Sciweavers

1492 search results - page 59 / 299
» Testing Properties of Constraint-Graphs
Sort
View
138
Voted
IJNSEC
2008
146views more  IJNSEC 2008»
15 years 3 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
99
Voted
METRICS
2003
IEEE
15 years 8 months ago
When Can We Test Less?
When it is impractical to rigorously assess all parts of complex systems, test engineers use defect detectors to focus their limited resources. In this article, we define some pr...
Tim Menzies, Justin S. Di Stefano, Kareem Ammar, K...
112
Voted
ICRA
1999
IEEE
90views Robotics» more  ICRA 1999»
15 years 7 months ago
Testing and Analysis of a Flexible Feeding System
Flexible parts feeding techniques have recently begun to gain industry acceptance. However, one barrier to effective flexible feeding solutions is a dearth of knowledge of the und...
Greg C. Causey, Roger D. Quinn, Michael S. Branick...
134
Voted
ECCC
2000
117views more  ECCC 2000»
15 years 3 months ago
On Testing Expansion in Bounded-Degree Graphs
We consider testing graph expansion in the bounded-degree graph model. Specifically, we refer to algorithms for testing whether the graph has a second eigenvalue bounded above by a...
Oded Goldreich, Dana Ron
128
Voted
DFT
2004
IEEE
95views VLSI» more  DFT 2004»
15 years 7 months ago
Mixed Loopback BiST for RF Digital Transceivers
In this paper we analyze the performance of a mixed built-in-self-test (BiST) for RF IC digital transceivers, where a baseband processor can be used both as a test pattern generat...
Jerzy Dabrowski, Javier Gonzalez Bayon