Early detection of problems within a code base can save much effort and associated cost as time progresses. One method of performing routine assessment of code with a view to pre-...
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
To take full advantage of the parallelism offered by a multicore machine, one must write parallel code. Writing parallel code is difficult. Even when one writes correct code, the...
John Cieslewicz, Kenneth A. Ross, Kyoho Satsumi, Y...
Code-coverage-based test data adequacy criteria typically treat all coverable code elements (such as statements, basic blocks, or outcomes of decisions) as equal. In practice, how...
Wei Chen, Roland H. Untch, Gregg Rothermel, Sebast...
We study network error correction with unequal link capacities. Previous results on network error correction assume unit link capacities. We consider network error correction codes...
Sukwon Kim, Tracey Ho, Michelle Effros, Amir Salma...