Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,888,952 papers from all fields of science
Search
Sign In
Create Free Account
Software verification
Known as:
Verification
Software verification is a discipline of software engineering whose goal is to assure that software fully satisfies all the expected requirements…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
ACM Transactions on Programming Languages and Systems
Anti-pattern
Artur d'Avila Garcez
Attack Surface Analyzer
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Mobile Agent Security Using Reference Monitor Based Security Framework
S. Armoogum
,
N. Mohamudally
,
N. Nissanke
International Conference on Emerging Security…
2015
Corpus ID: 63073611
: In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially…
Expand
2011
2011
Design and coverage-driven verification of a novel network-interface IP macrocell for network-on-chip interconnects
S. Saponara
,
L. Fanucci
,
M. Coppola
Microprocessors and microsystems
2011
Corpus ID: 34773744
2010
2010
Software verification for TinyOS
Doina Bucur
,
M. Kwiatkowska
International Symposium on Information Processing…
2010
Corpus ID: 10256415
We describe the first software tool for the verification of TinyOS 2, MSP430 applications at compile-time. Given assertions upon…
Expand
2009
2009
Design and Basic Characteristics of Multi-Consequent-Pole Bearingless Motor With Bi-Tooth Main Poles
H. Sugimoto
,
K. Kamiya
,
R. Nakamura
,
J. Asama
,
A. Chiba
,
T. Fukao
IEEE transactions on magnetics
2009
Corpus ID: 45734698
A multi-consequent-pole bearingless motor which is adapted to low speed rotation is presented. The bearingless motor can be used…
Expand
2007
2007
A flexible security architecture to support third-party applications on mobile devices
Lieven Desmet
,
W. Joosen
,
+4 authors
Dries Vanoverberghe
Workshop on Computer Security Architecture
2007
Corpus ID: 393818
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable…
Expand
2006
2006
Software verification for programmable logic controllers
Ralf Huuck
2006
Corpus ID: 42156266
Programmable logic controllers (PLCs) occupy a big share in automation control. Their programming languages are, however, born…
Expand
2005
2005
Introgressing resistance to bacterial and viral diseases from the middle American to Andean common bean
M. C. Asensio-S-Manzanera
,
C. Asensio
,
Shree P. Singh
Euphytica
2005
Corpus ID: 21394095
The genetic base of cultivars within market classes of common bean (Phaseolusvulgaris L.) is narrow. Moreover, small- and medium…
Expand
1995
1995
Vibration suppression of fixed-time jib crane maneuvers
G. Parker
,
B. Petterson
,
C. Dohrmann
,
R. Robinett
Smart Structures
1995
Corpus ID: 109721919
A jib crane consists of a pendulum-like end line attached to a rotatable jib. Within this general category of cranes there exist…
Expand
1992
1992
In vitro plant regeneration from callus derived from root explants of Lathyrus sativus
P. K. Roy
,
G. Barat
,
S. L. Mehta
Plant Cell Tissue and Organ Culture
1992
Corpus ID: 766534
Protocols have been developed for the in vitro production of plants from callus derived from root explants of Lathyrus sativus cv…
Expand
1986
1986
The defect-sensitivity effect of memory chips
C. Stapper
1986
Corpus ID: 62700976
Three effects appear to influence the yield of digital memory chips. In the first effect, yields appear to decrease faster with…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE