The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper reviews the first challenge on single image super-resolution (restoration of rich details in an low resolution image) with focus on proposed solutions and results. A new DIVerse 2K resolution image dataset (DIV2K) was employed. The challenge had 6 competitions divided into 2 tracks with 3 magnification factors each. Track 1 employed the standard bicubic downscaling setup, while Track 2...
In this paper, we study the testing flow in fabrication process of stacked-die products. We discuss the difficulties of traditional testing mechanism. To improve production yield, a contactless testing with cyber physical system (CPS) for pre-bond interposers is proposed in this paper. We propose a testing framework comprising a heating laser and an infrared-radiation camera. In addition, we also...
With the explosion of big data, companies both small and large are increasingly motivated to make data-driven decisions. For web-based companies in particular online controlled experiments or A/B tests have become essential scientific tools for decision-making. Large scale organizations like Google, Amazon, eBay, Facebook, LinkedIn, Yahoo, and Microsoft have built mature systems and support for controlled...
This paper presents a novel approach, based on static analysis, to detect format string vulnerabilities in C programs. Format string vulnerability is viewed as a finite state safety property. The analysis is expressed as a system of constraint describing how the safety state at one program point is related to the state at adjacent program points. Our analysis is inter-procedurally flow sensitive and...
On the basis of analyzing the classical particle swarm optimization(PSO), this paper proposes a new version of the PSO, namely, Honeybee PSO. The Honeybee PSO divides the whole swarm into several small subswarms in which each particle decides its own search direction in the use of roulette. And by this the diversity of the swarm is satisfied. In the process of searching, each particle considers its...
This paper presents a new method to generate test cased based on the Object Oriented Net (OON) model, notated with Z schemas. We can be benefited from this method in that: (1) Picturing the whole system while generating the test by the algorithm at the same time; (2) Instructing coding by the extended model.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.