|
Search the dblp DataBase
Michael R. Grimaila:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jennifer Dworak, Michael R. Grimaila, Brad Cobb, Ting-Chi Wang, Li-C. Wang, M. Ray Mercer
On the superiority of DO-RE-ME/MPG-D over stuck-at-based defective part level prediction. [Citation Graph (0, 0)][DBLP] Asian Test Symposium, 2000, pp:151-0 [Conf]
- Yuxin Tian, Michael R. Grimaila, Weiping Shi, M. Ray Mercer
Minimizing Defective Part Level Using a Linear Programming-Based Optimal Test Selection Method. [Citation Graph (0, 0)][DBLP] Asian Test Symposium, 2003, pp:354-359 [Conf]
- Sooryong Lee, Brad Cobb, Jennifer Dworak, Michael R. Grimaila, M. Ray Mercer
A New ATPG Algorithm to Limit Test Set Size and Achieve Multiple Detections of All Faults. [Citation Graph (0, 0)][DBLP] DATE, 2002, pp:94-101 [Conf]
- Evan E. Anderson, Joobin Choobineh, Michael R. Grimaila
An Enterprise Level Security Requirements Specification Model. [Citation Graph (0, 0)][DBLP] HICSS, 2005, pp:- [Conf]
- Kenneth S. Edge, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Robert Bennington, Christopher Reuter
The Use of Attack and Protection Trees to Analyze Security for an Online Banking System. [Citation Graph (0, 0)][DBLP] HICSS, 2007, pp:144- [Conf]
- Jennifer Dworak, Michael R. Grimaila, Sooryong Lee, Li-C. Wang, M. Ray Mercer
Enhanced DO-RE-ME based defect level prediction using defect site aggregation-MPG-D. [Citation Graph (0, 0)][DBLP] ITC, 2000, pp:930-939 [Conf]
- Jennifer Dworak, Michael R. Grimaila, Sooryong Lee, Li-C. Wang, M. Ray Mercer
Modeling the probability of defect excitation for a commercial IC with implications for stuck-at fault-based ATPG strategies. [Citation Graph (0, 0)][DBLP] ITC, 1999, pp:1031-1037 [Conf]
- Michael R. Grimaila, Sooryong Lee, Jennifer Dworak, Kenneth M. Butler, Bret Stewart, Hari Balachandran, Bryan Houchins, Vineet Mathur, Jaehong Park, Li-C. Wang, M. Ray Mercer
REDO - Probabilistic Excitation and Deterministic Observation - First Commercial Experimen. [Citation Graph (0, 0)][DBLP] VTS, 1999, pp:268-274 [Conf]
- Jennifer Dworak, Jason D. Wicker, Sooryong Lee, Michael R. Grimaila, M. Ray Mercer, Kenneth M. Butler, Bret Stewart, Li-C. Wang
Defect-Oriented Testing and Defective-Part-Level Prediction. [Citation Graph (0, 0)][DBLP] IEEE Design & Test of Computers, 2001, v:18, n:1, pp:31-41 [Journal]
- Michael R. Grimaila
Maximizing Business Information Security's Educational Value. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:1, pp:56-60 [Journal]
A survey of state-of-the-art in anonymity metrics. [Citation Graph (, )][DBLP]
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process. [Citation Graph (, )][DBLP]
Biometric enhancements: Template aging error score analysis. [Citation Graph (, )][DBLP]
Towards a Taxonomy of Wired and Wireless Anonymous Networks. [Citation Graph (, )][DBLP]
Using logic-based reduction for adversarial component recovery. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|