This paper reports the results of a study investigating the relevance criteria used by health care professionals when seeking medical images. Data was collected from 26 participan...
The testing of database applications poses new challenges for software engineers. In particular, it is difficult to thoroughly test the interactions between an application and it...
Abstract. Model-based testing has been proposed as a technique to automatically verify that a system conforms to its specification. A popular approach is to use a model-checker to...
Background: In proteomic analysis, MS/MS spectra acquired by mass spectrometer are assigned to peptides by database searching algorithms such as SEQUEST. The assignations of pepti...
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...