Sciweavers

192 search results - page 32 / 39
» Functional Scan Chain Testing
Sort
View
CORR
2010
Springer
70views Education» more  CORR 2010»
13 years 8 months ago
The Deterministic Dendritic Cell Algorithm
Abstract. The Dendritic Cell Algorithm is an immune-inspired algorithm originally based on the function of natural dendritic cells. The original instantiation of the algorithm is a...
Julie Greensmith, Uwe Aickelin
ICSE
2008
IEEE-ACM
14 years 8 months ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams
ISBI
2011
IEEE
12 years 11 months ago
3D elastic registration improves HARDI-derived fiber alignment and automated tract clustering
High angular resolution diffusion imaging (HARDI) allows population studies of fiber integrity and connectivity. Tractography can extract individual fibers. For group studies, fib...
Yan Jin, Yonggang Shi, Neda Jahanshad, Iman Aganj,...
DAC
2008
ACM
14 years 8 months ago
Model checking based analysis of end-to-end latency in embedded, real-time systems with clock drifts
End-to-end latency of messages is an important design parameter that needs to be within specified bounds for the correct functioning of distributed real-time control systems. In t...
Swarup Mohalik, A. C. Rajeev, Manoj G. Dixit, S. R...
VTS
1997
IEEE
73views Hardware» more  VTS 1997»
14 years 1 days ago
Obtaining High Fault Coverage with Circular BIST Via State Skipping
Despite all of the advantages that circular BIST ofsers compared to conventional BIST approaches in terms of low area overhead, simple control logic, and easy insertion, it has se...
Nur A. Touba