Sciweavers

1518 search results - page 250 / 304
» Cryptographic Test Correction
Sort
View
117
Voted
ISSTA
2009
ACM
15 years 7 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
80
Voted
IROS
2007
IEEE
142views Robotics» more  IROS 2007»
15 years 6 months ago
GPS moving performance on open sky and forested paths
— In this paper we present a systematic study of the performance of seven different configurations of GPS on a moving vehicle using three different GPS receivers. The seven diff...
Luis Yoichi Morales Saiki, Takashi Tsubouchi
109
Voted
BIBE
2006
IEEE
135views Bioinformatics» more  BIBE 2006»
15 years 6 months ago
Evidence of Multiple Maximum Likelihood Points for a Phylogenetic Tree
An interesting and important, but largely ignored question associated with the ML method is whether there exists only a single maximum likelihood point for a given phylogenetic tr...
Bing Bing Zhou, Monther Tarawneh, Pinghao Wang, Da...
ISCAS
2006
IEEE
90views Hardware» more  ISCAS 2006»
15 years 6 months ago
Phase measurement and adjustment of digital signals using random sampling technique
—This paper introduces a technique to measure and adjust the relative phase of on-chip high speed digital signals using a random sampling technique of inferential statistics. The...
Rashed Zafar Bhatti, Monty Denneau, Jeff Draper
106
Voted
ASPDAC
2005
ACM
97views Hardware» more  ASPDAC 2005»
15 years 6 months ago
Opportunities and challenges for better than worst-case design
The progressive trend of fabrication technologies towards the nanometer regime has created a number of new physical design challenges for computer architects. Design complexity, u...
Todd M. Austin, Valeria Bertacco, David Blaauw, Tr...