recording, it log...
Ming Wu, Fan Long, Xi Wang, Zhilei Xu, Haoxiang Li...