Sciweavers

521 search results - page 84 / 105
» Timing Verification Using HDTV
Sort
View
SIGSOFT
2003
ACM
15 years 10 months ago
A family of test adequacy criteria for database-driven applications
Although a software application always executes within a particular environment, current testing methods have largely ignored these environmental factors. Many applications execut...
Gregory M. Kapfhammer, Mary Lou Soffa
VLSID
2008
IEEE
122views VLSI» more  VLSID 2008»
15 years 10 months ago
A Module Checking Based Converter Synthesis Approach for SoCs
Protocol conversion involves the use of a converter to control communication between two or more protocols such that desired system-level specifications can be satisfied. We invest...
Roopak Sinha, Partha S. Roop, Samik Basu
ICICIC
2006
IEEE
15 years 3 months ago
Fingerprint Identification Based on Frequency Texture Analysis
Nowadays the AFIS (Automatic fingerprint Identification system) plays more and more important roles in various applications such as access control, ATM card verification and crimi...
Juncao Li, Yong Zhang, Wenhai Kong, Xiamu Niu
ICSM
2002
IEEE
15 years 2 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
AUSAI
2006
Springer
14 years 11 months ago
An Efficient Alternative to SVM Based Recursive Feature Elimination with Applications in Natural Language Processing and Bioinfo
The SVM based Recursive Feature Elimination (RFE-SVM) algorithm is a popular technique for feature selection, used in natural language processing and bioinformatics. Recently it wa...
Justin Bedo, Conrad Sanderson, Adam Kowalczyk