Sciweavers

2421 search results - page 248 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
AHS
2006
IEEE
188views Hardware» more  AHS 2006»
15 years 8 months ago
Finite State Machine IP Watermarking: A Tutorial
Sharing Intellectual Property (IP) blocks in today's competitive market poses significant high security risks. In this paper, we present a tutorial for a watermarking approach...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
BIRTHDAY
2009
Springer
15 years 2 months ago
Management of UML Clusters
Abstract. Software engineering uses UML diagrams as a standard technique for specification and development of software. Various UML diagrams are used for specification of different...
Peggy Schmidt, Bernhard Thalheim
KBSE
2002
IEEE
15 years 9 months ago
What Makes Finite-State Models More (or Less) Testable?
Finite-state machine (FSM) models are commonly used to represent software with concurrent processes. Established model checking tools can be used to automatically test FSM models,...
David Owen, Tim Menzies, Bojan Cukic
IROS
2009
IEEE
168views Robotics» more  IROS 2009»
15 years 11 months ago
Developing visual sensing strategies through next best view planning
— We propose an approach for acquiring geometric 3D models using cameras mounted on autonomous vehicles and robots. Our method uses structure from motion techniques from computer...
Enrique Dunn, Jur P. van den Berg, Jan-Michael Fra...
VTS
2002
IEEE
120views Hardware» more  VTS 2002»
15 years 9 months ago
Software-Based Weighted Random Testing for IP Cores in Bus-Based Programmable SoCs
We present a software-based weighted random pattern scheme for testing delay faults in IP cores of programmable SoCs. We describe a method for determining static and transition pr...
Madhu K. Iyer, Kwang-Ting Cheng