نتایج جستجو برای: verification rules generation
تعداد نتایج: 543340 فیلتر نتایج به سال:
C programs may dynamically load and unload modules. For example, some operating system kernels support dynamic loading and unloading of device drivers. This causes specific difficulties in the verification of such programs and modules; in particular, it must be verified that no functions or global variables from the module are used after the module is unloaded. We propose a separation-logic-bas...
In recent years we have seen the rise of a new type of software called business rule management systems (BRMS). These are systems to externalize business rules and to provide a facility for centralized business rule management. This addresses an urgent need businesses do have nowadays: to change their business rules in order to adapt to a rapidly business environment, and to overcome the restri...
Various data mining models and/or methods have been proposed to date. A statistical test rule induction method (STRIM) has as one of them, that induces if-then rules hidden in a dataset known the decision table generated based on simple hypothesis. This study improves previous generation model using hypothesis similar human rating and adapt real-world datasets. Specifically, 1) is expanded from...
The principal aim of our research team, called GeLexi, is to legitimate a new sort of generative grammar via verifying its computational implementability. This grammar is more radically “lexicalist” than any earlier one: no phrase structure trees are generated, but word order is accounted for by means of ranked parameters. Another novelty is the extension of “total lexicalism” to morphology: le...
In this paper we will explore the consistent contrast between VV-compounds and non-Wcompounds across seven subgroups of verbs of emotion. The distinctive syntactic features for the contrast include the distribution of the grammatical functions, the cooccrrence restrictions with head nouns and head verbs, the compatibilities with the imperative and evaluative constructions, the aspect, and the t...
Due to increasing applications of extended surfaces as passive methods of cooling, study of thermal behaviors and development of mathematical solutions to nonlinear thermal models of extended surfaces have been the subjects of research in cooling technology over the years. In the thermal analysis of fin, various methods have been applied to solve the nonlinear thermal models. This paper focuses...
To make an event-triggered real-time system safe in application layer, this study presents a specification-based run-time verification (RV) and fault tolerance approach in following steps: i) System is isolated from its environment by modeling interaction between them; ii) Considering safety requirements violation, observation-verification-tolerance rules are systematically obtained; and iii) R...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید