نتایج جستجو برای: Verification and validation

تعداد نتایج: 16856471  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :the international journal of humanities 2014
mohammad ali khatami firouzabadi

mathematical models have the potential to provide a cost-effective, objective, and flexible approach to assessing management decisions, particularly when these decisions are strategic alternatives. in some instances, mathematical model is the only means available for evaluating and testing alternatives.  however, in order for this potential to be realized, models must be valid for the applicati...

1997
Steven R. Rakitin

Follow up what we will offer in this article about software verification and validation a practitioners guide. You know really that this book is coming as the best seller book today. So, when you are really a good reader or you're fans of the author, it does will be funny if you don't have this book. It means that you have to get this book. For you who are starting to learn about something new ...

2007
Marcus S. Fisher

When writing can change your life, when writing can enrich you by offering much money, why don't you try it? Are you still very confused of where getting the ideas? Do you still have no idea with what you are going to write? Now, you will need reading. A good writer is a good reader at once. You can define how you write depending on what books to read. This software verification and validation ...

2012
Sagar Chaki Arie Gurfinkel Ofer Strichman

Regression verification is the problem of deciding whether two similar programs are equivalent under an arbitrary yet equal context, given some definition of equivalence. So far this problem has only been studied for the case of single-threaded deterministic programs. We present a method for regression verification of multi-threaded programs. Specifically, we develop a proof-rule whose premise ...

2017
Andreas K. Maier Susanne Westphal Tobias Geimer Peter G. Maxim Gregory King Emil Schueler Rebecca Fahrig Billy W. Loo

This paper discusses fast pose verification for radiation therapy on a new high-speed radiation therapy device. The PHASER system follows the idea of 4 generation CT imaging and allows fast 360◦ treatment using a steerable electron beam. Doing so, dose delivery is possible in few seconds. A major problem, however, is fast verification of the patient pose during treatment. In this paper, we sugg...

Journal: :IJHPCA 2008
Jinjun Chen Yun Yang

In grid workflow systems, to verify temporal constraints efficiently at run-time execution stage, some checkpoints are often selected so that we only need to conduct temporal verification at such checkpoints rather than at all activity points. However, existing typical checkpoint selection strategies often ignore some necessary checkpoints and select some unnecessary ones. This would eventually...

2006
Jinjun Chen Yun Yang

In grid workflow systems, existing representative checkpoint selection strategies, which are used to select checkpoints for verifying fixed-time constraints at run-time execution stage, often select some unnecessary checkpoints and ignore some necessary ones. Consequently, overall temporal verification efficiency and effectiveness can be severely impacted. In this paper, we propose a new strate...

Journal: :Electr. Notes Theor. Comput. Sci. 2005
Wan Fokkink Jun Pang

The cones and foci verification method from Groote and Springintveld [12] was extended to timed systems by van der Zwaag [24]. We present an extension of this cones and foci method for timed systems, which can cope with infinite τ -sequences. We prove soundness of our approach and give small verification examples.

Journal: :Games and Economic Behavior 2008
Raymond Deneckere Sergei Severinov

We study implementation in environments where agents have limited ability to imitate others. Agents are randomly and privately endowed with type-dependent sets of messages. So sending a message becomes a partial proof regarding type. For environments where agents can send any combination of available messages, we develop an Extended Revelation Principle and characterize the incentive constraint...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید