When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
This paper addresses not only the question of testability measurement of OO designs but also focuses on its practicability. While detecting testability weaknesses (called testabil...
This paper describes our experiences in an ongoing collaboration between our research group in Palo Alto and a similar group in Japan. The collaboration is based on semimonthly vi...
Andreas Girgensohn, John S. Boreczky, Patrick Chiu...
Clinical pathways are widely adopted by many large hospitals around the world in order to provide high-quality patient treatment and reduce the length of hospital stay of each pat...
In this paper, we propose an approach for the analysis of power supply noise in the frequency domain for power/ground (P/G) networks of tree topologies. We model the P/G network a...