Sciweavers

4359 search results - page 194 / 872
» Automated Pipeline Design
Sort
View
104
Voted
ISORC
2006
IEEE
15 years 9 months ago
Automated Logging of Mobile Phones Failures Data
The increasing complexity of mobile phones directly affects their reliability, while the user tolerance for failures becomes to decrease, especially when the phone is used for bus...
Paolo Ascione, Marcello Cinque, Domenico Cotroneo
122
Voted
ISQED
2005
IEEE
92views Hardware» more  ISQED 2005»
15 years 9 months ago
Evaluation of Capacitor Ratios in Automated Accurate Common-Centroid Capacitor Arrays
In this paper, design and measurement results of a test chip that intends to evaluate differences between layout techniques for rectangular unit-capacitor arrays are introduced. P...
DiaaEldin Khalil, Mohamed Dessouky, Vincent Bourgu...
SEMWEB
2005
Springer
15 years 9 months ago
A Strategy for Automated Meaning Negotiation in Distributed Information Retrieval
The paper reports on the formal framework to design strategies for multi-issue non-symmetric meaning negotiations among software agents in a distributed information retrieval syste...
Vadim Ermolayev, Natalya Keberle, Wolf-Ekkehard Ma...
122
Voted
UML
2005
Springer
15 years 9 months ago
Automated Analysis of Natural Language Properties for UML Models
It is well known that errors introduced early in the development process are commonly the most expensive to correct. The increasingly popular model-driven architecture (MDA) exace...
Sascha Konrad, Betty H. C. Cheng
121
Voted
NDSS
2000
IEEE
15 years 8 months ago
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection...
David Wagner, Jeffrey S. Foster, Eric A. Brewer, A...