Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,270,937 papers from all fields of science
Search
Sign In
Create Free Account
Data validation
Known as:
Validation scheme
, Validation
, Validation routine
Expand
In computer science, data validation is the process of ensuring that a program operates on clean, correct and useful data. It uses routines, often…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
47 relations
.properties
Adobe Flash Player
Architectural pattern
Base One Foundation Component Library (BFC)
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Correctness and security at odds: Post-silicon validation of modern SoC designs
S. Ray
,
Jin Yang
,
A. Basak
,
S. Bhunia
Design Automation Conference
2015
Corpus ID: 6942549
We consider the conflicts between requirements from security and post-silicon validation in SoC designs. Post-silicon validation…
Expand
2010
2010
Distributed Compressive Wideband Spectrum Sensing in Cooperative Multi-Hop Cognitive Networks
Fanzi Zeng
,
Z. Tian
,
Chen Li
IEEE International Conference on Communications
2010
Corpus ID: 2975171
This paper develops a distributed compressed spectrum sensing approach for cooperative wideband multi-hop cognitive radio (CR…
Expand
2009
2009
Reggae: Automated Test Generation for Programs Using Complex Regular Expressions
Nuo Li
,
Tao Xie
,
N. Tillmann
,
J. D. Halleux
,
Wolfram Schulte
IEEE/ACM International Conference on Automated…
2009
Corpus ID: 865200
Test coverage such as branch coverage is commonly measured to assess the sufficiency of test inputs. To reduce tedious manual…
Expand
Review
2008
Review
2008
ADDRESS - Active Demand for the smart grids of the future
R. Belhomme
,
R. C. R. D. Asua
,
+4 authors
A. Losi
2008
Corpus ID: 54831372
The ADDRESS European project aims to deliver a comprehensive commercial and technical framework for the development of "active…
Expand
Highly Cited
2003
Highly Cited
2003
Applying the semantic Web layers to access control
Mariemma Inmaculada Yagüe del Valle
,
A. Maña
,
Javier López
,
J. M. Troya
14th International Workshop on Database and…
2003
Corpus ID: 3793268
The Semantic Web, also known as the Web of meaning, is considered the new generation of the Web. Its objective is to enable…
Expand
Highly Cited
2001
Highly Cited
2001
Customizing PRM roadmaps at query time
Guang Song
,
Shawna Miller
,
N. Amato
Proceedings ICRA. IEEE International Conference…
2001
Corpus ID: 12232264
We propose an approach for building and querying probabilistic roadmaps. In the roadmap construction stage, we build coarse…
Expand
Review
2001
Review
2001
Quality management initiatives in Hong Kong ’ s banking industry : A longitudinal study
iande
,
Hao
2001
Corpus ID: 3948267
As an international ® nancial center, the banking industry in Hong Kong (HK) plays a signi® cant role. Because of increasingly…
Expand
Highly Cited
2000
Highly Cited
2000
Optimization-Based Inverse Simulation of a Helicopter Slalom Maneuver
R. Celi
2000
Corpus ID: 15875861
Aninversesimulation methodology based on numericaloptimizationis presented. Themethodology isapplied to a simplie ed version of…
Expand
Highly Cited
1995
Highly Cited
1995
Specification and validation methods
Y. Gurevich
Specification and validation methods
1995
Corpus ID: 42382155
Inevitably, reading is one of the requirements to be undergone. To improve the performance and quality, someone needs to have…
Expand
Review
1983
Review
1983
Review of Stirling-engine mathematical models
N. Chen
,
F. P. Griffin
1983
Corpus ID: 58229806
A review of existing mathematical models for Stirling engine thermodynamic analysis has been performed. Twenty-five models were…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE