Výsledky vyhledávání - "COMPUTER PROGRAM VERIFICATION"
-
1
Autoři: Vardi, Moshe Y.1 vardi@cs.rice.edu
Zdroj: Communications of the ACM. Jul2021, Vol. 64 Issue 7, p5-5. 1p.
-
2
Autoři:
Zdroj: International Journal of Parallel, Emergent & Distributed Systems. Dec2016, Vol. 31 Issue 6, p543-561. 19p.
-
3
Autoři: Gang Chen1 gang.chen@lingcore.com
Zdroj: IEEE Transactions on Computer-Aided Design of Integrated Circuits & Systems. Jan2010, Vol. 29 Issue 1, p149-153. 5p. 1 Graph.
-
4
On-the-fly parallel model checking algorithm that is optimal for verification of weak LTL properties
Autoři:
Zdroj: Science of Computer Programming. Oct2012, Vol. 77 Issue 12, p1272-1288. 17p.
-
5
Autoři: a další
Přispěvatelé: a další
Zdroj: Software & Systems Modeling. 7:257-272
Témata: Omnibus (Computer program language), 0202 electrical engineering, electronic engineering, information engineering, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, Computer program Verification
Popis souboru: application/pdf
Přístupová URL adresa: http://dspace.stir.ac.uk/bitstream/1893/3679/1/WilsonMaharajClark.pdf
https://link.springer.com/10.1007/s10270-007-0060-1
https://link.springer.com/article/10.1007%2Fs10270-007-0060-1
https://dspace.stir.ac.uk/bitstream/1893/3679/1/WilsonMaharajClark.pdf
https://dblp.uni-trier.de/db/journals/sosym/sosym7.html#WilsonMC08
https://dspace.stir.ac.uk/handle/1893/3679 -
6
Autoři:
Zdroj: International MultiConference of Engineers & Computer Scientists 2007 (Volume 1). 2007, p1044-1049. 6p. 1 Chart.
Témata: Automatic theorem proving, Abstract thought, Software verification, Parallel computer program verification, Computer software
-
7
Autoři: a další
Zdroj: Computational Mechanics; Oct2009, Vol. 44 Issue 4, p493-504, 12p, 3 Diagrams, 4 Charts, 4 Graphs
-
8
Autoři: a další
Zdroj: Systems & Computers in Japan. 3/1/2007, Vol. 38 Issue 3, p72-82. 11p. 1 Black and White Photograph, 1 Chart, 1 Graph.
-
9
Přispěvatelé: Office of University Communications
Témata: software engineering, electromagnetic scattering, antenna radiation patterns, computerized simulation, electromagnetic fields, symposia, neural nets, finite element analysis, integrated circuits, radar cross sections, electromagnetic interference, computer graphics, data displays, computer program verification, method of moments, electromagnetic compatibility
Popis souboru: application/pdf
Relation: https://hdl.handle.net/10945/45291
Dostupnost: https://hdl.handle.net/10945/45291
-
10
Autoři: Smith, Michael J.A.1 M.J.A.Smith@sms.ed.ac.uk
Zdroj: ENTCS: Electronic Notes in Theoretical Computer Science. Sep2007, Vol. 190 Issue 3, p129-145. 17p.
-
11
Autoři:
Zdroj: Astrophysical Journal. 5/20/2017, Vol. 841 Issue 1, p1-1. 1p.
Témata: *PARALLEL computer program verification, *PHOTOMETRY, *STELLAR luminosity function, *ELLIPTICAL galaxies
Korporace: HUBBLE Space Telescope (Spacecraft)
-
12
Autoři:
Přispěvatelé:
Témata: Computer Programming and Software, Computer Systems Management and Standards, MACHINE LEARNING, AUTONOMOUS MACHINE BEHAVIOR, MULTIAGENT SYSTEMS, DRONES, SATELLITE CONSTELLATIONS, VULNERABILITY, COMPUTER SECURITY, COMPUTER PROGRAM VERIFICATION, CONTROL SYSTEMS, CYBERATTACKS, Formal methods, emergent behavior, DCPS (distributed cyber-physical systems)
Popis souboru: text/html
-
13
Autoři: a další
Přispěvatelé: a další
Témata: Computer Programming and Software, Computer Systems Management and Standards, denial of service attack, cyberattacks, computer access control, COMPUTER PROGRAM VERIFICATION, software development, control systems engineering, system software, operating systems, debugging, computer security, Cybersecurity, software assurance, formal methods, smaccm(Secure Mathematically-Assured Composition of Control Models), manag, archi
Dostupnost: http://www.dtic.mil/docs/citations/AD1039782
-
14
Autoři:
Přispěvatelé:
Témata: Computer Programming and Software, COMPUTER PROGRAM VERIFICATION, methodology, PROGRAMMING LANGUAGES, reasoning, Program verification, compiler design, concurrency, memory models, theorem proving, garbage collection, java memory model
Popis souboru: text/html
-
15
Autoři:
Přispěvatelé:
Témata: Computer Programming and Software, MULTIAGENT SYSTEMS, COMPUTER PROGRAM VERIFICATION, differential equations, computer simulations, unmanned underwater vehicles, unmanned aerial vehicles, fixed wing aircraft, control systems, algorithms, hybrid systems, information systems, automata, V and V(Verification and validation), autonomy, LTL(Linear Temporal Logic), SOS(SUM of Squares), cps(cyber-physical systems)
Popis souboru: text/html
-
16
Autoři: a další
Přispěvatelé: a další
Témata: Software Testing, Software Experiments, Failure Conditions, Reachability, Error Generation, Error Propagation, COMPUTER PROGRAM VERIFICATION
Popis souboru: NA; application/pdf
Relation: NA; https://hdl.handle.net/10945/29366
Dostupnost: https://hdl.handle.net/10945/29366
-
17
Autoři: a další
Témata: aircraft maintenance, Databases and Information Systems, data acquisition, Computer Sciences, 9. Industry and infrastructure, air force personnel, instruction manuals, technology assessment, computer program verification, computer aided instruction, 12. Responsible consumption, Engineering, maintenace management, Graphics and Human Computer Interfaces, data management, automation
Popis souboru: application/pdf
-
18
Autoři:
Přispěvatelé:
Témata: COMPUTER PROGRAM VERIFICATION, java programming language, transfer functions, BYTECODE, STATIC ANALYSIS, ABSTRACT INTERPRETATION, KLEENE ALGEBRA, JAVA BYTECODE VERIFICATION
Popis souboru: text/html
-
19
Autoři: a další
Přispěvatelé: a další
Zdroj: DTIC
Témata: Computer Programming and Software, Computer Systems Management and Standards, COMPUTER ACCESS CONTROL, COMPUTER NETWORK SECURITY, COMPUTER PROGRAMS, COMPUTER PROGRAM VERIFICATION, COMPUTER VIRUSES, HACKING(COMPUTER SECURITY), INFORMATION ASSURANCE, INFORMATION EXCHANGE, INTERNET, INTRUSION DETECTION(COMPUTERS), KERNEL FUNCTIONS, NETWORK FLOWS, OPERATING SYSTEMS(COMPUTERS), PROGRAMMING LANGUAGES, SOFTWARE ENGINEERING, VULNERABILITY, CONFUSED DEPUTY ATTACKS, CODE REUSE ATTACKS, RETROFITTING LEGACY CODES, WEB BROWSERS, OPERATING SYSTEM KERNELS, ATTACK SURFACES, ACCESS CONTROL, PRIVILEGE SEPARATION, INFORMATION SLOW, CONTROL-FLOW INTEGRITY, info, geo
Dostupnost: http://www.dtic.mil/docs/citations/ADA621545
-
20
Autoři:
Přispěvatelé:
Zdroj: DTIC
Témata: Statistics and Probability, Computer Programming and Software, Computer Systems, OPERATING SYSTEMS(COMPUTERS), REASONING, SCALE MODELS, SOFTWARE TOOLS, SYSTEMS ANALYSIS, ALGORITHMS, APPROXIMATION(MATHEMATICS), COMPUTER PROGRAM VERIFICATION, DECISION MAKING, DECOMPOSITION, INVARIANCE, LEARNING, LOGIC, MONOLITHIC STRUCTURES(ELECTRONICS), NUMERICAL METHODS AND PROCEDURES, PARALLEL ORIENTATION, POLYNOMIALS, PROBABILITY, RECURSIVE FUNCTIONS, SAFETY, THESES, MODEL CHECKING, PROOF, COUNTEREXAMPLES, SAT(SATISFIABILITY), SMT(SAT MODULO THEORIES), ORACLE
Popis souboru: text/html
Full Text Finder
Nájsť tento článok vo Web of Science