There are many different implementation approaches to realize the vision of feature oriented software development, ranging from simple preprocessors, over feature-oriented program...
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
Previous studies comparing the prediction accuracy of effort models built using Web cross- and single-company data sets have been inconclusive, and as such replicated studies are ...
Emilia Mendes, Sergio Di Martino, Filomena Ferrucc...
To what extent is it possible to disregard stimulus dimensions that are irrelevant to a certain task? This question was tackled in three experiments using the paradigm of comparat...
Marc Pomplun, E. Carbone, Lorenz Sichelschmidt, B....
Background: The secondary structure of an RNA must be known before the relationship between its structure and function can be determined. One way to predict the secondary structur...