Sciweavers

86 search results - page 14 / 18
» Thorough Checking Revisited
Sort
View
CODES
2007
IEEE
14 years 2 months ago
A data protection unit for NoC-based architectures
Security is gaining increasing relevance in the development of embedded devices. Towards a secure system at each level of design, this paper addresses the security aspects related...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
HICSS
2003
IEEE
121views Biometrics» more  HICSS 2003»
14 years 29 days ago
Repeatable Quality Assurance Techniques for Requirements Negotiations
Many software projects fail because early life-cycle defects such as ill-defined requirements are not identified and removed. Therefore, quality assurance (QA) techniques for defe...
Paul Grünbacher, Michael Halling, Stefan Biff...
ICALT
2003
IEEE
14 years 29 days ago
Completing LOM - How Additional Axioms Increase the Utility of Learning Object Metadata
Learning Objects Metadata describing educational resources in order to allow better reusability and retrieval. Unfortunately, annotating complete courses thoroughly with LOM metad...
Jan Brase, Mark Painter, Wolfgang Nejdl
ILP
2003
Springer
14 years 26 days ago
ILP for Mathematical Discovery
We believe that AI programs written for discovery tasks will need to simultaneously employ a variety of reasoning techniques such as induction, abduction, deduction, calculation an...
Simon Colton, Stephen Muggleton
ICSE
1999
IEEE-ACM
13 years 12 months ago
Residual Test Coverage Monitoring
Structural coverage criteria are often used as an indicator of the thoroughness of testing, but complete satisfaction of a criterion is seldom achieved. When a software product is...
Christina Pavlopoulou, Michal Young