Sciweavers

93 search results - page 3 / 19
» Analyzing the Effectiveness of Multiple-Detect Test Sets
Sort
View
ICSM
2006
IEEE
14 years 1 days ago
Software Feature Understanding in an Industrial Setting
Software Engineers frequently need to locate and understand the code that implements a specific user feature of a large system. This paper reports on a study by Motorola Inc. and ...
Michael Jiang, Michael Groble, Sharon Simmons, Den...
DATE
2004
IEEE
120views Hardware» more  DATE 2004»
13 years 9 months ago
Pattern Selection for Testing of Deep Sub-Micron Timing Defects
Due to process variations in deep sub-micron (DSM) technologies, the effects of timing defects are difficult to capture. This paper presents a novel coverage metric for estimating...
Mango Chia-Tso Chao, Li-C. Wang, Kwang-Ting Cheng
DATE
2005
IEEE
204views Hardware» more  DATE 2005»
13 years 11 months ago
Evaluation of Error-Resilience for Reliable Compression of Test Data
This paper addresses error-resilience as the capability to tolerate bit-flips in a compressed test data stream (which is transferred from an Automatic Test Equipment (ATE) to the...
Hamidreza Hashempour, Luca Schiano, Fabrizio Lomba...
DATE
2009
IEEE
115views Hardware» more  DATE 2009»
14 years 23 days ago
Automated data analysis solutions to silicon debug
Since pre-silicon functional verification is insufficient to detect all design errors, re-spins are often needed due to malfunctions that escape into the silicon. This paper pre...
Yu-Shen Yang, Nicola Nicolici, Andreas G. Veneris
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 6 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh