Showing 1 - 20 of 3,523

1

Program Verification: Vision and Reality.
Vardi, Moshe Y.
Communications of the ACM. Jul2021, Vol. 64 Issue 7, p5-5. 1p.

Computer software Computer programming Cost effectiveness Parallel computer progra... Machine learning
Journal
2

Formalization of a Parameterized Parallel Adder within the Coq Theorem Prover.
Gang Chen
IEEE Transactions on Computer-Aided Design of Integrated Circuits & Systems. Jan2010, Vol. 29 Issue 1, p149-153. 5p. 1 Graph.

Parameter estimation Integrated circuits Parallel computer progra... Computer arithmetic Formal methods (Computer...
Academic journal
3

Flexible and configurable verification policies with Omnibus
Wilson, Thomas ; Maharaj, Savi ; Clark, Robert ; et al.
Software & Systems Modeling. 7:257-272

Omnibus (Computer progra... 0202 electrical engineer... 0102 computer and inform... 02 engineering and techn... 01 natural sciences Computer program Verific...
Academic journal
4

Verifying Programs Using Abstraction and Theorem Proving.
Junyan Qian ; Baowen Xu
International MultiConference of Engineers & Computer Scientists 2007 (Volume 1). 2007, p1044-1049. 6p. 1 Chart.

Automatic theorem provin... Abstract thought Software verification Parallel computer progra... Computer software
Book
5

Fingerprint verification using ridge direction distribution and minutiae correspondence.
Wakahara, Toru ; Kimura, Yoshimasa ; Suzuki, Akira ; et al.
Systems & Computers in Japan. 3/1/2007, Vol. 38 Issue 3, p72-82. 11p. 1 Black and White Photograph, 1 Chart, 1 Graph.

Human fingerprints Anthropometry Imaging systems Combinatorics Parallel computer progra... Software verification
Academic journal
6

9th Annual Review of Progress in Applied Computational Electromagnetics at the Naval Postgraduate School, Monterey, CA, March 22-26, 1993, Conference Proceedings
Office of University Communications

software engineering electromagnetic scatteri... antenna radiation patter... computerized simulation electromagnetic fields symposia
Conference
7

Stochastic Modelling of Communication Protocols from Source Code
Smith, Michael J.A.
ENTCS: Electronic Notes in Theoretical Computer Science. Sep2007, Vol. 190 Issue 3, p129-145. 17p.

Source code Parallel computer progra... Stochastic processes Linear algebra Integer programming
Journal
8

FORMAL MODELING, MONITORING, AND CONTROL OF EMERGENCE IN DISTRIBUTED CYBER PHYSICAL SYSTEMS
Johnson,Taylor T ; University of Texas at Arlington Arlington United States

Computer Programming and... Computer Systems Managem... MACHINE LEARNING AUTONOMOUS MACHINE BEHAV... MULTIAGENT SYSTEMS DRONES
Academic journal
9

A library of failure regions
Shimeall, Timothy J. ; Computer Science (CS) ; Naval Postgraduate School (U.S.) ; et al.

Software Testing Software Experiments Failure Conditions Reachability Error Generation Error Propagation
Report
10

SECURE MATHEMATICALLY- ASSURED COMPOSITION OF CONTROL MODELS
Cofer,Darren ; Backes,John ; Gacek,Andrew ; et al.

Computer Programming and... Computer Systems Managem... denial of service attack cyberattacks computer access control COMPUTER PROGRAM VERIFIC...
Academic journal
11

Verified compilation of Concurrent Managed Languages
Jagannathan,Suresh ; Vitek,Jan ; Purdue University West Lafayette United States

Computer Programming and... COMPUTER PROGRAM VERIFIC... methodology PROGRAMMING LANGUAGES reasoning Program verification
Academic journal
12

TEAMBLOCKS: HYBRID ABSTRACTIONS FOR PROVABLE MULTI-AGENT AUTONOMY
Kingston,Peter ; Martin,Patrick ; BAE Systems AIT Burlington United States

Computer Programming and... MULTIAGENT SYSTEMS COMPUTER PROGRAM VERIFIC... differential equations computer simulations unmanned underwater vehi...
Academic journal
13

Kleene Algebra and Bytecode Verification
Kozen,Dexter ; Kot,Lucja ; Cornell University Ithaca United States

COMPUTER PROGRAM VERIFIC... java programming languag... transfer functions BYTECODE STATIC ANALYSIS ABSTRACT INTERPRETATION
Academic journal
14

Design Concepts for Automating Maintenance Instructions
Badler, Norman I ; Erignac, Charles A ; McDonald, Patrick Vincent ; et al.

aircraft maintenance Databases and Informatio... data acquisition Computer Sciences 9. Industry and infrastr... air force personnel
Report
15

Information Flow Integrity for Systems of Independently-Developed Components
Jaeger, Trent ; Ganapathy, Vinod ; Jha, Somesh ; et al.
DTIC

Computer Programming and... Computer Systems Managem... COMPUTER ACCESS CONTROL COMPUTER NETWORK SECURIT... COMPUTER PROGRAMS COMPUTER PROGRAM VERIFIC...
Academic journal
16

Compositional Verification with Abstraction, Learning, and SAT Solving
Komuravelli, Anvesh ; CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE
DTIC

Statistics and Probabili... Computer Programming and... Computer Systems OPERATING SYSTEMS(COMPUT... REASONING SCALE MODELS
Academic journal
17

Crema
Reilly, Karen ; Torrey, Jacob ; Frank, Jared ; et al.
DTIC

Computer Programming and... Computer Systems Managem... C PROGRAMMING LANGUAGE COMPUTER PROGRAM VERIFIC... COMPUTER NETWORK SECURIT... DEBUGGING(COMPUTERS)
Academic journal
18

Advanced Development of Certified OS Kernels
Shao, Zhong ; YALE UNIV NEW HAVEN CT
DTIC

Computer Programming and... Computer Systems COMPUTER LOGIC COMPUTER PROGRAM VERIFIC... KERNEL FUNCTIONS SOFTWARE ENGINEERING
Academic journal
19

Computational Homology for Software Validation
Blair, Howard A ; SYRACUSE UNIV NY DEPT OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE
DTIC

Operations Research Computer Programming and... COMPUTER PROGRAM VERIFIC... CONVERGENCE SOFTWARE ENGINEERING TOPOLOGY
Academic journal
20

Model Checking with Multi-Threaded IC3 Portfolios
Chaki, Sagar ; Karimi, Derrick ; CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST
DTIC

Operations Research Computer Programming and... ALGORITHMS COMPUTER PROGRAM VERIFIC... MATHEMATICAL MODELS PARALLEL PROCESSING
Academic journal

Filter