Sciweavers

1466 search results - page 56 / 294
» Completeness of the Authentication Tests
Sort
View
SIGSOFT
2010
ACM
13 years 6 months ago
Future of developer testing: building quality in code
Although much progress has been made in software verification, software testing remains by far the most widely used technique for improving software reliability. Among various typ...
Tao Xie, Nikolai Tillmann, Jonathan de Halleux, Wo...
ITC
2000
IEEE
104views Hardware» more  ITC 2000»
14 years 20 days ago
Application of deterministic logic BIST on industrial circuits
We present the application of a deterministic logic BIST scheme on state-of-the-art industrial circuits. Experimental results show that complete fault coverage can be achieved for...
Gundolf Kiefer, Hans-Joachim Wunderlich, Harald P....
KBSE
2000
IEEE
13 years 12 months ago
Mutation Operators for Specifications
Testing has a vital support role in the software engineering process, but developing tests often takes significant resources. A formal specification is a repository of knowledge a...
Paul E. Black, Vadim Okun, Yaacov Yesha
MMSEC
2006
ACM
213views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Parameter optimization for biometric fingerprint recognition using genetic algorithms
In this paper, we suggest an optimization approach for fingerprint authentication using genetic algorithms. Our application was planned so that it can be used without great effort...
Tobias Scheidat, Andreas Engel, Claus Vielhauer
MBEES
2010
13 years 6 months ago
Test Case Integration: From Components to Systems
In a component-based development approach system integration generally implies the packaging and deployment of a group of software components on hardware units, possibly hiding th...
Bernhard Schätz, Christian Pfaller