This paper describes an ongoing project with the goal of designing and implementing a method to evaluate visualizations based on the tasks supported. The method evaluates time to ...
Octavio Juarez Espinosa, Chris Hendrickson, James ...
Instead of computer games, animations, cartoons, and videos being used only for entertainment by kids, there is now an interest in using multimedia for “innovative testing.” R...
Penetration testing is widely used to help ensure the security of web applications. It discovers vulnerabilities by simulating attacks from malicious users on a target application...
William G. J. Halfond, Shauvik Roy Choudhary, Ales...
Re-using the network in a NoC-based system as a test access mechanism is an attractive solution as pointed out by several authors. As a consequence, testing of NoC-based SoCs is b...
Abstract— We present a general method to evaluate RF BuiltIn Self-Test (BIST) techniques during the design stage. In particular, the adaptive kernel estimator is used to construc...
Haralampos-G. D. Stratigopoulos, Jeanne Tongbong, ...