Sciweavers

1528 search results - page 178 / 306
» Performance Assertion Checking
Sort
View
DATE
2005
IEEE
99views Hardware» more  DATE 2005»
15 years 8 months ago
Worst-Case and Average-Case Analysis of n-Detection Test Sets
Test sets that detect each target fault n times (n-detection test sets) are typically generated for restricted values of n due to the increase in test set size with n. We perform ...
Irith Pomeranz, Sudhakar M. Reddy
HICSS
2005
IEEE
86views Biometrics» more  HICSS 2005»
15 years 8 months ago
Look-Ahead Routing Reduces Wrong Turns in Freenet-Style Peer-to-Peer Systems
Peer-to-Peer protocols and applications have drawn much attention. Freenet is a groundbreaking Peer-to-Peer system that protects the anonymity of information producers, consumers,...
Jens Mache, Eric Anholt, Valentina Grigoreanu, Tim...
GECCO
2005
Springer
121views Optimization» more  GECCO 2005»
15 years 8 months ago
New evolutionary techniques for test-program generation for complex microprocessor cores
Checking if microprocessor cores are fully functional at the end of the productive process has become a major issue. Traditional functional approaches are not sufficient when cons...
Ernesto Sánchez, Massimiliano Schillaci, Ma...
ICAPR
2005
Springer
15 years 8 months ago
Optical Flow-Based Segmentation of Containers for Automatic Code Recognition
This paper presents a method for accurately segmenting moving container trucks in image sequences. This task allows to increase the performance of a recognition system that must id...
Vicente Atienza, Ángel Rodas, Gabriela Andr...
ICTAC
2005
Springer
15 years 8 months ago
Representation and Reasoning on RBAC: A Description Logic Approach
Abstract. Role-based access control (RBAC) is recognized as an excellent model for access control in large-scale networked applications. Formalization of RBAC in a logical approach...
Chen Zhao, NuerMaimaiti Heilili, Shengping Liu, Zu...