Sciweavers

129 search results - page 9 / 26
» Providing Automated Verification in HOL Using MDGs
Sort
View
DSOM
2006
Springer
14 years 6 days ago
Detecting Bottleneck in n-Tier IT Applications Through Analysis
As the complexity of large-scale enterprise applications increases, providing performance verification through staging becomes an important part of reducing business risks associat...
Gueyoung Jung, Galen S. Swint, Jason Parekh, Calto...
SAC
2006
ACM
13 years 8 months ago
Assisted verification of elementary functions using Gappa
The implementation of a correctly rounded or interval elementary function needs to be proven carefully in the very last details. The proof requires a tight bound on the overall er...
Florent de Dinechin, Christoph Quirin Lauter, Guil...
DAC
2002
ACM
14 years 9 months ago
Hole analysis for functional coverage data
One of the main goals of coverage tools is to provide the user with informative presentation of coverage information. Specifically, information on large, cohesive sets of uncovere...
Oded Lachish, Eitan Marcus, Shmuel Ur, Avi Ziv
MR
2010
120views Robotics» more  MR 2010»
13 years 7 months ago
Automated inspection and classification of flip-chip-contacts using scanning acoustic microscopy
Industrial applications often require failure analysis methods working non-destructively, enabling either a rapid quality control or fault isolation and defect localization prior ...
S. Brand, P. Czurratis, P. Hoffrogge, M. Petzold
PRL
2006
100views more  PRL 2006»
13 years 8 months ago
The utilization of a Taylor series-based transformation in fingerprint verification
Dealing with non-linear distortion in fingerprint images is a major difficulty for automated fingerprint verification systems. While this distortion can be a nuisance in minutiae ...
Peter Meenen, Ashkan Ashrafi, Reza R. Adhami