Sciweavers

16513 search results - page 2923 / 3303
» Numerical Analysis Methods
Sort
View
138
Voted
ITC
2003
IEEE
177views Hardware» more  ITC 2003»
15 years 10 months ago
Analyzing the Effectiveness of Multiple-Detect Test Sets
Multiple-detect test sets have been shown to be effective in lowering defect level. Other researchers have noted that observing the effects of a defect can be controlled by sensit...
R. D. (Shawn) Blanton, Kumar N. Dwarakanath, Aniru...
234
Voted
ITC
2003
IEEE
126views Hardware» more  ITC 2003»
15 years 10 months ago
Diagnosis-Based Post-Silicon Timing Validation Using Statistical Tools and Methodologies
This paper describes a new post-silicon validation problem for diagnosing systematic timing errors. We illustrate the differences between timing validation and the traditional log...
Angela Krstic, Li-C. Wang, Kwang-Ting Cheng, T. M....
108
Voted
IWPC
2003
IEEE
15 years 10 months ago
Generalized Selective XML Markup of Source Code Using Agile Parsing
Increasingly focus in the software comprehension community is shifting from representing the results of analysis in the graph and database domain to reflecting insights directly i...
James R. Cordy
NDSS
2003
IEEE
15 years 10 months ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal
141
Voted
SCAM
2003
IEEE
15 years 10 months ago
Design and Implementation of Bytecode-based Java Slicing System
Program slice is a set of statements that affect the value of variable v in a statement s. In order to calculate a program slice, we must know the dependence relations between sta...
Fumiaki Umemori, Kenji Konda, Reishi Yokomori, Kat...
« Prev « First page 2923 / 3303 Last » Next »