Sciweavers

1518 search results - page 189 / 304
» Cryptographic Test Correction
Sort
View
137
Voted
TVLSI
2008
152views more  TVLSI 2008»
15 years 6 days ago
MMV: A Metamodeling Based Microprocessor Validation Environment
With increasing levels of integration of multiple processing cores and new features to support software functionality, recent generations of microprocessors face difficult validati...
Deepak Mathaikutty, Sreekumar V. Kodakara, Ajit Di...
JCC
2008
99views more  JCC 2008»
14 years 11 months ago
Assessment of programs for ligand binding affinity prediction
: The prediction of the binding free energy between a ligand and a protein is an important component in the virtual screening and lead optimization of ligands for drug discovery. T...
Ryangguk Kim, Jeffrey Skolnick
139
Voted
KBSE
2010
IEEE
14 years 11 months ago
Automated program repair through the evolution of assembly code
A method is described for automatically repairing legacy software at the assembly code level using evolutionary computation. The technique is demonstrated on Java byte code and x8...
Eric Schulte, Stephanie Forrest, Westley Weimer
96
Voted
SEMWEB
2010
Springer
14 years 10 months ago
JustBench: A Framework for OWL Benchmarking
Analysing the performance of OWL reasoners on expressive OWL ontologies is an ongoing challenge. In this paper, we present a new approach to performance analysis based on justifica...
Samantha Bail, Bijan Parsia, Ulrike Sattler
119
Voted
IJACTAICIT
2010
151views more  IJACTAICIT 2010»
14 years 7 months ago
The Comparative Study of Software Optimal Release Time Based on Burr Distribution
It is great practical interest to decide when to stop testing a software system in development phase and transfer it to the user. This problem is called as the optimal software re...
Hee-Cheul Kim, Hyoung-Keun Park