Sciweavers

350 search results - page 52 / 70
» From control effects to typed continuation passing
Sort
View
ITC
1998
IEEE
174views Hardware» more  ITC 1998»
13 years 11 months ago
High volume microprocessor test escapes, an analysis of defects our tests are missing
This paper explores defects found in a high volume microprocessor when shipping at a low defect level. A brief description of the manufacturing flow along with definition of DPM i...
Wayne M. Needham, Cheryl Prunty, Yeoh Eng Hong
CSFW
2009
IEEE
14 years 2 months ago
Updatable Security Views
Security views are a flexible and effective mechanism for controlling access to confidential information. Rather than allowing untrusted users to access source data directly, th...
J. Nathan Foster, Benjamin C. Pierce, Steve Zdance...
TACAS
2004
Springer
122views Algorithms» more  TACAS 2004»
14 years 25 days ago
A Scalable Incomplete Test for the Boundedness of UML RT Models
Abstract. We describe a scalable incomplete boundedness test for the communication buffers in UML RT models. UML RT is a variant of the UML modeling language, tailored to describin...
Stefan Leue, Richard Mayr, Wei Wei
BMCBI
2007
172views more  BMCBI 2007»
13 years 7 months ago
Bayesian approaches to reverse engineer cellular systems: a simulation study on nonlinear Gaussian networks
Background: Reverse engineering cellular networks is currently one of the most challenging problems in systems biology. Dynamic Bayesian networks (DBNs) seem to be particularly su...
Fulvia Ferrazzi, Paola Sebastiani, Marco Ramoni, R...
BMCBI
2006
130views more  BMCBI 2006»
13 years 7 months ago
Spatial normalization of array-CGH data
Background: Array-based comparative genomic hybridization (array-CGH) is a recently developed technique for analyzing changes in DNA copy number. As in all microarray analyses, no...
Pierre Neuvial, Philippe Hupé, Isabel Brito...