Sciweavers

641 search results - page 68 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
ITC
2003
IEEE
123views Hardware» more  ITC 2003»
14 years 2 months ago
A Comprehensive Approach to Assessing and Analyzing 1149.1 Test Logic
In this paper we introduce a tool which is capable of verifying an 1149.1 test logic implementation and its compliance to the IEEE 1149.1 Standard [1][2] while providing a precise...
Kevin Melocco, Hina Arora, Paul Setlak, Gary Kunse...
METRICS
2003
IEEE
14 years 2 months ago
Metrology, Measurement and Metrics in Software Engineering
Up until recently software 'metrics' have been most often proposed as the quantitative tools of choice in software engineering, and the analysis of these had been most o...
Alain Abran, Asma Sellami, Witold Suryn
ACSC
2007
IEEE
14 years 1 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
KDD
2007
ACM
169views Data Mining» more  KDD 2007»
14 years 10 months ago
Exploiting underrepresented query aspects for automatic query expansion
Users attempt to express their search goals through web search queries. When a search goal has multiple components or aspects, documents that represent all the aspects are likely ...
Daniel Crabtree, Peter Andreae, Xiaoying Gao
NSDI
2007
13 years 12 months ago
Exploiting Similarity for Multi-Source Downloads Using File Handprints
Many contemporary approaches for speeding up large file transfers attempt to download chunks of a data object from multiple sources. Systems such as BitTorrent quickly locate sou...
Himabindu Pucha, David G. Andersen, Michael Kamins...