Sciweavers

1518 search results - page 54 / 304
» Cryptographic Test Correction
Sort
View
ETS
2009
IEEE
98views Hardware» more  ETS 2009»
13 years 8 months ago
Increasing Robustness of SAT-based Delay Test Generation Using Efficient Dynamic Learning Techniques
Due to the increased speed in modern designs, testing for delay faults has become an important issue in the postproduction test of manufactured chips. A high fault coverage is nee...
Stephan Eggersglüß, Rolf Drechsler
ISCAS
1999
IEEE
105views Hardware» more  ISCAS 1999»
14 years 3 months ago
Configuration self-test in FPGA-based reconfigurable systems
An FPGA-based reconfigurable system may contain boards of FPGAs which are reconfigured for different applications and must work correctly. This paper presents a novel approach for...
W. Quddus, Abhijit Jas, Nur A. Touba
JSS
2002
101views more  JSS 2002»
13 years 10 months ago
Software requirements validation via task analysis
As a baseline for software development, a correct and complete requirements definition is one foundation of software quality. Previously, a novel approach to static testing of sof...
Hong Zhu, Lingzi Jin, Dan Diaper, Ganghong Bai
ISSAC
1989
Springer
87views Mathematics» more  ISSAC 1989»
14 years 3 months ago
An Improved Las Vegas Primality Test
: We present a modification of the Goldwasser-Kilian-Atkin primality test, which, when given an input n, outputs either prime or composite, along with a certificate of correctnes...
Erich Kaltofen, T. Valente, Norika Yui
COMPSAC
2009
IEEE
14 years 2 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...