Sciweavers

6978 search results - page 140 / 1396
» Reframing Requirements Analysis
Sort
View
ESE
2006
95views Database» more  ESE 2006»
14 years 10 months ago
Input validation analysis and testing
This research addresses the problem of statically analyzing input command syntax as defined in interface and requirements specifications and then generating test cases for dynamic ...
Jane Huffman Hayes, Jeff Offutt
IPL
2008
146views more  IPL 2008»
14 years 10 months ago
A running time analysis of an Ant Colony Optimization algorithm for shortest paths in directed acyclic graphs
In this paper, we prove polynomial running time bounds for an Ant Colony Optimization (ACO) algorithm for the single-destination shortest path problem on directed acyclic graphs. ...
Nattapat Attiratanasunthron, Jittat Fakcharoenphol
CONCURRENCY
2007
95views more  CONCURRENCY 2007»
14 years 10 months ago
Automated and accurate cache behavior analysis for codes with irregular access patterns
Abstract. The memory hierarchy plays an essential role in the performance of current computers, thus good analysis tools that help predict and understand its behavior are required....
Diego Andrade, Manuel Arenaz, Basilio B. Fraguela,...
ICRA
2010
IEEE
66views Robotics» more  ICRA 2010»
14 years 8 months ago
Strength analysis of miniature folded right angle tetrahedron chain Programmable Matter
Abstract— Miniaturization of Programmable Matter is a major challenge. Much of the difficulty stems from size and power requirements of internal actuators. This paper demonstrat...
Paul J. White, Michael L. Posner, Mark Yim
COST
2009
Springer
121views Multimedia» more  COST 2009»
15 years 4 months ago
Vulnerability Assessment of Fingerprint Matching Based on Time Analysis
A time analysis of a reference minutiae-based fingerprint matching system is presented. We study the relation between the score generated by the system (NFIS2 from NIST) and the t...
Javier Galbally, Sara Carballo, Julian Fiér...