Sciweavers

339 search results - page 49 / 68
» An ADC-BiST scheme using sequential code analysis
Sort
View
117
Voted
ASPLOS
2004
ACM
15 years 8 months ago
Low-overhead memory leak detection using adaptive statistical profiling
Sampling has been successfully used to identify performance optimization opportunities. We would like to apply similar techniques to check program correctness. Unfortunately, samp...
Matthias Hauswirth, Trishul M. Chilimbi
ICIP
2007
IEEE
16 years 4 months ago
Transform Coder Classification for Digital Image Forensics
The area of non-intrusive forensic analysis has found many applications in the area of digital imaging. One unexplored area is the identification of source coding in digital image...
Steven Tjoa, Wan-Yi Sabrina Lin, K. J. Ray Liu
146
Voted
AADEBUG
1995
Springer
15 years 6 months ago
Software Testability Measurement for Assertion Placement and Fault Localization
Software testability, the tendency for software to reveal its faults during testing, is an important issue for veri cation and quality assurance. Testability measurement can also b...
Jeffrey M. Voas
NETWORKING
2007
15 years 4 months ago
Simple Models for the Performance Evaluation of a Class of Two-Hop Relay Protocols
We evaluate the performance of a class of two-hop relay protocols for mobile ad hoc networks. The interest is on the multicopy two-hop relay (MTR) protocol, where the source may ge...
Ahmad Al Hanbali, Arzad Alam Kherani, Philippe Nai...
139
Voted
APPT
2007
Springer
15 years 4 months ago
A Parallel BSP Algorithm for Irregular Dynamic Programming
Dynamic programming is a widely applied algorithm design technique in many areas such as computational biology and scientific computing. Typical applications using this technique a...
Malcolm Yoke-Hean Low, Weiguo Liu, Bertil Schmidt