Sciweavers

1518 search results - page 182 / 304
» Cryptographic Test Correction
Sort
View
94
Voted
ISSTA
2009
ACM
15 years 7 months ago
SideTrack: generalizing dynamic atomicity analysis
Atomicity is a key correctness specification for multithreaded programs. Prior dynamic atomicity analyses include precise tools, which report an error if and only if the observed...
Jaeheon Yi, Caitlin Sadowski, Cormac Flanagan
SIGCSE
2010
ACM
183views Education» more  SIGCSE 2010»
15 years 7 months ago
Electronic commerce virtual laboratory
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
Joel Coffman, Alfred C. Weaver
117
Voted
COMPSAC
2008
IEEE
15 years 7 months ago
Implicit Social Network Model for Predicting and Tracking the Location of Faults
— In software testing and maintenance activities, the observed faults and bugs are reported in bug report managing systems (BRMS) for further analysis and repair. According to th...
Ing-Xiang Chen, Cheng-Zen Yang, Ting-Kun Lu, Hojun...
73
Voted
DATE
2007
IEEE
124views Hardware» more  DATE 2007»
15 years 7 months ago
Worst-case design and margin for embedded SRAM
An important aspect of Design for Yield for embedded SRAM is identifying the expected worst case behavior in order to guarantee that sufficient design margin is present. Previousl...
Robert C. Aitken, Sachin Idgunji
113
Voted
MIRAGE
2007
Springer
15 years 7 months ago
3D Reconstruction of Human Faces from Occluding Contours
Abstract. In this paper we take a fresh look at the problem of extracting shape from contours of human faces. We focus on two key questions: how can we robustly fit a 3D face mode...
Michael Keller, Reinhard Knothe, Thomas Vetter