Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,247,804 papers from all fields of science
Search
Sign In
Create Free Account
Formal verification
Known as:
Verifiable
, Formal
, Verifiability
Expand
In the context of hardware and software systems, formal verification is the act of proving or disproving the correctness of intended algorithms…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
ACM Turing Award
Alphard (programming language)
Application-specific integrated circuit
Arvind (computer scientist)
Expand
Broader (2)
Formal methods
Theoretical computer science
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Mobile Agent Security Using Reference Monitor Based Security Framework
S. Armoogum
,
N. Mohamudally
,
N. Nissanke
International Conference on Emerging Security…
2015
Corpus ID: 63073611
: In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially…
Expand
2007
2007
Design of Wide-Band Semi-Lumped Bandpass Filters Using Open Split Ring Resonators
J. Martel
,
J. Bonache
,
R. Marqués
,
F. Martín
,
F. Medina
IEEE Microwave and Wireless Components Letters
2007
Corpus ID: 20513274
Open split ring resonators (OSRRs) are used in this letter to design wide-band semi-lumped bandpass filters. OSRRs work as lumped…
Expand
Highly Cited
2006
Highly Cited
2006
Control with building mass-Part I: Thermal response model
P. Armstrong
,
S. Leeb
,
L. Norford
2006
Corpus ID: 15145609
In this paper we derive a general model and reliable identification procedures that can be applied autonomously for on-line…
Expand
2005
2005
Designated-Verifier Proxy Signature Schemes
Guilin Wang
IFIP International Information Security…
2005
Corpus ID: 2158379
In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign…
Expand
Highly Cited
2004
Highly Cited
2004
Can we contain Internet worms
Manuel Costa
,
J. Crowcroft
,
M. Castro
,
A. Rowstron
2004
Corpus ID: 8391329
Worm containment must be automatic because worms can spread too fast for humans to respond. Recent work has proposed a network…
Expand
1999
1999
An Executable Specification and Verifier for Relaxed Memory Order
Seungjoon Park
,
D. Dill
IEEE Trans. Computers
1999
Corpus ID: 7197208
The Mur/spl psi/ description language and verification system for finite-state concurrent systems is applied to the problem of…
Expand
Highly Cited
1994
Highly Cited
1994
Methodology and System for Practical Formal Verification of Reactive Hardware
I. Beer
,
Shoham Ben-David
,
D. Geist
,
R. Gewirtzman
,
M. Yoeli
International Conference on Computer Aided…
1994
Corpus ID: 14388852
Making formal verification a practicality in industrial environments is still difficult. The capacity of most verification tools…
Expand
Highly Cited
1988
Highly Cited
1988
Reality of chaos in the double scroll circuit: A computer-assisted proof
T. Matsumoto
,
L. Chua
,
K. Ayaki
1988
Corpus ID: 122884153
The authors prove three key inequalities stated in the paper by L.O. Chua, M. Komouro, and T. Matsumoto (see ibid., vol. CAS-33…
Expand
Highly Cited
1979
Highly Cited
1979
The Application of Program Verification to Hardware Verification
J. Darringer
Design Automation Conference
1979
Corpus ID: 2868074
The growing complexity of machine designs and costs of engineering changes are increasing the demand for tools and methods to…
Expand
1973
1973
Dynamic verification of operating system decisions
R. S. Fabry
CACM
1973
Corpus ID: 14689700
Dynamic verification of a decision implies that every time the decision is made there is a consistency check performed on the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE