Sciweavers

7393 search results - page 1280 / 1479
» Synthesis-for-testability using transformations
Sort
View
122
Voted
CSSC
2008
77views more  CSSC 2008»
15 years 3 months ago
Undercoverage of Wavelet-Based Resampling Confidence Intervals
The decorrelating property of the discrete wavelet transformation (DWT) appears valuable because one can avoid estimating the correlation structure in the original data space by b...
Liansheng Tang, Wayne A. Woodward, William R. Schu...
145
Voted
ENTCS
2008
106views more  ENTCS 2008»
15 years 3 months ago
Verifying Test-Hypotheses: An Experiment in Test and Proof
HOL-TestGen is a specification and test case generation environment extending the interactive theorem prover Isabelle/HOL. The HOL-TestGen method is two-staged: first, the origina...
Achim D. Brucker, Lukas Brügger, Burkhart Wol...
129
Voted
FUIN
2008
103views more  FUIN 2008»
15 years 3 months ago
Implementing Sorting Networks with Spiking Neural P Systems
Spiking neural P systems simulate the behavior of neurons sending signals through axons. Recently, some applications concerning Boolean circuits and sorting algorithms have been pr...
Rodica Ceterchi, Alexandru Ioan Tomescu
134
Voted
CN
2006
74views more  CN 2006»
15 years 3 months ago
OMNI: An efficient overlay multicast infrastructure for real-time applications
We consider an overlay architecture (called OMNI) where service providers deploy a set of service nodes (called MSNs) in the network to efficiently implement media-streaming appli...
Suman Banerjee, Christopher Kommareddy, Koushik Ka...
227
Voted
IJACT
2008
136views more  IJACT 2008»
15 years 3 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta
« Prev « First page 1280 / 1479 Last » Next »