Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,017,894 papers from all fields of science
Search
Sign In
Create Free Account
Software verification
Known as:
Verification
Software verification is a discipline of software engineering whose goal is to assure that software fully satisfies all the expected requirements…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
ACM Transactions on Programming Languages and Systems
Anti-pattern
Artur d'Avila Garcez
Attack Surface Analyzer
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
PENGARUH PENERAPAN PERIKLANAN DI INTERNET DAN PEMASARAN MELALUI E-MAIL PRODUK UMKM DI WILAYAH DEPOK
Mujiyana Mujiyana
,
Lana Sularto
,
M. Mukhyi
2013
Corpus ID: 109230353
Dewasa ini peran internet bukan hanya sebagai sarana mencari informasi, tapi juga mempunyai potensi besar sebagai media pemasaran…
Expand
2010
2010
Software verification for TinyOS
Doina Bucur
,
M. Kwiatkowska
International Symposium on Information Processing…
2010
Corpus ID: 10256415
We describe the first software tool for the verification of TinyOS 2, MSP430 applications at compile-time. Given assertions upon…
Expand
2010
2010
ACPT: A Tool for Modeling and Verifying Access Control Policies
JeeHyun Hwang
,
Tao Xie
,
Vincent C. Hu
,
Mine Altunay
IEEE International Symposium on Policies for…
2010
Corpus ID: 8509560
Access control mechanisms are a widely adopted technology for information security. Since access decisions (i.e., permit or deny…
Expand
2007
2007
Properties Incompleteness Evaluation by Functional Verification
A. Fedeli
,
F. Fummi
,
G. Pravadelli
IEEE transactions on computers
2007
Corpus ID: 14756408
Verification engineers cannot guarantee the correctness of the system implementation by model checking if the set of proven…
Expand
2007
2007
A flexible security architecture to support third-party applications on mobile devices
Lieven Desmet
,
W. Joosen
,
+4 authors
Dries Vanoverberghe
Workshop on Computer Security Architecture
2007
Corpus ID: 393818
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable…
Expand
2006
2006
Sketch Transit Modeling Based on 2000 Census Data
N. Marshall
,
Brian Grady
2006
Corpus ID: 38128288
Transit planners need cost-effective ways to evaluate a wide range of alternatives relatively quickly to identify potential…
Expand
2006
2006
Software verification for programmable logic controllers
Ralf Huuck
2006
Corpus ID: 42156266
Programmable logic controllers (PLCs) occupy a big share in automation control. Their programming languages are, however, born…
Expand
Highly Cited
2005
Highly Cited
2005
LusSy: a toolbox for the analysis of systems-on-a-chip at the transactional level
M. Moy
,
F. Maraninchi
,
L. Maillet-Contoz
International Conference on Application of…
2005
Corpus ID: 2457667
We describe a toolbox for the analysis of systems-on-a-chip described in SystemC at the transactional level. The tools are able…
Expand
Review
1996
Review
1996
Formal Synthesis in Circuit Design - A Classification and Survey
Ramayya Kumar
,
C. Blumenröhr
,
D. Eisenbiegler
,
D. Schmid
Formal Methods in Computer-Aided Design
1996
Corpus ID: 13317072
This article gives a survey on different methods of formal synthesis. We define what we mean by the term formal synthesis and…
Expand
1986
1986
The defect-sensitivity effect of memory chips
C. Stapper
1986
Corpus ID: 62700976
Three effects appear to influence the yield of digital memory chips. In the first effect, yields appear to decrease faster with…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE