Sciweavers

1466 search results - page 82 / 294
» Completeness of the Authentication Tests
Sort
View
ICCAD
1996
IEEE
102views Hardware» more  ICCAD 1996»
14 years 12 days ago
Bit-flipping BIST
A scan-based BIST scheme is presented which guarantees complete fault coverage with very low hardware overhead. A probabilistic analysis shows that the output of an LFSR which fee...
Hans-Joachim Wunderlich, Gundolf Kiefer
TVLSI
2008
140views more  TVLSI 2008»
13 years 8 months ago
A Novel Mutation-Based Validation Paradigm for High-Level Hardware Descriptions
We present a Mutation-based Validation Paradigm (MVP) technology that can handle complete high-level microprocessor implementations and is based on explicit design error modeling, ...
Jorge Campos, Hussain Al-Asaad
AIED
2007
Springer
14 years 2 months ago
Explaining Self-Explaining: A Contrast between Content and Generation
Self-explaining has been repeatedly shown to result in positive learning outcomes for students in a wide variety of disciplines. However, there are two potential accounts for why s...
Robert G. M. Hausmann, Kurt VanLehn
ACC
2011
65views more  ACC 2011»
12 years 8 months ago
Measuring the Deployment Hiccups of DNSSEC
On May 5, 2010 the last step of the DNSSEC deployment on the 13 root servers was completed. DNSSEC is a set of security extensions on the traditional DNS protocol, that aim in prev...
Vasilis Pappas, Angelos D. Keromytis
ACHI
2008
IEEE
14 years 2 months ago
Adaptive Self-Assessment Trying to Reduce Fear
— Almost everyone has experienced fear at least once in their life because of a test. Fear can positively mobilise students, when it is under control. However, when fear becomes ...
Anastasios A. Economides, Christos N. Moridis