Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,461,310 papers from all fields of science
Search
Sign In
Create Free Account
Data validation
Known as:
Validation scheme
, Validation
, Validation routine
Expand
In computer science, data validation is the process of ensuring that a program operates on clean, correct and useful data. It uses routines, often…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
47 relations
.properties
Adobe Flash Player
Architectural pattern
Base One Foundation Component Library (BFC)
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Correctness and security at odds: Post-silicon validation of modern SoC designs
S. Ray
,
Jin Yang
,
A. Basak
,
S. Bhunia
Design Automation Conference
2015
Corpus ID: 6942549
We consider the conflicts between requirements from security and post-silicon validation in SoC designs. Post-silicon validation…
Expand
Highly Cited
2013
Highly Cited
2013
Supporting swift reaction: Automatically uncovering performance problems by systematic experiments
Alexander Wert
,
J. Happe
,
Lucia Happe
International Conference on Software Engineering
2013
Corpus ID: 9379359
Performance problems pose a significant risk to software vendors. If left undetected, they can lead to lost customers, increased…
Expand
2011
2011
Valuing the priceless: What are non-marketed products worth
S. Wunder
,
Luckert
,
C. Smith-Hall
2011
Corpus ID: 55081580
2009
2009
Reggae: Automated Test Generation for Programs Using Complex Regular Expressions
Nuo Li
,
Tao Xie
,
N. Tillmann
,
J. D. Halleux
,
Wolfram Schulte
IEEE/ACM International Conference on Automated…
2009
Corpus ID: 865200
Test coverage such as branch coverage is commonly measured to assess the sufficiency of test inputs. To reduce tedious manual…
Expand
Review
2008
Review
2008
ADDRESS - Active Demand for the smart grids of the future
R. Belhomme
,
R. C. R. D. Asua
,
+4 authors
A. Losi
2008
Corpus ID: 54831372
The ADDRESS European project aims to deliver a comprehensive commercial and technical framework for the development of "active…
Expand
Highly Cited
2004
Highly Cited
2004
A Web Service Architecture for Enforcing Access Control Policies
C. Ardagna
,
E. Damiani
,
S. Vimercati
,
P. Samarati
VODCA@FOSAD
2004
Corpus ID: 4047184
Highly Cited
2003
Highly Cited
2003
Applying the semantic Web layers to access control
Mariemma Inmaculada Yagüe del Valle
,
A. Maña
,
Javier López
,
J. M. Troya
14th International Workshop on Database and…
2003
Corpus ID: 3793268
The Semantic Web, also known as the Web of meaning, is considered the new generation of the Web. Its objective is to enable…
Expand
Highly Cited
2001
Highly Cited
2001
Customizing PRM roadmaps at query time
Guang Song
,
Shawna Miller
,
N. Amato
Proceedings ICRA. IEEE International Conference…
2001
Corpus ID: 12232264
We propose an approach for building and querying probabilistic roadmaps. In the roadmap construction stage, we build coarse…
Expand
Highly Cited
2000
Highly Cited
2000
Optimization-Based Inverse Simulation of a Helicopter Slalom Maneuver
R. Celi
2000
Corpus ID: 15875861
Aninversesimulation methodology based on numericaloptimizationis presented. Themethodology isapplied to a simplie ed version of…
Expand
1989
1989
A validation study of the DES in the Netherlands.
B. Ensink
,
D. V. Otterloo
1989
Corpus ID: 151821943
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE