Sciweavers

2006 search results - page 250 / 402
» Heuristic Security-Testing Methods
Sort
View
133
Voted
APGV
2006
ACM
287views Visualization» more  APGV 2006»
15 years 7 months ago
Contrast enhancement of images using human contrast sensitivity
Study of contrast sensitivity of the human eye shows that our contrast discrimination sensitivity follows the weber law for suprathreshold levels. In this paper, we apply this fac...
Aditi Majumder, Sandy Irani
ASPDAC
2006
ACM
144views Hardware» more  ASPDAC 2006»
15 years 7 months ago
Compaction of pass/fail-based diagnostic test vectors for combinational and sequential circuits
Abstract— Substantial attention is being paid to the fault diagnosis problem in recent test literature. Yet, the compaction of test vectors for fault diagnosis is little explored...
Yoshinobu Higami, Kewal K. Saluja, Hiroshi Takahas...
DAC
2006
ACM
15 years 7 months ago
A fast on-chip decoupling capacitance budgeting algorithm using macromodeling and linear programming
We propose a novel and efficient charge-based decoupling capacitance budgeting algorithm. Our method uses the macromodeling technique and effective radius of decoupling capacitan...
Min Zhao, Rajendran Panda, Savithri Sundareswaran,...
CCGRID
2005
IEEE
15 years 6 months ago
Fast pattern-based throughput prediction for TCP bulk transfers
The ability to quickly predict the throughput of a TCP transfer between a client and a server, or between peers, has wide application in scientific computing and commercial compu...
Tsung-i Huang, Jaspal Subhlok
105
Voted
CLUSTER
2005
IEEE
15 years 6 months ago
Efficient and Robust Computation of Resource Clusters in the Internet
Applications such as parallel computing, online games, and content distribution networks need to run on a set of resources with particular network connection characteristics to ge...
Chuang Liu, Ian T. Foster