Sciweavers

2527 search results - page 397 / 506
» A UML-Based Approach to System Testing
Sort
View
113
Voted
DFT
1997
IEEE
93views VLSI» more  DFT 1997»
15 years 7 months ago
An IDDQ Sensor for Concurrent Timing Error Detection
Abstract— Error control is a major concern in many computer systems, particularly those deployed in critical applications. Experience shows that most malfunctions during system o...
Christopher G. Knight, Adit D. Singh, Victor P. Ne...
111
Voted
AGENTS
1997
Springer
15 years 7 months ago
An Adaptive Web Page Recommendation Service
An adaptive recommendation service seeks to adapt to its users, providing increasingly personalized recommendations over time. In this paper we introduce the \Fab" adaptive W...
Marko Balabanovic
124
Voted
ICLP
1997
Springer
15 years 7 months ago
Non-Failure Analysis for Logic Programs
We provide a method whereby, given mode and (upper approximation) type information, we can detect procedures and goals that can be guaranteed to not fail (i.e., to produce at leas...
Saumya K. Debray, Pedro López-García...
AFRIGRAPH
2007
ACM
15 years 7 months ago
Efficient editing of aged object textures
Real objects present an enormous amount of detail, including aging effects. Artists need an intuitive control when they iteratively review and redesign their work to achieve a spe...
Olivier Clément, Jocelyn Benoit, Eric Paque...
128
Voted
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
15 years 7 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...