Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,136,595 papers from all fields of science
Search
Sign In
Create Free Account
Verification and validation
Known as:
Verfiable
, VV
, Operational qualification
Expand
Verification and validation are independent procedures that are used together for checking that a product, service, or system meets requirements and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Acceptance testing
Agent-based model
Authentication
BIOS
Expand
Broader (1)
Systems engineering
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Adaptive Management of Virtualized Resources in Cloud Computing Using Feedback Control
Qiang Li
,
Qinfen Hao
,
Limin Xiao
,
Zhoujun Li
First International Conference on Information…
2009
Corpus ID: 18383564
Cloud computing as newly emergent computing environment offers dynamic flexible infrastructures and QoS guaranteed services in…
Expand
Highly Cited
2005
Highly Cited
2005
Hierarchical interface-based supervisory control-part II: parallel case
R. Leduc
,
M. Lawford
,
W. Wonham
IEEE Transactions on Automatic Control
2005
Corpus ID: 9129007
In this paper, we present a hierarchical method that decomposes a discrete-event system (DES) into a high-level subsystem which…
Expand
Highly Cited
2004
Highly Cited
2004
Carbon nanotube transistor operation at 2.6 Ghz
Shengdong Li
,
Zhen Yu
,
S. Yen
,
W. Tang
,
P. Burke
2004
Corpus ID: 62895452
We present the first demonstration of single-walled carbon nanotube transistor operation at microwave frequencies. To measure the…
Expand
Highly Cited
2002
Highly Cited
2002
Small byzantine quorum systems
Jean-Philippe Martin
,
L. Alvisi
,
M. Dahlin
Proceedings : International Conference on…
2002
Corpus ID: 5491635
In this paper we present two protocols for asynchronous Byzantine quorum systems (BQS) built on top of reliable channels-one for…
Expand
Highly Cited
2000
Highly Cited
2000
iCAR: an integrated cellular and ad-hoc relay system
C. Qiao
,
Hongyi Wu
Proceedings Ninth International Conference on…
2000
Corpus ID: 8099002
Ever increasing data traffic and limited capacity are major causes for congestion in current cellular systems. This paper…
Expand
Highly Cited
1999
Highly Cited
1999
Plan Management in the Medical Domain
S. Miksch
AI Communications
1999
Corpus ID: 6347526
The need to improve the quality of health care has led to a strong demand for clinical protocols and computer systems supporting…
Expand
Highly Cited
1998
Highly Cited
1998
The Reference Reach - a Blueprint for Natural Channel Design
D. Rosgen
1998
Corpus ID: 131024964
The reference reach is a river segment that represents a stable channel within a particular valley morphology. The reference…
Expand
Highly Cited
1995
Highly Cited
1995
Evolutionary identification of cloth animation models
J. Louchet
,
Xavier Provot
,
David Crochemore
1995
Corpus ID: 15206501
This paper presents an application of evolutionary genetic techniques to the identification of internal parameters of a mass…
Expand
Highly Cited
1995
Highly Cited
1995
Advanced Verification Techniques Based on Learning
J. Jain
,
R. Mukherjee
,
M. Fujita
Design Automation Conference
1995
Corpus ID: 11612769
Design verification poses a very practical problem during circuit synthesis. Learning based verification techniques prove to be…
Expand
Highly Cited
1983
Highly Cited
1983
Testing by Verifying Walsh Coefficients
A. K. Susskind
IEEE transactions on computers
1983
Corpus ID: 1732147
Testing of logic networks by verifying the Walsh coefricients of the outputs is explored. Measurement of one of these can detect…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE