Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,729,638 papers from all fields of science
Search
Sign In
Create Free Account
Software verification
Known as:
Verification
Software verification is a discipline of software engineering whose goal is to assure that software fully satisfies all the expected requirements…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
ACM Transactions on Programming Languages and Systems
Anti-pattern
Artur d'Avila Garcez
Attack Surface Analyzer
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Software verification for TinyOS
Doina Bucur
,
M. Kwiatkowska
International Symposium on Information Processing…
2010
Corpus ID: 10256415
We describe the first software tool for the verification of TinyOS 2, MSP430 applications at compile-time. Given assertions upon…
Expand
2010
2010
ACPT: A Tool for Modeling and Verifying Access Control Policies
JeeHyun Hwang
,
Tao Xie
,
Vincent C. Hu
,
Mine Altunay
IEEE International Symposium on Policies for…
2010
Corpus ID: 8509560
Access control mechanisms are a widely adopted technology for information security. Since access decisions (i.e., permit or deny…
Expand
2009
2009
Design and Basic Characteristics of Multi-Consequent-Pole Bearingless Motor With Bi-Tooth Main Poles
H. Sugimoto
,
K. Kamiya
,
R. Nakamura
,
J. Asama
,
A. Chiba
,
T. Fukao
IEEE transactions on magnetics
2009
Corpus ID: 45734698
A multi-consequent-pole bearingless motor which is adapted to low speed rotation is presented. The bearingless motor can be used…
Expand
2007
2007
A flexible security architecture to support third-party applications on mobile devices
Lieven Desmet
,
W. Joosen
,
+4 authors
Dries Vanoverberghe
Workshop on Computer Security Architecture
2007
Corpus ID: 393818
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable…
Expand
2006
2006
Sketch Transit Modeling Based on 2000 Census Data
N. Marshall
,
Brian Grady
2006
Corpus ID: 38128288
Transit planners need cost-effective ways to evaluate a wide range of alternatives relatively quickly to identify potential…
Expand
2006
2006
Software verification for programmable logic controllers
Ralf Huuck
2006
Corpus ID: 42156266
Programmable logic controllers (PLCs) occupy a big share in automation control. Their programming languages are, however, born…
Expand
2006
2006
A Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery
Qing Zhang
,
K. Markantonakis
,
K. Mayes
IEEE International Conference on Computer Systems…
2006
Corpus ID: 11805470
In this paper, a practical electronic-payment (epayment) protocol is presented for use over the internet. The protocol applies…
Expand
Highly Cited
2005
Highly Cited
2005
LusSy: a toolbox for the analysis of systems-on-a-chip at the transactional level
M. Moy
,
F. Maraninchi
,
L. Maillet-Contoz
International Conference on Application of…
2005
Corpus ID: 2457667
We describe a toolbox for the analysis of systems-on-a-chip described in SystemC at the transactional level. The tools are able…
Expand
2005
2005
Introgressing resistance to bacterial and viral diseases from the middle American to Andean common bean
M. C. Asensio-S-Manzanera
,
C. Asensio
,
Shree P. Singh
Euphytica
2005
Corpus ID: 21394095
The genetic base of cultivars within market classes of common bean (Phaseolusvulgaris L.) is narrow. Moreover, small- and medium…
Expand
1986
1986
The defect-sensitivity effect of memory chips
C. Stapper
1986
Corpus ID: 62700976
Three effects appear to influence the yield of digital memory chips. In the first effect, yields appear to decrease faster with…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE