Sciweavers

92 search results - page 2 / 19
» Detecting Undetectable Controller Faults Using Power Analysi...
Sort
View
VTS
2007
IEEE
79views Hardware» more  VTS 2007»
14 years 1 months ago
Using Multiple Expansion Ratios and Dependency Analysis to Improve Test Compression
A methodology is presented for improving the amount of compression achieved by continuous-flow decompressors by using multiple ratios of scan chains to tester channels (i.e., expa...
Richard Putman, Nur A. Touba
VTS
2006
IEEE
93views Hardware» more  VTS 2006»
14 years 1 months ago
Upper Bounding Fault Coverage by Structural Analysis and Signal Monitoring
A new algorithm for identifying stuck faults in combinational circuits that cannot be detected by a given input sequence is presented. Other than pre and post-processing steps, ce...
Vishwani D. Agrawal, Soumitra Bose, Vijay Gangaram
ICCV
1995
IEEE
13 years 11 months ago
A Quantitative Analysis of View Degeneracy and its use for Active Focal Length control
W e quantify the observation by Kender and Freudenstein [6] that degenerate views occupy a significant fraction of the viewing sphere surrounding an object. This demonstrates that...
David Wilkes, Sven J. Dickinson, John K. Tsotsos
ESEM
2007
ACM
13 years 9 months ago
Assessing, Comparing, and Combining Statechart- based testing and Structural testing: An Experiment
An important number of studies have addressed the importance of models in software engineering, mainly in the design of robust software systems. Although models have been proven t...
Samar Mouchawrab, Lionel C. Briand, Yvan Labiche
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
14 years 1 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel