The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael R. Grimaila: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jennifer Dworak, Michael R. Grimaila, Brad Cobb, Ting-Chi Wang, Li-C. Wang, M. Ray Mercer
    On the superiority of DO-RE-ME/MPG-D over stuck-at-based defective part level prediction. [Citation Graph (0, 0)][DBLP]
    Asian Test Symposium, 2000, pp:151-0 [Conf]
  2. Yuxin Tian, Michael R. Grimaila, Weiping Shi, M. Ray Mercer
    Minimizing Defective Part Level Using a Linear Programming-Based Optimal Test Selection Method. [Citation Graph (0, 0)][DBLP]
    Asian Test Symposium, 2003, pp:354-359 [Conf]
  3. Sooryong Lee, Brad Cobb, Jennifer Dworak, Michael R. Grimaila, M. Ray Mercer
    A New ATPG Algorithm to Limit Test Set Size and Achieve Multiple Detections of All Faults. [Citation Graph (0, 0)][DBLP]
    DATE, 2002, pp:94-101 [Conf]
  4. Evan E. Anderson, Joobin Choobineh, Michael R. Grimaila
    An Enterprise Level Security Requirements Specification Model. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  5. Kenneth S. Edge, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Robert Bennington, Christopher Reuter
    The Use of Attack and Protection Trees to Analyze Security for an Online Banking System. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:144- [Conf]
  6. Jennifer Dworak, Michael R. Grimaila, Sooryong Lee, Li-C. Wang, M. Ray Mercer
    Enhanced DO-RE-ME based defect level prediction using defect site aggregation-MPG-D. [Citation Graph (0, 0)][DBLP]
    ITC, 2000, pp:930-939 [Conf]
  7. Jennifer Dworak, Michael R. Grimaila, Sooryong Lee, Li-C. Wang, M. Ray Mercer
    Modeling the probability of defect excitation for a commercial IC with implications for stuck-at fault-based ATPG strategies. [Citation Graph (0, 0)][DBLP]
    ITC, 1999, pp:1031-1037 [Conf]
  8. Michael R. Grimaila, Sooryong Lee, Jennifer Dworak, Kenneth M. Butler, Bret Stewart, Hari Balachandran, Bryan Houchins, Vineet Mathur, Jaehong Park, Li-C. Wang, M. Ray Mercer
    REDO - Probabilistic Excitation and Deterministic Observation - First Commercial Experimen. [Citation Graph (0, 0)][DBLP]
    VTS, 1999, pp:268-274 [Conf]
  9. Jennifer Dworak, Jason D. Wicker, Sooryong Lee, Michael R. Grimaila, M. Ray Mercer, Kenneth M. Butler, Bret Stewart, Li-C. Wang
    Defect-Oriented Testing and Defective-Part-Level Prediction. [Citation Graph (0, 0)][DBLP]
    IEEE Design & Test of Computers, 2001, v:18, n:1, pp:31-41 [Journal]
  10. Michael R. Grimaila
    Maximizing Business Information Security's Educational Value. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:56-60 [Journal]

  11. A survey of state-of-the-art in anonymity metrics. [Citation Graph (, )][DBLP]


  12. Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process. [Citation Graph (, )][DBLP]


  13. Biometric enhancements: Template aging error score analysis. [Citation Graph (, )][DBLP]


  14. Towards a Taxonomy of Wired and Wireless Anonymous Networks. [Citation Graph (, )][DBLP]


  15. Using logic-based reduction for adversarial component recovery. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002