Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,071,546 papers from all fields of science
Search
Sign In
Create Free Account
Conformance testing
Known as:
Compliance testing
, Conformance
, Type testing
Conformance testing or type testing is testing to determine whether a product or system or just a medium complies with the requirements of a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Compiler
DeviceNet
Electrical engineering
Electronic engineering
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Application-Aware Secure Multicast for Power Grid Communications
Jianqing Zhang
,
Carl A. Gunter
First IEEE International Conference on Smart Grid…
2010
Corpus ID: 2637788
We propose an application-aware approach to setting up secure multicast groups for power grid communications that automatically…
Expand
Highly Cited
2008
Highly Cited
2008
RACAI’s Linguistic Web Services
D. Tufiș
,
Radu Ion
,
Alexandru Ceausu
,
D. Stefanescu
International Conference on Language Resources…
2008
Corpus ID: 7754921
Nowadays, there are hundreds of Natural Language Processing applications and resources for different languages that are developed…
Expand
Review
2007
Review
2007
Collective choice and community forestry management in Mexico: An empirical analysis
Camille M. Antinori
,
G. Rausser
2007
Corpus ID: 26972883
Abstract Democratic participation has increasingly become a natural resource management policy approach for governments around…
Expand
Highly Cited
2005
Highly Cited
2005
Design for verification for asynchronously communicating Web services
Aysu Betin Can
,
T. Bultan
,
Xiang Fu
The Web Conference
2005
Corpus ID: 9174922
We present a design for verification approach to developing reliable web services. We focus on composite web services which…
Expand
2005
2005
On the robustness of router-based denial-of-service (DoS) defense systems
Ying Xu
,
R. Guérin
CCRV
2005
Corpus ID: 12312737
This paper focuses on "router-based" defense mechanisms, and whether they can provide effective solutions to network Denial-of…
Expand
Highly Cited
2003
Highly Cited
2003
DWARF: an approach for requirements definition and management of data warehouse systems
Fábio Rilston Paim
,
J. Castro
Proceedings. 11th IEEE International Requirements…
2003
Corpus ID: 1637493
In the novel domain of data warehouse systems, software engineers are required to define a solution that integrates with a number…
Expand
Highly Cited
2000
Highly Cited
2000
Optimal streaming of layered video
Despina Saparilla
,
K. Ross
Proceedings IEEE INFOCOM . Conference on Computer…
2000
Corpus ID: 1775458
This paper presents a model and theory for streaming layered video. We model the bandwidth available to the streaming application…
Expand
Highly Cited
2000
Highly Cited
2000
Foundation for Future Database Systems: The Third Manifesto
C. J. Date
,
Hugh Darwen
2000
Corpus ID: 61700949
From the Publisher: A detailed study of the impact of objects and type theory on the relational model of data, including a…
Expand
1999
1999
View De nition and DTD Inference for XML
Bertram Ludäscher
,
Y. Papakonstantinou
,
P. Velikhov
,
V. Vianu
1999
Corpus ID: 17405645
We present a query language and mediator architecture for XML data [XML98b]. The query language, calledXmas (XMLMatching And…
Expand
Highly Cited
1989
Highly Cited
1989
Trace Analysis for Conformance and Arbitration Testing
G. Bochmann
,
R. Dssouli
,
J. Zhao
IEEE Trans. Software Eng.
1989
Corpus ID: 396337
The authors explore a testing approach where the concern for selecting the appropriate test input provided to the implementation…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE