Works matching DE "VERIFICATION of computer systems"
Results: 183
Constraint-based test generation for automotive operating systems.
- Published in:
- Software & Systems Modeling, 2017, v. 16, n. 1, p. 7, doi. 10.1007/s10270-014-0449-6
- By:
- Publication type:
- Article
Relation between Nekrasov functions and Bohr-Sommerfeld periods in the pure SU( N) case.
- Published in:
- Theoretical & Mathematical Physics, 2014, v. 178, n. 2, p. 239, doi. 10.1007/s11232-014-0139-0
- By:
- Publication type:
- Article
Increasing key space at little extra cost in RFID authentications.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2014, v. 22, n. 1, p. 155, doi. 10.3906/elk-1201-77
- By:
- Publication type:
- Article
Spatiotemporal model checking of location and mobility related security policy specifications.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2013, v. 21, n. 1, p. 144, doi. 10.3906/elk-1105-54
- By:
- Publication type:
- Article
Replication and Abstraction: Symmetry in Automated Formal Verification.
- Published in:
- Symmetry (20738994), 2010, v. 2, n. 2, p. 799, doi. 10.3390/sym2020799
- By:
- Publication type:
- Article
Rapid Formal Verification as Requirements Stage Verification and Validation Technique.
- Published in:
- International Review on Computers & Software, 2019, v. 14, n. 1, p. 27, doi. 10.15866/irecos.v14i1.17684
- By:
- Publication type:
- Article
Capturing the Dynamism of Situation in the Flow of Information.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 2, p. 302
- By:
- Publication type:
- Article
A Short-Text-Oriented Knowledge Service for Ornament Design Process Based on Ontology.
- Published in:
- International Review on Computers & Software, 2011, v. 6, n. 7, p. 1232
- By:
- Publication type:
- Article
Verification and Trade-Off Analysis of Security Properties in UML System Models.
- Published in:
- IEEE Transactions on Software Engineering, 2010, v. 36, n. 3, p. 338, doi. 10.1109/TSE.2010.36
- By:
- Publication type:
- Article
Program Behavior Discovery and Verification: A Graph Grammar Approach.
- Published in:
- IEEE Transactions on Software Engineering, 2010, v. 36, n. 3, p. 431, doi. 10.1109/TSE.2010.3
- By:
- Publication type:
- Article
Model Checking Timed and Stochastic Properties with CSL<sup>TA</sup>.
- Published in:
- IEEE Transactions on Software Engineering, 2009, v. 35, n. 2, p. 224, doi. 10.1109/TSE.2008.108
- By:
- Publication type:
- Article
Interface Grammars for Modular Software Model Checking.
- Published in:
- IEEE Transactions on Software Engineering, 2008, v. 34, n. 5, p. 614, doi. 10.1109/TSE.2008.72
- By:
- Publication type:
- Article
A New Barrier Certificate for Safety Verification of Hybrid Systems.
- Published in:
- Computer Journal, 2014, v. 57, n. 7, p. 1033, doi. 10.1093/comjnl/bxt059
- By:
- Publication type:
- Article
Test Selection for Hierarchical and Communicating Finite State Machines.
- Published in:
- Computer Journal, 2009, v. 52, n. 3, p. 334, doi. 10.1093/comjnl/bxn027
- Publication type:
- Article
Heuristic-Guided Abstraction Refinement.
- Published in:
- Computer Journal, 2009, v. 52, n. 3, p. 280
- By:
- Publication type:
- Article
Diagnosing Workflow Processes using Woflan.
- Published in:
- Computer Journal, 2001, v. 44, n. 4, p. 246, doi. 10.1093/comjnl/44.4.246
- By:
- Publication type:
- Article
Finite Approximations for Model Checking Non-finite-state Processes.
- Published in:
- Computer Journal, 2001, v. 44, n. 2, p. 109, doi. 10.1093/comjnl/44.2.109
- By:
- Publication type:
- Article
On the Complexity of Some Verification Problems in Process Control Specifications.
- Published in:
- Computer Journal, 1999, v. 42, n. 5, p. 349, doi. 10.1093/comjnl/42.5.349
- By:
- Publication type:
- Article
Reverse Protocol Verification: Concept, Algorithm and Application.
- Published in:
- Computer Journal, 1996, v. 39, n. 6, p. 511, doi. 10.1093/comjnl/39.6.511
- By:
- Publication type:
- Article
Speaker verification using heterogeneous neural network architecture with linear correlation speech activity detection.
- Published in:
- Expert Systems, 2014, v. 31, n. 5, p. 437, doi. 10.1111/exsy.12030
- By:
- Publication type:
- Article
Formal methods, statistical debugging and exploratory analysis in support of system development: Towards a verification and validation calculator tool.
- Published in:
- International Journal of Modeling, Simulation & Scientific Computing, 2016, v. 7, n. 1, p. -1, doi. 10.1142/S1793962316410014
- By:
- Publication type:
- Article
THE EMERGING CHALLENGE: THE VALIDITY OF COMPUTATIONAL ORGANIZATION MODEL AND METHODOLOGY.
- Published in:
- International Journal of Modeling, Simulation & Scientific Computing, 2014, v. 5, n. 1, p. -1, doi. 10.1142/S179396231330001X
- By:
- Publication type:
- Article
A Real-Time Angle- and Illumination-Aware Face Recognition System Based on Artificial Neural Network.
- Published in:
- Applied Computational Intelligence & Soft Computing, 2012, p. 1, doi. 10.1155/2012/274617
- By:
- Publication type:
- Article
Open SystemC Simulator with Support for Power Gating Design.
- Published in:
- International Journal of Reconfigurable Computing, 2012, p. 1, doi. 10.1155/2012/793190
- By:
- Publication type:
- Article
An Algebraic Framework for the Verification of Context-Aware Adaptive Systems.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2015, v. 25, n. 7, p. 1105, doi. 10.1142/S0218194015500199
- By:
- Publication type:
- Article
COMPARING AND IMPROVING THE SYNTHESIS OF STATE-BASED SPECIFICATIONS FROM SCENARIO-BASED SPECIFICATIONS.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2012, v. 22, n. 7, p. 867, doi. 10.1142/S0218194012500234
- By:
- Publication type:
- Article
MODEL CHECKING FOR VERIFICATION OF MANDATORY ACCESS CONTROL MODELS AND PROPERTIES.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2011, v. 21, n. 1, p. 103, doi. 10.1142/S021819401100513X
- By:
- Publication type:
- Article
PROOF SCORE APPROACH TO ANALYSIS OF ELECTRONIC COMMERCE PROTOCOLS.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2010, v. 20, n. 2, p. 253, doi. 10.1142/S0218194010004712
- By:
- Publication type:
- Article
Multiuser-based Gray-level Watermarking Sharing System.
- Published in:
- Journal of Multimedia, 2009, v. 4, n. 6, p. 341, doi. 10.4304/jmm.4.6.341-348
- By:
- Publication type:
- Article
A Systems Engineering Process for Modeling and Simulation.
- Published in:
- ITEA Journal of Test & Evaluation, 2013, v. 34, n. 3, p. 256
- By:
- Publication type:
- Article
Data-Driven T&E: An Essential Element in Verification and Validation of Complex Systems.
- Published in:
- ITEA Journal of Test & Evaluation, 2013, v. 34, n. 3, p. 222
- By:
- Publication type:
- Article
Batch Verification of Short Signatures.
- Published in:
- Journal of Cryptology, 2012, v. 25, n. 4, p. 723, doi. 10.1007/s00145-011-9108-z
- By:
- Publication type:
- Article
Anomaly detection in electronic voting systems.
- Published in:
- Information Design Journal (IDJ), 2013, v. 20, n. 3, p. 194, doi. 10.1075/idj.20.3.01gil
- By:
- Publication type:
- Article
COMPARISON OF SESSION LOGIC WITH SESSION TYPES.
- Published in:
- Studia Universitatis Babes-Bolyai, Informatica, 2016, v. 61, n. 1, p. 54
- By:
- Publication type:
- Article
TEACHING MODEL CHECKING TO UNDERGRADUATES.
- Published in:
- Studia Universitatis Babes-Bolyai, Informatica, 2010, v. 55, n. 1, p. 45
- By:
- Publication type:
- Article
Enabling model checking for collaborative process analysis: from BPMN to ‘Network of Timed Automata’.
- Published in:
- Enterprise Information Systems, 2015, v. 9, n. 3, p. 279, doi. 10.1080/17517575.2013.879211
- By:
- Publication type:
- Article
Workflow process modelling and resource allocation based on polychromatic sets theory.
- Published in:
- Enterprise Information Systems, 2013, v. 7, n. 2, p. 198, doi. 10.1080/17517575.2012.745617
- By:
- Publication type:
- Article
Membership Verification in Authenticating Dynamic Sets.
- Published in:
- International Journal of Online Engineering, 2013, v. 9, n. 5, p. 62, doi. 10.3991/ijoe.v9i5.2973
- By:
- Publication type:
- Article
Hardware Accelerators for Elliptic Curve Cryptography.
- Published in:
- Advances in Radio Science, 2008, v. 6, p. 259, doi. 10.5194/ars-6-259-2008
- By:
- Publication type:
- Article
Estimation of Worst-Case Bandwidth Requirements of Video-on-Demand Systems with Replica Servers using the M/G/∞ Model.
- Published in:
- Journal of Information Science & Engineering, 2014, v. 30, n. 5, p. 1365
- By:
- Publication type:
- Article
An ID-Based Server-Aided Verification Short Signature Scheme Avoid Key Escrow.
- Published in:
- Journal of Information Science & Engineering, 2013, v. 29, n. 3, p. 459
- By:
- Publication type:
- Article
A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation.
- Published in:
- Journal of Information Science & Engineering, 2011, v. 27, n. 2, p. 451
- By:
- Publication type:
- Article
FSM-Based Formal Compliance Verification of Interface Protocols.
- Published in:
- Journal of Information Science & Engineering, 2010, v. 26, n. 5, p. 1601
- By:
- Publication type:
- Article
What Testing Reveals.
- Published in:
- ASHRAE Journal, 2010, v. 52, n. 11, p. B25
- By:
- Publication type:
- Article
Fast and compact self-stabilizing verification, computation, and fault detection of an MST.
- Published in:
- Distributed Computing, 2015, v. 28, n. 4, p. 253, doi. 10.1007/s00446-015-0242-y
- By:
- Publication type:
- Article
Verification of Model Transformations Using Isabelle/HOL and Scala.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 1, p. 45, doi. 10.1007/s10796-018-9860-9
- By:
- Publication type:
- Article
Speaker Verification via Modeling Kurtosis Using Sparse Coding.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2016, v. 30, n. 3, p. -1, doi. 10.1142/S0218001416590084
- By:
- Publication type:
- Article
Geometric and Textural Cues for Automatic Kinship Verification.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2015, v. 29, n. 3, p. -1, doi. 10.1142/S0218001415560017
- By:
- Publication type:
- Article
Risk-Based Approach to Monitoring.
- Published in:
- Applied Clinical Trials, 2012, v. 21, n. 1, p. 50
- By:
- Publication type:
- Article
Comparison of PERSIANN and V7 TRMM Multi-satellite Precipitation Analysis (TMPA) products with rain gauge data over Iran.
- Published in:
- International Journal of Remote Sensing, 2013, v. 34, n. 22, p. 8156, doi. 10.1080/01431161.2013.833360
- By:
- Publication type:
- Article