نتایج جستجو برای: verification and validation

تعداد نتایج: 16856471  

Journal: :journal of advances in computer research 2010
h. motameni i. daneshfar j. bakhshi h. nematzadeh

uml is known as one of the most common methods in software engineering.since this language is semi-formal, many researches and efforts have beenperformed to transform this language into formal methods including petri nets.thus, the operation of verification and validation of the qualitative and nonfunctionalparameters could be achieved with more ability. since the majority of thereal world info...

2007
Chris Tseng Agustin Araya

VALIDATION AND VERIFICATION OF AIRCRAFT CONTROL SOFTWARE FOR CONTROL IMPROVEMENT

2012
David Eddy david Cohen Kenny Shum

Journal: :IEEE Software 2003
Jorge Rady de Almeida João Batista Camargo Bruno Abrantes Basseto Sérgio Miranda Paz

0 7 4 0 7 4 5 9 / 0 3 / $ 1 7 . 0 0 © 2 0 0 3 I E E E damage. But even if the software does exactly what it was specified to do, it still might not be safe if the operation scenario was unknown or not previously evaluated.1 The verification of all important aspects of safety-critical systems is obligatory, because it can save human lives and material resources.2 An important part of safety anal...

1992
Babis Theodoulidis Petros Alexakis Pericles Loucopoulos

In this paper the development of an analysis tool for verification and validation of temporal business rules is described. The formalism for expressing the business rules is the Conceptual Rule Language developed as part for the ESPRIT II project TEMPORA.

2006
Irene Barberia

Spanish does not allow vowel deletion in unstressed syllables the way languages like English do. However, it may occur in contexts of VV-sequences across word boundaries, under durational reduction in connected speech. This paper explores the effects of vowel deletion on the perception of [-high] vowel sequences on 8 native speakers of Peninsular Spanish. The results are then compared to the sp...

2007
Pietro Coli Gian Luca Marcialis Fabio Roli

Although fingerprint verification systems reached a high degree of accuracy, it has been recently shown that they can be circumvented by “fake fingers”, namely, fingerprint images coming from stamps reproducing an user fingerprint, which is processed as an “alive” one. Several methods have been proposed for facing with this problem, but the issue is far from a final solution. Since the problem ...

2014
Markus Völter

of keynote speech at MoDeVVa 2014

Journal: :Softwaretechnik-Trends 2011
Markus Gebhardt Axel Kaske

The following article will have a look on methods for validation and verification of software requested for safety related systems by ISO26262 (1) (or similar standards) and will point out how some dedicated tools from ETAS may help to fulfill and implement these. A brief introduction into the underlying technology will be given in order to discuss the aspects/use cases where these tools can be...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید