Sciweavers

5578 search results - page 1052 / 1116
» Base Class Injection
Sort
View
IOLTS
2005
IEEE
125views Hardware» more  IOLTS 2005»
14 years 2 months ago
Design of a Self Checking Reed Solomon Encoder
— In this paper, an innovative self-checking Reed Solomon encoder architecture is described. The presented architecture exploits some properties of the arithmetic operations in G...
Gian-Carlo Cardarilli, Salvatore Pontarelli, Marco...
ISESE
2005
IEEE
14 years 2 months ago
System test case prioritization of new and regression test cases
Test case prioritization techniques have been shown to be beneficial for improving regression-testing activities. With prioritization, the rate of fault detection is improved, thu...
Hema Srikanth, Laurie Williams, Jason Osborne
IWPSE
2005
IEEE
14 years 2 months ago
EvoLens: Lens-View Visualizations of Evolution Data
Visualizing software evolution is essential for identifying design erosions that have occurred over the past releases. Making evolutionary aspects explicit via visual representati...
Jacek Ratzinger, Michael Fischer, Harald Gall
MICRO
2005
IEEE
133views Hardware» more  MICRO 2005»
14 years 2 months ago
Wish Branches: Combining Conditional Branching and Predication for Adaptive Predicated Execution
Predicated execution has been used to reduce the number of branch mispredictions by eliminating hard-to-predict branches. However, the additional instruction overhead and addition...
Hyesoon Kim, Onur Mutlu, Jared Stark, Yale N. Patt
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
14 years 2 months ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor
« Prev « First page 1052 / 1116 Last » Next »