Sciweavers

1770 search results - page 5 / 354
» Writing requirements in computer security
Sort
View
VLSID
2004
IEEE
139views VLSI» more  VLSID 2004»
14 years 8 months ago
Open Defects Detection within 6T SRAM Cells using a No Write Recovery Test Mode
The detection of all open defects within 6T SRAM cells is always a challenge due to the significant test time requirements. This paper proposes a new design-for-test (DFT) techniq...
André Ivanov, Baosheng Wang, Josh Yang
PRDC
1999
IEEE
13 years 12 months ago
FBD: A Fault-tolerant Buffering Disk System for Improving Write Performance of RAID5 Systems
The parity calculation technique of the RAID5 provides high reliability, efficient disk space usage, and good read performance for parallel-disk-array configurations. However, it ...
Haruo Yokota, Masanori Goto
TSE
2008
103views more  TSE 2008»
13 years 7 months ago
The Impact of Educational Background on the Effectiveness of Requirements Inspections: An Empirical Study
While the inspection of various software artifacts increases the quality of the end product, the effectiveness of an inspection largely depends on the individual inspectors involve...
Jeffrey C. Carver, Nachiappan Nagappan, Alan Page
WIMOB
2007
IEEE
14 years 1 months ago
Securing Virtual Private Networks with SIM Authentication
—  With the ever increasing amount of systems requiring user authentication, users are experiencing an substantial inconvenience. A huge amount of passwords needs to be remember...
Torstein Bjørnstad, Ivar Jørstad, Do...
FOCS
2008
IEEE
14 years 2 months ago
On the Value of Multiple Read/Write Streams for Approximating Frequency Moments
We consider the read/write streams model, an extension of the standard data stream model in which an algorithm can create and manipulate multiple read/write streams in addition to...
Paul Beame, Dang-Trinh Huynh-Ngoc