نتایج جستجو برای: verification rules generation

تعداد نتایج: 543340  

Journal: :Science of Computer Programming 2000

Journal: :CoRR 2017
Wiktor B. Daszczuk Maciej Bielecki Jan Michalski

Integrated Model of Distributed Systems (IMDS) is developed for specification and verification of distributed systems, and verification against deadlocks. On the basis of IMDS, Dedan verification environment was prepared. Universal deadlock detection formulas allow for automatic verification, without any knowledge of a temporal logic, which simplifies the verification process. However, the inpu...

Journal: :Journal of Combinatorial Theory, Series A 1999

Journal: :The Journal of Digital Policy and Management 2013

1999
Qiushuang Zhang Ian Harris

Design validation by simulation-based techniques is the most common approach to verification due to the computational complexity of more formal techniques. Validation entails the generation of a test pattern sequence which is applied to the design during simulation to trigger erroneous behavior. Since simulation can only be performed with a small subset of the entire space of test sequences, so...

Journal: :Computer Methods in Applied Mechanics and Engineering 2018

Journal: :Theor. Comput. Sci. 2006
Shiyong Lu Arthur J. Bernstein Philip M. Lewis

Correctness is an important aspect of workflow management systems. However, most of the workflow literature focuses only on the modeling aspects and assumes that a workflow is correct if during the execution it respects the control and data dependency specified by the workflow designer. To address the correctness question properly we propose a new workflow model based on Hoare semantics that al...

Journal: :Int. J. Hum.-Comput. Stud. 1996
Robert Plant Alun D. Preece

As for any software , users of knowledge-based systems (KBS) need to know that they can rely on the system to do its job properly. Assuring the reliability of knowledge-based systems has become an important issue in the development of the knowledge engineering discipline. The processes employed directly to assure the reliability of software are called verification and validation (V & V). Roughl...

2003
Marco Alberti Marco Gavanelli Evelina Lamma Paola Mello Paolo Torroni

In this paper we propose a logic-based approach for the specification and verification of interaction protocols. We give the syntax of the proposed language, declarative and operational semantics of an abductive proof procedure for compliance verification. The proof procedure uses constraints for efficiently dealing with large-scale problems, and is implemented in Constraint Handling Rules. We ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید