Sciweavers

714 search results - page 79 / 143
» Verification and Compliance Testing
Sort
View
ECOOP
2008
Springer
13 years 10 months ago
Computing Stack Maps with Interfaces
Abstract. Lightweight bytecode verification uses stack maps to annotate Java bytecode programs with type information in order to reduce the verification to type checking. This pape...
Frédéric Besson, Thomas P. Jensen, T...
DDECS
2007
IEEE
201views Hardware» more  DDECS 2007»
14 years 3 months ago
Built in Defect Prognosis for Embedded Memories
: As scan compression replaces the traditional scan it is important to understand how it works with power. DFT MAX represents one of the two primary scan compression solutions used...
Prashant Dubey, Akhil Garg, Sravan Kumar Bhaskaran...
ICRA
2002
IEEE
91views Robotics» more  ICRA 2002»
14 years 1 months ago
Tactile Tracking of Arteries in Robotic Surgery
Locating arteries hidden beneath superficial tissue can be a difficult task in minimally invasive surgery. This paper reports the development of a system that finds the paths of a...
Ryan A. Beasley, Robert D. Howe
BCSHCI
2007
13 years 10 months ago
ALT text and basic accessibility
Recent surveys have shown that the majority of websites are not accessible. Despite legal obligations and the importance of the internet for disabled people, most websites fail to...
Tom McEwan, Ben Weerts
SIGSOFT
2003
ACM
14 years 9 months ago
Deadline analysis of interrupt-driven software
Real-time, reactive, and embedded systems are increasingly used throughout society (e.g., flight control, railway signaling, vehicle management, medical devices, and many others)....
Dennis Brylow, Jens Palsberg