Sciweavers

3883 search results - page 79 / 777
» Design mentoring based on design evolution analysis
Sort
View
DATE
2003
IEEE
128views Hardware» more  DATE 2003»
14 years 2 months ago
Virtual Compression through Test Vector Stitching for Scan Based Designs
We propose a technique for compressing test vectors. The technique reduces test application time and tester memory requirements by utilizing part of the predecessor response in co...
Wenjing Rao, Alex Orailoglu
APCSAC
2001
IEEE
14 years 19 days ago
Password-Capabilities: Their Evolution from the Password-Capability System into Walnut and Beyond
Since we first devised and defined password-capabilities as a new technique for building capability-based operating systems, a number of research systems around the world have use...
Ronald Pose
APSEC
1999
IEEE
14 years 1 months ago
Conducting Requirements Evolution by Replacing Components in the Current System
As new software components become available for an existing system, we can evolve not only the system itself but also its requirements based on the new components. In this paper, ...
Haruhiko Kaiya, Kenji Kaijiri
CAISE
2008
Springer
13 years 11 months ago
When Interaction Choices Trigger Business Evolutions
In the context of development methods, early collaborations between specialists (SE, HCI, business, usability experts . . . ) allows having a broader view of the development possib...
Guillaume Godet-Bar, Sophie Dupuy-Chessa, Dominiqu...
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
14 years 3 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang