نتایج جستجو برای: verification rules generation
تعداد نتایج: 543340 فیلتر نتایج به سال:
Rybu: Imperative-style Preprocessor for Verification of Distributed Systems in the Dedan Environment
Integrated Model of Distributed Systems (IMDS) is developed for specification and verification of distributed systems, and verification against deadlocks. On the basis of IMDS, Dedan verification environment was prepared. Universal deadlock detection formulas allow for automatic verification, without any knowledge of a temporal logic, which simplifies the verification process. However, the inpu...
Design validation by simulation-based techniques is the most common approach to verification due to the computational complexity of more formal techniques. Validation entails the generation of a test pattern sequence which is applied to the design during simulation to trigger erroneous behavior. Since simulation can only be performed with a small subset of the entire space of test sequences, so...
Correctness is an important aspect of workflow management systems. However, most of the workflow literature focuses only on the modeling aspects and assumes that a workflow is correct if during the execution it respects the control and data dependency specified by the workflow designer. To address the correctness question properly we propose a new workflow model based on Hoare semantics that al...
As for any software , users of knowledge-based systems (KBS) need to know that they can rely on the system to do its job properly. Assuring the reliability of knowledge-based systems has become an important issue in the development of the knowledge engineering discipline. The processes employed directly to assure the reliability of software are called verification and validation (V & V). Roughl...
In this paper we propose a logic-based approach for the specification and verification of interaction protocols. We give the syntax of the proposed language, declarative and operational semantics of an abductive proof procedure for compliance verification. The proof procedure uses constraints for efficiently dealing with large-scale problems, and is implemented in Constraint Handling Rules. We ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید