Sciweavers

752 search results - page 60 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
ICOIN
2005
Springer
15 years 9 months ago
Experience with Engineering a Network Forensics System
Network Forensics is an important extension to the model of network security where emphasis is traditionally put on prevention and to a lesser extent on detection. It focuses on th...
Ahmad Almulhem, Issa Traoré
ICCD
2004
IEEE
113views Hardware» more  ICCD 2004»
16 years 12 days ago
End-to-End Testability Analysis and DfT Insertion for Mixed-Signal Paths
Increasing system complexity and test cost demands new system-level solutions for mixed-signal systems. In this paper, we present a testability analysis and DfT insertion methodol...
Sule Ozev, Alex Orailoglu
DATE
2003
IEEE
135views Hardware» more  DATE 2003»
15 years 8 months ago
Creating Value Through Test
Test is often seen as a necessary evil; it is a fact of life that ICs have manufacturing defects and those need to be filtered out by testing before the ICs are shipped to the cu...
Erik Jan Marinissen, Bart Vermeulen, Robert Madge,...
KDD
2003
ACM
133views Data Mining» more  KDD 2003»
16 years 3 months ago
Interactive Analysis of Gene Interactions Using Graphical gaussian model
DNA microarray provides a powerful basis for analysis of gene expression. Data mining methods such as clustering have been widely applied to microarray data to link genes that sho...
Xintao Wu, Yong Ye, Kalpathi R. Subramanian
122
Voted
ICCAD
2006
IEEE
108views Hardware» more  ICCAD 2006»
16 years 11 days ago
Formal model of data reuse analysis for hierarchical memory organizations
– In real-time data-dominated communication and multimedia processing applications, due to the manipulation of large sets of data, a multi-layer memory hierarchy is used to enhan...
Ilie I. Luican, Hongwei Zhu, Florin Balasa