Sciweavers

881 search results - page 54 / 177
» Continuous testing in eclipse
Sort
View
IJCNN
2006
IEEE
15 years 3 months ago
A computational intelligence-based criterion to detect non-stationarity trends
—The stationarity hypothesis is largely and implicitly assumed when designing classifiers (especially those for industrial applications) but it does not generally hold in practic...
Cesare Alippi, Manuel Roveri
CIS
2005
Springer
15 years 3 months ago
Survivability Computation of Networked Information Systems
Abstract. Survivability should be considered beyond security for networked information systems, which emphasizes the ability of continuing providing services timely in malicious en...
Xuegang Lin, Rongsheng Xu, Miaoliang Zhu
INFORMS
2007
150views more  INFORMS 2007»
14 years 9 months ago
SSPMO: A Scatter Tabu Search Procedure for Non-Linear Multiobjective Optimization
— We describe the development and testing of a metaheuristic procedure, based on the scatter search methodology, for the problem of approximating the efficient frontier of nonlin...
Julián Molina Luque, Manuel Laguna, Rafael ...
ICCD
2008
IEEE
111views Hardware» more  ICCD 2008»
15 years 6 months ago
Test-access mechanism optimization for core-based three-dimensional SOCs
— Test-access mechanisms (TAMs) and test wrappers (e.g., the IEEE Standard 1500 wrapper) facilitate the modular testing of embedded cores in a core-based system-on-chip (SOC). Su...
Xiaoxia Wu, Yibo Chen, Krishnendu Chakrabarty, Yua...
IEEEARES
2010
IEEE
15 years 2 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser