Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
— We examine an abstract formulation of BIST diagnosis in digital logic systems. The BIST diagnosis problem has applications that include identification of erroneous test vector...
This paper describes the application of the Test Automation Framework on the Mars Polar Lander (MPL) software. The premature shutdown of the descent engine on the MPL spacecraft i...
Mark R. Blackburn, Robert Busser, Aaron Nauman, Ro...
Graphs are widely used to model complicated data semantics in many applications. In this paper, we aim to develop efficient techniques to retrieve graphs, containing a given query...
— For controlling robots in an urban search and rescue (USAR) application, we present a wearable joystick with improved sensing capability as well as Giant MagnetoResistance(GMR)...
Jaewook Bae, Amy C. Larson, Richard M. Voyles, Roy...