Sciweavers

1518 search results - page 189 / 304
» Cryptographic Test Correction
Sort
View
TVLSI
2008
152views more  TVLSI 2008»
15 years 3 months ago
MMV: A Metamodeling Based Microprocessor Validation Environment
With increasing levels of integration of multiple processing cores and new features to support software functionality, recent generations of microprocessors face difficult validati...
Deepak Mathaikutty, Sreekumar V. Kodakara, Ajit Di...
JCC
2008
99views more  JCC 2008»
15 years 2 months ago
Assessment of programs for ligand binding affinity prediction
: The prediction of the binding free energy between a ligand and a protein is an important component in the virtual screening and lead optimization of ligands for drug discovery. T...
Ryangguk Kim, Jeffrey Skolnick
KBSE
2010
IEEE
15 years 2 months ago
Automated program repair through the evolution of assembly code
A method is described for automatically repairing legacy software at the assembly code level using evolutionary computation. The technique is demonstrated on Java byte code and x8...
Eric Schulte, Stephanie Forrest, Westley Weimer
SEMWEB
2010
Springer
15 years 1 months ago
JustBench: A Framework for OWL Benchmarking
Analysing the performance of OWL reasoners on expressive OWL ontologies is an ongoing challenge. In this paper, we present a new approach to performance analysis based on justifica...
Samantha Bail, Bijan Parsia, Ulrike Sattler
IJACTAICIT
2010
151views more  IJACTAICIT 2010»
14 years 10 months ago
The Comparative Study of Software Optimal Release Time Based on Burr Distribution
It is great practical interest to decide when to stop testing a software system in development phase and transfer it to the user. This problem is called as the optimal software re...
Hee-Cheul Kim, Hyoung-Keun Park