Articles de revues sur le sujet « Computer software Verification »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Computer software Verification ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.
Goerigk, Wolfgang. "Mechanical Software Verification." Electronic Notes in Theoretical Computer Science 58, no. 2 (November 2001): 117–37. http://dx.doi.org/10.1016/s1571-0661(04)00282-8.
Texte intégralKwiatkowska, Marta. "From software verification to ‘everyware’ verification." Computer Science - Research and Development 28, no. 4 (September 7, 2013): 295–310. http://dx.doi.org/10.1007/s00450-013-0249-1.
Texte intégralDobrescu, Mihai, and Katerina Argyraki. "Software dataplane verification." Communications of the ACM 58, no. 11 (October 23, 2015): 113–21. http://dx.doi.org/10.1145/2823400.
Texte intégralMalkis, Alexander, and Anindya Banerjee. "Verification of software barriers." ACM SIGPLAN Notices 47, no. 8 (September 11, 2012): 313–14. http://dx.doi.org/10.1145/2370036.2145871.
Texte intégralHalpern, J. D., S. Owre, N. Proctor, and W. F. Wilson. "Muse—A Computer Assisted Verification System." IEEE Transactions on Software Engineering SE-13, no. 2 (February 1987): 151–56. http://dx.doi.org/10.1109/tse.1987.226477.
Texte intégralFlanagan, Cormac, and Shaz Qadeer. "Predicate abstraction for software verification." ACM SIGPLAN Notices 37, no. 1 (January 2002): 191–202. http://dx.doi.org/10.1145/565816.503291.
Texte intégralGreengard, Samuel. "Formal software verification measures up." Communications of the ACM 64, no. 7 (July 2021): 13–15. http://dx.doi.org/10.1145/3464933.
Texte intégralAndersen, B. Scott, and George Romanski. "Verification of safety-critical software." Communications of the ACM 54, no. 10 (October 2011): 52–57. http://dx.doi.org/10.1145/2001269.2001286.
Texte intégralAndersen, B. Scott, and George Romanski. "Verification of Safety-critical Software." Queue 9, no. 8 (August 2011): 50–59. http://dx.doi.org/10.1145/2016036.2024356.
Texte intégralHailpern, B., and P. Santhanam. "Software debugging, testing, and verification." IBM Systems Journal 41, no. 1 (2002): 4–12. http://dx.doi.org/10.1147/sj.411.0004.
Texte intégralWang, Shihao. "Software Simulation for Hardware/Software Co-Verification." Journal of Computer Research and Development 42, no. 3 (2005): 514. http://dx.doi.org/10.1360/crad20050322.
Texte intégralXu, Jian, Xinai Zhang, Yi Zhao, and Bing Xu. "Verification of Air Data Computer Software using Formal Methods." Journal of Physics: Conference Series 1827, no. 1 (March 1, 2021): 012207. http://dx.doi.org/10.1088/1742-6596/1827/1/012207.
Texte intégralKrämer, Bernd, and Wolfgang Halang. "Computer-Aided Specification and Verification of Process Control Software." IFAC Proceedings Volumes 25, no. 30 (October 1992): 7–12. http://dx.doi.org/10.1016/s1474-6670(17)49399-2.
Texte intégralDing, Zuohua, and Jing Liu. "An Improvement of Software Architecture Verification." Electronic Notes in Theoretical Computer Science 243 (July 2009): 49–67. http://dx.doi.org/10.1016/j.entcs.2009.07.005.
Texte intégralGotlieb, Arnaud. "TCAS software verification using constraint programming." Knowledge Engineering Review 27, no. 3 (July 26, 2012): 343–60. http://dx.doi.org/10.1017/s0269888912000252.
Texte intégralKishi, Tomoji, and Natsuko Noda. "Formal verification and software product lines." Communications of the ACM 49, no. 12 (December 2006): 73–77. http://dx.doi.org/10.1145/1183236.1183270.
Texte intégralGuo, Yinghua, Jill Slay, and Jason Beckett. "Validation and verification of computer forensic software tools—Searching Function." Digital Investigation 6 (September 2009): S12—S22. http://dx.doi.org/10.1016/j.diin.2009.06.015.
Texte intégralAbadi, Martín, and Bruno Blanchet. "Computer-assisted verification of a protocol for certified email." Science of Computer Programming 58, no. 1-2 (October 2005): 3–27. http://dx.doi.org/10.1016/j.scico.2005.02.002.
Texte intégralKhanna, S. "Logic Programming for Software Verification and Testing." Computer Journal 34, no. 4 (April 1, 1991): 350–57. http://dx.doi.org/10.1093/comjnl/34.4.350.
Texte intégralBenoit, Anne, Saurabh K. Raina, and Yves Robert. "Efficient checkpoint/verification patterns." International Journal of High Performance Computing Applications 31, no. 1 (July 28, 2016): 52–65. http://dx.doi.org/10.1177/1094342015594531.
Texte intégralMin, Byungho, and Vijay Varadharajan. "Rethinking Software Component Security: Software Component Level Integrity and Cross Verification." Computer Journal 59, no. 11 (August 10, 2016): 1735–48. http://dx.doi.org/10.1093/comjnl/bxw047.
Texte intégralKajiwara, M., M. Itoh, and H. Ichikawa. "Specification and verification technologies for communication software." IEEE Communications Magazine 23, no. 8 (August 1985): 15–25. http://dx.doi.org/10.1109/mcom.1985.1092633.
Texte intégralThüm, Thomas, Ina Schaefer, Sven Apel, and Martin Hentschel. "Family-based deductive verification of software product lines." ACM SIGPLAN Notices 48, no. 3 (April 10, 2013): 11–20. http://dx.doi.org/10.1145/2480361.2371404.
Texte intégralLi, Shao Feng. "A Study on Network Protocol Validation Based on Timed Automata." Applied Mechanics and Materials 543-547 (March 2014): 3386–90. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3386.
Texte intégralOzkaya, Mert. "Formal Verification of Contractual Software Architectures using SPIN." Malaysian Journal of Computer Science 28, no. 4 (December 1, 2015): 318–37. http://dx.doi.org/10.22452/mjcs.vol28no4.4.
Texte intégralCalinescu, Radu, Carlo Ghezzi, Marta Kwiatkowska, and Raffaela Mirandola. "Self-adaptive software needs quantitative verification at runtime." Communications of the ACM 55, no. 9 (September 2012): 69–77. http://dx.doi.org/10.1145/2330667.2330686.
Texte intégralSacha, Krzysztof. "Verification and implementation of software for dependable controllers." International Journal of Critical Computer-Based Systems 1, no. 1/2/3 (2010): 238. http://dx.doi.org/10.1504/ijccbs.2010.031717.
Texte intégralGagliardi, John. "Medical Device Software: Verification, Validation and Compliance." Biomedical Instrumentation & Technology 45, no. 2 (March 1, 2011): 95. http://dx.doi.org/10.2345/0899-8205-45.2.95.
Texte intégralDyer, M., and A. Kouchakdjian. "Correctness verification: alternative to structural software testing." Information and Software Technology 32, no. 1 (January 1990): 53–59. http://dx.doi.org/10.1016/0950-5849(90)90046-t.
Texte intégralHe, Chaobing. "Verification of Several Important Theorems in Simple Random Sampling Using R Software." Journal of Advance Research in Mathematics And Statistics (ISSN: 2208-2409) 8, no. 12 (December 31, 2021): 01–07. http://dx.doi.org/10.53555/nnms.v8i12.1134.
Texte intégralElqortobi, Mounia, Warda El-Khouly, Amine Rahj, Jamal Bentahar, and Rachida Dssouli. "Verification and testing of safety-critical airborne systems: A model-based methodology." Computer Science and Information Systems 17, no. 1 (2020): 271–92. http://dx.doi.org/10.2298/csis190430040e.
Texte intégralCao, Zongyu, Wanyou Lv, Yanhong Huang, Jianqi Shi, and Qin Li. "Formal Analysis and Verification of Airborne Software Based on DO-333." Electronics 9, no. 2 (February 14, 2020): 327. http://dx.doi.org/10.3390/electronics9020327.
Texte intégralIvančić, Franjo, Sriram Sankaranarayanan, and Chao Wang. "Foreword: Special issue on numerical software verification." Formal Methods in System Design 35, no. 3 (December 2009): 227–28. http://dx.doi.org/10.1007/s10703-009-0090-0.
Texte intégralChaki, Sagar, Edmund Clarke, Joël Ouaknine, Natasha Sharygina, and Nishant Sinha. "Concurrent software verification with states, events, and deadlocks." Formal Aspects of Computing 17, no. 4 (September 21, 2005): 461–83. http://dx.doi.org/10.1007/s00165-005-0071-z.
Texte intégralHinsen, Konrad. "Verifiability in computer-aided research: the role of digital scientific notations at the human-computer interface." PeerJ Computer Science 4 (July 23, 2018): e158. http://dx.doi.org/10.7717/peerj-cs.158.
Texte intégralZhang, Xingjun, Yan Yang, Endong Wang, Ilsun You, and Xiaoshe Dong. "Modelling software fault management with runtime verification." International Journal of Ad Hoc and Ubiquitous Computing 20, no. 1 (2015): 26. http://dx.doi.org/10.1504/ijahuc.2015.071660.
Texte intégralRehman, Waqas Ur, Muhammad Sohaib Ayub, and Junaid Haroon Siddiqui. "Verification of MPI Java programs using software model checking." ACM SIGPLAN Notices 51, no. 8 (November 9, 2016): 1–2. http://dx.doi.org/10.1145/3016078.2851192.
Texte intégralMurrill, Branson W. "Integrating Software Analysis, Testing, and Verification into the Undergraduate Computer Science Curriculum." Computer Science Education 8, no. 2 (August 1998): 85–99. http://dx.doi.org/10.1076/csed.8.2.85.3819.
Texte intégralStaskauskas, M. G. "An experience in the formal verification of industrial software." Communications of the ACM 39, no. 12es (December 1996): 256. http://dx.doi.org/10.1145/272682.272719.
Texte intégralRevesz, Peter Z., and Robert J. Woodward. "Estimating the maximum rise in temperature according to climate models using abstract interpretation." Acta Universitatis Sapientiae, Informatica 11, no. 1 (August 1, 2019): 5–23. http://dx.doi.org/10.2478/ausi-2019-0001.
Texte intégralCurzon, Paul, Rimvydas Rukšėnas, and Ann Blandford. "An approach to formal verification of human–computer interaction." Formal Aspects of Computing 19, no. 4 (June 2, 2007): 513–50. http://dx.doi.org/10.1007/s00165-007-0035-6.
Texte intégralWang, Xiaoyi, Tianyang Yao, and Zhaoyao Shi. "Calibration Method Based on Virtual Gear Artefact for Computer Vision Measuring Instrument of Fine Pitch Gear." Sensors 24, no. 7 (April 3, 2024): 2289. http://dx.doi.org/10.3390/s24072289.
Texte intégralMuñoz-Quijada, Maria, Luis Sanz, and Hipolito Guzman-Miranda. "SW-VHDL Co-Verification Environment Using Open Source Tools." Electronics 9, no. 12 (December 10, 2020): 2104. http://dx.doi.org/10.3390/electronics9122104.
Texte intégralNADOLSKI, V. "VERIFICATION AND VALIDATION OF A COMPUTER COMPUTATIONAL MODEL FOR THE DESIGN OF BUILDING STRUCTURES." Herald of Polotsk State University. Series F. Civil engineering. Applied sciences, no. 2 (June 28, 2024): 42–50. http://dx.doi.org/10.52928/2070-1683-2024-37-2-42-50.
Texte intégralSatin, Lukáš, and Jozef Bílik. "Verification CAE System for Plastic Injection." Applied Mechanics and Materials 834 (April 2016): 79–83. http://dx.doi.org/10.4028/www.scientific.net/amm.834.79.
Texte intégralRay, Arnab, Raoul Jetley, Paul L. Jones, and Yi Zhang. "Model-Based Engineering for Medical-Device Software." Biomedical Instrumentation & Technology 44, no. 6 (November 1, 2010): 507–18. http://dx.doi.org/10.2345/0899-8205-44.6.507.
Texte intégralParizek, P., and F. Plasil. "Assume-guarantee verification of software components in SOFA 2 framework." IET Software 4, no. 3 (2010): 210. http://dx.doi.org/10.1049/iet-sen.2009.0016.
Texte intégralZhang, Min, Kazuhiro Ogata, and Kokichi Futatsugi. "Formalization and Verification of Behavioral Correctness of Dynamic Software Updates." Electronic Notes in Theoretical Computer Science 294 (March 2013): 12–23. http://dx.doi.org/10.1016/j.entcs.2013.02.013.
Texte intégralFerreira, Nelson Guimarães, and Paulo Sérgio Muniz Silva. "Automatic Verification of Safety Rules for a Subway Control Software." Electronic Notes in Theoretical Computer Science 130 (May 2005): 323–43. http://dx.doi.org/10.1016/j.entcs.2005.03.017.
Texte intégralFeinerer, Ingo, and Gernot Salzer. "A comparison of tools for teaching formal software verification." Formal Aspects of Computing 21, no. 3 (June 11, 2008): 293–301. http://dx.doi.org/10.1007/s00165-008-0084-5.
Texte intégral