Sciweavers

1068 search results - page 175 / 214
» Group Dominant Strategies
Sort
View
ISESE
2003
IEEE
15 years 3 months ago
An Experimental Evaluation of Inspection and Testing for Detection of Design Faults
The two most common strategies for verification and validation, inspection and testing, are in a controlled experiment evaluated in terms of their fault detection capabilities. Th...
Carina Andersson, Thomas Thelin, Per Runeson, Nina...
ISPASS
2003
IEEE
15 years 3 months ago
Complete instrumentation requirements for performance analysis of Web based technologies
In this paper we present the eDragon environment, a research platform created to perform complete performance analysis of new Web-based technologies. eDragon enables the understan...
David Carrera, Jordi Guitart, Jordi Torres, Eduard...
ITC
2003
IEEE
127views Hardware» more  ITC 2003»
15 years 3 months ago
Architecting Millisecond Test Solutions for Wireless Phone RFIC's
Today’s low cost wireless phones have driven a need to be able to economically test high volumes of complex RF IC’s at a fraction of the cost of the IC. In June of 2001 the IB...
John Ferrario, Randy Wolf, Steve Moss
RTSS
2003
IEEE
15 years 3 months ago
JAM: A Jammed-Area Mapping Service for Sensor Networks
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
Anthony D. Wood, John A. Stankovic, Sang Hyuk Son
EICS
2010
ACM
15 years 2 months ago
Collaboratively maintaining semantic consistency of heterogeneous concepts towards a common concept set
In e-business, creating a common concept set for business integration, interoperation and interaction has to consider the heterogeneity reality of different interpretations from m...
Jingzhi Guo, Iok Ham Lam, Chun Chan, Guangyi Xiao