Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,974,637 papers from all fields of science
Search
Sign In
Create Free Account
Formal verification
Known as:
Verifiable
, Formal
, Verifiability
Expand
In the context of hardware and software systems, formal verification is the act of proving or disproving the correctness of intended algorithms…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
ACM Turing Award
Alphard (programming language)
Application-specific integrated circuit
Arvind (computer scientist)
Expand
Broader (2)
Formal methods
Theoretical computer science
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Lightweight authentication of linear algebraic queries on data streams
Stavros Papadopoulos
,
Graham Cormode
,
Antonios Deligiannakis
,
Minos N. Garofalakis
ACM SIGMOD Conference
2013
Corpus ID: 9141427
We consider a stream outsourcing setting, where a data owner delegates the management of a set of disjoint data streams to an…
Expand
2012
2012
Integrity Verification of Multiple Data Copies over Untrusted Cloud Servers
Ayad F. Barsoum
,
M. Hasan
IEEE/ACM International Symposium on Cluster…
2012
Corpus ID: 13246323
For an increased level of scalability, availability and durability, some customers may want their data to be replicated on…
Expand
2008
2008
Statistical optimization of xylanase production by Aspergillus niger AN-13 under submerged fermentation using response surface methodology
Yu Cao
,
De-jing Meng
,
Jian Lu
,
Jie Long
2008
Corpus ID: 54806536
Response surface methodology (RSM) was performed to evaluate the effects of cultivation time, pH and substrate concentration on…
Expand
2008
2008
Coercion-Resistant Tallying for STV Voting
Vanessa Teague
,
Kim Ramchen
,
L. Naish
USENIX Workshop on Accurate Electronic Voting…
2008
Corpus ID: 8920237
There are many advantages to voting schemes in which voters rank all candidates in order, rather than just choosing their…
Expand
Highly Cited
2004
Highly Cited
2004
Can we contain Internet worms
Manuel Costa
,
J. Crowcroft
,
M. Castro
,
A. Rowstron
2004
Corpus ID: 8391329
Worm containment must be automatic because worms can spread too fast for humans to respond. Recent work has proposed a network…
Expand
2003
2003
Constrained optimal control via multiparametric quadraticprogramming
P. Tøndel
2003
Corpus ID: 10455436
The standard way of solving a mathematical program, is to feed the program into some numerical solver, which usually is custom…
Expand
1999
1999
Formal verification of an advanced pipelined machine
J. Sawada
,
W. Hunt
,
D. Fussell
1999
Corpus ID: 60555280
The objective in this dissertation is to demonstrate that we can formally verify the correctness of a microprocessor with complex…
Expand
1995
1995
Realization of autonomous decentralized computing with the RTO.k object structuring scheme and the HU-DF inter-process-group communication scheme
Kane Kim
,
Uci
,
+5 authors
Japan.
Proceedings ISADS 95. Second International…
1995
Corpus ID: 16379286
The autonomy of various subsystems in complex real-time distributed computer systems is a highly desired attribute. Highly…
Expand
1980
1980
Verification of timing constraints on large digital systems
T. McWilliams
Design Automation Conference
1980
Corpus ID: 53235092
A new approach to the verification of the timing constraints on large digital systems has been developed. The associated…
Expand
1973
1973
Dynamic verification of operating system decisions
R. S. Fabry
CACM
1973
Corpus ID: 14689700
Dynamic verification of a decision implies that every time the decision is made there is a consistency check performed on the…
Expand