Works matching DE "VERIFICATION of computer systems"
Results: 184
Detection of Harmful Content Using Multilevel Verification in Visual Sensor Data.
- Published in:
- Wireless Personal Communications, 2016, v. 86, n. 1, p. 109, doi. 10.1007/s11277-015-2966-1
- By:
- Publication type:
- Article
On batch verification with group testing for vehicular communications.
- Published in:
- Wireless Networks (10220038), 2011, v. 17, n. 8, p. 1851, doi. 10.1007/s11276-011-0383-2
- By:
- Publication type:
- Article
Replication and Abstraction: Symmetry in Automated Formal Verification.
- Published in:
- Symmetry (20738994), 2010, v. 2, n. 2, p. 799, doi. 10.3390/sym2020799
- By:
- Publication type:
- Article
Diseño, Construcción y Fabricación de una Máquina Prototipo de Medición por Coordenadas.
- Published in:
- Revista Tecno Lógicas, 2011, n. 26, p. 11, doi. 10.22430/22565337.28
- By:
- Publication type:
- Article
Anomaly detection in electronic voting systems.
- Published in:
- Information Design Journal (IDJ), 2013, v. 20, n. 3, p. 194, doi. 10.1075/idj.20.3.01gil
- By:
- Publication type:
- Article
Verification of Model Transformations Using Isabelle/HOL and Scala.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 1, p. 45, doi. 10.1007/s10796-018-9860-9
- By:
- Publication type:
- Article
Speaker Verification via Modeling Kurtosis Using Sparse Coding.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2016, v. 30, n. 3, p. -1, doi. 10.1142/S0218001416590084
- By:
- Publication type:
- Article
Geometric and Textural Cues for Automatic Kinship Verification.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2015, v. 29, n. 3, p. -1, doi. 10.1142/S0218001415560017
- By:
- Publication type:
- Article
Hardware Accelerators for Elliptic Curve Cryptography.
- Published in:
- Advances in Radio Science, 2008, v. 6, p. 259, doi. 10.5194/ars-6-259-2008
- By:
- Publication type:
- Article
Fingerprint-Based Recognition.
- Published in:
- International Statistical Review, 2013, v. 81, n. 2, p. 175, doi. 10.1111/insr.12017
- By:
- Publication type:
- Article
A Formal Verification Method of Error Correction Code Processors Over Galois-Field Arithmetic.
- Published in:
- Journal of Multiple-Valued Logic & Soft Computing, 2016, v. 26, n. 1-2, p. 55
- By:
- Publication type:
- Article
System Monitoring with a Five-valued LTL.
- Published in:
- Journal of Multiple-Valued Logic & Soft Computing, 2016, v. 26, n. 1-2, p. 33
- By:
- Publication type:
- Article
Test Verification and Application of a Longitudinal Temperature Force Testing Method for Long Seamless Rails Using FBG Strain Sensor.
- Published in:
- Journal of Sensors, 2016, p. 1, doi. 10.1155/2016/3917604
- By:
- Publication type:
- Article
From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT.
- Published in:
- Journal of Sensors, 2015, p. 1, doi. 10.1155/2016/8797568
- By:
- Publication type:
- Article
Proof-producing translation of higher-order logic into pure and stateful ML.
- Published in:
- Journal of Functional Programming, 2014, v. 24, n. 2/3, p. 284, doi. 10.1017/S0956796813000282
- By:
- Publication type:
- Article
Model Checking.
- Published in:
- Resonance: Journal of Science Education, 2009, v. 14, n. 7, p. 667, doi. 10.1007/s12045-009-0055-z
- By:
- Publication type:
- Article
Experimental verification of quantum computation.
- Published in:
- Nature Physics, 2013, v. 9, n. 11, p. 727, doi. 10.1038/nphys2763
- By:
- Publication type:
- Article
Face Recognition using Simplified Probabilistic Linear Discriminant Analysis.
- Published in:
- International Journal of Advanced Robotic Systems, 2012, v. 9, n. 11, p. 1, doi. 10.5772/52258
- By:
- Publication type:
- Article
Relation between Nekrasov functions and Bohr-Sommerfeld periods in the pure SU( N) case.
- Published in:
- Theoretical & Mathematical Physics, 2014, v. 178, n. 2, p. 239, doi. 10.1007/s11232-014-0139-0
- By:
- Publication type:
- Article
Planning the verification, validation, and testing process: a case study demonstrating a decision support model.
- Published in:
- Journal of Engineering Design, 2017, v. 28, n. 3, p. 171, doi. 10.1080/09544828.2016.1274964
- By:
- Publication type:
- Article
Calibration verification of a low-cost method for MEMS accelerometers.
- Published in:
- Transactions of the Institute of Measurement & Control, 2014, v. 36, n. 5, p. 579, doi. 10.1177/0142331213513607
- By:
- Publication type:
- Article
Software architectural modelling and verification: a Petri net and temporal logic approach.
- Published in:
- Transactions of the Institute of Measurement & Control, 2011, v. 33, n. 1, p. 168, doi. 10.1177/0142331208095679
- By:
- Publication type:
- Article
Uniform verification of workflow soundness.
- Published in:
- Transactions of the Institute of Measurement & Control, 2011, v. 33, n. 1, p. 133, doi. 10.1177/0142331208095676
- By:
- Publication type:
- Article
Verification and Validation of Formal Data-Centric Business Models.
- Published in:
- Scientific Annals of Computer Science, 2015, v. 25, n. 2, p. 317, doi. 10.7561/SACS.2015.2.317
- By:
- Publication type:
- Article
Modular Verification of Qualitative Pathway Models with Fairnes.
- Published in:
- Scientific Annals of Computer Science, 2013, v. 23, n. 1, p. 75, doi. 10.7561/SACS.2013.1.75
- By:
- Publication type:
- Article
An Algebraic Framework for the Verification of Context-Aware Adaptive Systems.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2015, v. 25, n. 7, p. 1105, doi. 10.1142/S0218194015500199
- By:
- Publication type:
- Article
COMPARING AND IMPROVING THE SYNTHESIS OF STATE-BASED SPECIFICATIONS FROM SCENARIO-BASED SPECIFICATIONS.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2012, v. 22, n. 7, p. 867, doi. 10.1142/S0218194012500234
- By:
- Publication type:
- Article
MODEL CHECKING FOR VERIFICATION OF MANDATORY ACCESS CONTROL MODELS AND PROPERTIES.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2011, v. 21, n. 1, p. 103, doi. 10.1142/S021819401100513X
- By:
- Publication type:
- Article
PROOF SCORE APPROACH TO ANALYSIS OF ELECTRONIC COMMERCE PROTOCOLS.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2010, v. 20, n. 2, p. 253, doi. 10.1142/S0218194010004712
- By:
- Publication type:
- Article
A STATISTICAL APPROACH TOWARDS SECURE LOCATION VERIFICATION IN NOISY WIRELESS CHANNELS.
- Published in:
- International Journal of Foundations of Computer Science, 2014, v. 25, n. 5, p. 563, doi. 10.1142/S0129054114500221
- By:
- Publication type:
- Article
PARAMETRIC VERIFICATION AND TEST COVERAGE FOR HYBRID AUTOMATA USING THE INVERSE METHOD.
- Published in:
- International Journal of Foundations of Computer Science, 2013, v. 24, n. 2, p. 233, doi. 10.1142/S0129054113400091
- By:
- Publication type:
- Article
AUTOMATIC VERIFICATION OF DIRECTORY-BASED CONSISTENCY PROTOCOLS WITH GRAPH CONSTRAINTS.
- Published in:
- International Journal of Foundations of Computer Science, 2011, v. 22, n. 4, p. 761, doi. 10.1142/S0129054111008416
- By:
- Publication type:
- Article
A SIMULATION ALGORITHM FOR MULTIENVIRONMENT PROBABILISTIC P SYSTEMS:: A FORMAL VERIFICATION.
- Published in:
- International Journal of Foundations of Computer Science, 2011, v. 22, n. 1, p. 107, doi. 10.1142/S0129054111007873
- By:
- Publication type:
- Article
FORMAL VERIFICATION OF P SYSTEMS USING SPIN.
- Published in:
- International Journal of Foundations of Computer Science, 2011, v. 22, n. 1, p. 133, doi. 10.1142/S0129054111007897
- By:
- Publication type:
- Article
GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test.
- Published in:
- EURASIP Journal on Information Security, 2010, p. 1, doi. 10.1155/2010/391761
- By:
- Publication type:
- Article
Authenticity Preservation with Histogram-Based Reversible Data Hiding and Quadtree Concepts.
- Published in:
- Sensors (14248220), 2011, v. 11, n. 10, p. 9717, doi. 10.3390/s111009717
- By:
- Publication type:
- Article
THE TIME IS NOW: The basics behind blockchain and why it will transform supply chains.
- Published in:
- Quality Progress, 2018, v. 51, n. 10, p. 18
- By:
- Publication type:
- Article
Reusing RTL Assertion Checkers for Verification of SystemC TLM Models.
- Published in:
- Journal of Electronic Testing, 2015, v. 31, n. 2, p. 167, doi. 10.1007/s10836-015-5514-8
- By:
- Publication type:
- Article
Editorial.
- Published in:
- 2013
- By:
- Publication type:
- Editorial
Checking the reliability of socket based communication software.
- Published in:
- International Journal on Software Tools for Technology Transfer, 2009, v. 11, n. 5, p. 359, doi. 10.1007/s10009-009-0112-7
- By:
- Publication type:
- Article
Haifa verification conference 2007.
- Published in:
- 2009
- By:
- Publication type:
- Editorial
Analysis of privacy in mobile telephony systems.
- Published in:
- International Journal of Information Security, 2017, v. 16, n. 5, p. 491, doi. 10.1007/s10207-016-0338-9
- By:
- Publication type:
- Article
A shuffle to achieve high efficiency through pre-computation and batch verification.
- Published in:
- International Journal of Information Security, 2013, v. 12, n. 4, p. 337, doi. 10.1007/s10207-013-0193-x
- By:
- Publication type:
- Article
Modeling and Verification of D-flip flop using PROMELA and SPIN.
- Published in:
- International Journal of Computing & ICT Research, 2013, v. 7, n. 2, p. 48
- By:
- Publication type:
- Article
A Real-Time Angle- and Illumination-Aware Face Recognition System Based on Artificial Neural Network.
- Published in:
- Applied Computational Intelligence & Soft Computing, 2012, p. 1, doi. 10.1155/2012/274617
- By:
- Publication type:
- Article
Open SystemC Simulator with Support for Power Gating Design.
- Published in:
- International Journal of Reconfigurable Computing, 2012, p. 1, doi. 10.1155/2012/793190
- By:
- Publication type:
- Article
Risk-Based Approach to Monitoring.
- Published in:
- Applied Clinical Trials, 2012, v. 21, n. 1, p. 50
- By:
- Publication type:
- Article
EFFECT OF THE TRESHOLDING TO SIGNATURE VERIFICATION USING ARTIFICIAL NEURAL NETWORK.
- Published in:
- Teknoloji, 2004, v. 7, n. 1, p. 151
- By:
- Publication type:
- Article
Transitive Location Verification Algorithm in Location-Based Routing for Wireless Sensor Networks.
- Published in:
- Adhoc & Sensor Wireless Networks, 2014, v. 22, n. 1/2, p. 237
- By:
- Publication type:
- Article
Transitive Location Verification Algorithm in Location-Based Routing for Wireless Sensor Networks.
- Published in:
- Adhoc & Sensor Wireless Networks, 2014, v. 21, n. 3, p. 237
- By:
- Publication type:
- Article