Sciweavers

1399 search results - page 97 / 280
» Verification of Test Suites
Sort
View
TSE
2002
140views more  TSE 2002»
15 years 4 months ago
Test Case Prioritization: A Family of Empirical Studies
To reduce the cost of regression testing, software testers may prioritize their test cases so that those which are more important, by some measure, are run earlier in the regressi...
Sebastian G. Elbaum, Alexey G. Malishevsky, Gregg ...
114
Voted
ICPR
2002
IEEE
16 years 5 months ago
FVC2002: Second Fingerprint Verification Competition
Two years after the first edition, a new Fingerprint Verification Competition (FVC2002) was organized by the authors, with the aim of determining the state-of-theart in this chall...
Dario Maio, Davide Maltoni, Raffaele Cappelli, Jam...
VLSID
2002
IEEE
152views VLSI» more  VLSID 2002»
16 years 4 months ago
Verification of an Industrial CC-NUMA Server
Directed test program-based verification or formal verification methods are usually quite ineffective on large cachecoherent, non-uniform memory access (CC-NUMA) multiprocessors b...
Rajarshi Mukherjee, Yozo Nakayama, Toshiya Mima
ICBA
2004
Springer
119views Biometrics» more  ICBA 2004»
15 years 10 months ago
Iris Based Human Verification Algorithms
In this paper three algorithms for iris verification have been presented. Iris detection algorithms include the normalization and iris extraction steps. Three algorithms for verifi...
Bhola Ram Meena, Mayank Vatsa, Richa Singh, Phalgu...
141
Voted
ESOP
2009
Springer
15 years 8 months ago
Type-Based Automated Verification of Authenticity in Cryptographic Protocols
Gordon and Jeffrey have proposed a type and effect system for checking authenticity in cryptographic protocols. The type system reduces the protocol verification problem to the typ...
Daisuke Kikuchi, Naoki Kobayashi