Sciweavers

1518 search results - page 126 / 304
» Cryptographic Test Correction
Sort
View
CPHYSICS
2004
93views more  CPHYSICS 2004»
15 years 3 months ago
Modeling plasma-wall interactions in First Wall-Limiter geometry
We test the standard edge plasma code B2-solps5.0 on a model First-Wall Limiter (FWL) geometry. The presence of a tangency point between the solid wall and the magnetic separatrix...
F. Subba, R. Zanino
FUIN
2002
80views more  FUIN 2002»
15 years 3 months ago
P Systems with Replicated Rewriting and Stream X-Machines (Eilenberg Machines)
Abstract. The aim of this paper is to show how the P systems with replicated rewriting can be modeled by X-machines (also called Eilenberg machines). In the first approach, the par...
Joaquin Aguado, Tudor Balanescu, Anthony J. Cowlin...
140
Voted
JSS
2008
113views more  JSS 2008»
15 years 3 months ago
A model for software rework reduction through a combination of anomaly metrics
Analysis of anomalies reported during testing of a project can tell a lot about how well the processes and products work. Still, organizations rarely use anomaly reports for more t...
Lars-Ola Damm, Lars Lundberg, Claes Wohlin
SIGSOFT
2006
ACM
16 years 4 months ago
SYNERGY: a new algorithm for property checking
We consider the problem if a given program satisfies a specified safety property. Interesting programs have infinite state spaces, with inputs ranging over infinite domains, and f...
Bhargav S. Gulavani, Thomas A. Henzinger, Yamini K...
SIGSOFT
2003
ACM
16 years 4 months ago
Deadline analysis of interrupt-driven software
Real-time, reactive, and embedded systems are increasingly used throughout society (e.g., flight control, railway signaling, vehicle management, medical devices, and many others)....
Dennis Brylow, Jens Palsberg