Sciweavers

4306 search results - page 414 / 862
» Timed Testing with TorX
Sort
View
ACSAC
2005
IEEE
15 years 9 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
EWCBR
2004
Springer
15 years 9 months ago
Fault Diagnosis of Industrial Robots Using Acoustic Signals and Case-Based Reasoning
In industrial manufacturing rigorous testing is used to ensure that the delivered products meet their specifications. Mechanical maladjustment or faults often show their presence t...
Erik Olsson, Peter J. Funk, Marcus Bengtsson
DT
2000
88views more  DT 2000»
15 years 3 months ago
Postsilicon Validation Methodology for Microprocessors
f abstraction as applicable to break the problem's complexity, and innovating better techniques to address complexity of new microarchitectural features. Validation techniques...
Hemant G. Rotithor
ICIP
2003
IEEE
16 years 5 months ago
Graylevel alignment between two images using linear programming
A critical step in defect detection for semiconductorprocess is to align a test image against a reference. This includes both spatial alignment and grayscale alignment. For the la...
E. Y. Lam
PERCOM
2007
ACM
16 years 3 months ago
Determining the Position and Orientation of Multi-Tagged Objects Using RFID Technology
The idea of smart shelves or tables equipped with RFID technology has been around for some time now. There already are commercial products available, especially for retailing. All...
Steve Hinske