Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,930,387 papers from all fields of science
Search
Sign In
Create Free Account
Verification and validation
Known as:
Verfiable
, VV
, Operational qualification
Expand
Verification and validation are independent procedures that are used together for checking that a product, service, or system meets requirements and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Acceptance testing
Agent-based model
Authentication
BIOS
Expand
Broader (1)
Systems engineering
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Adaptive Management of Virtualized Resources in Cloud Computing Using Feedback Control
Qiang Li
,
Qinfen Hao
,
Limin Xiao
,
Zhoujun Li
First International Conference on Information…
2009
Corpus ID: 18383564
Cloud computing as newly emergent computing environment offers dynamic flexible infrastructures and QoS guaranteed services in…
Expand
Highly Cited
2007
Highly Cited
2007
Improvements on Sensor Noise Based Source Camera Identification
Y. Sutcu
,
Sevinc Bayram
,
H. Sencar
,
N. Memon
IEEE International Conference on Multimedia and…
2007
Corpus ID: 9084857
In a novel method for identifying the source camera of a digital image is proposed. The method is based on first extracting…
Expand
Highly Cited
2005
Highly Cited
2005
Hierarchical interface-based supervisory control-part II: parallel case
R. Leduc
,
M. Lawford
,
W. Wonham
IEEE Transactions on Automatic Control
2005
Corpus ID: 9129007
In this paper, we present a hierarchical method that decomposes a discrete-event system (DES) into a high-level subsystem which…
Expand
Highly Cited
2004
Highly Cited
2004
Carbon nanotube transistor operation at 2.6 Ghz
Shengdong Li
,
Zhen Yu
,
S. Yen
,
W. Tang
,
P. Burke
2004
Corpus ID: 62895452
We present the first demonstration of single-walled carbon nanotube transistor operation at microwave frequencies. To measure the…
Expand
Highly Cited
2000
Highly Cited
2000
iCAR: an integrated cellular and ad-hoc relay system
C. Qiao
,
Hongyi Wu
Proceedings Ninth International Conference on…
2000
Corpus ID: 8099002
Ever increasing data traffic and limited capacity are major causes for congestion in current cellular systems. This paper…
Expand
Highly Cited
1995
Highly Cited
1995
Evolutionary identification of cloth animation models
J. Louchet
,
Xavier Provot
,
David Crochemore
1995
Corpus ID: 15206501
This paper presents an application of evolutionary genetic techniques to the identification of internal parameters of a mass…
Expand
Highly Cited
1995
Highly Cited
1995
Advanced Verification Techniques Based on Learning
J. Jain
,
R. Mukherjee
,
M. Fujita
Design Automation Conference
1995
Corpus ID: 11612769
Design verification poses a very practical problem during circuit synthesis. Learning based verification techniques prove to be…
Expand
Highly Cited
1983
Highly Cited
1983
Testing by Verifying Walsh Coefficients
A. K. Susskind
IEEE transactions on computers
1983
Corpus ID: 1732147
Testing of logic networks by verifying the Walsh coefricients of the outputs is explored. Measurement of one of these can detect…
Expand
Highly Cited
1972
Highly Cited
1972
A Note on Three-Valued Logic Simulation
M. Breuer
IEEE transactions on computers
1972
Corpus ID: 43629740
In this note we discuss a few attributes and pitfalls of three-valued (0, 1, u) digital logic simulation. The areas covered…
Expand
Highly Cited
1965
Highly Cited
1965
Effect of a finite-word-length computer in a sampled-data feedback system
J. Knowles
,
R. Edwards
1965
Corpus ID: 60469473
When a digital computer acts as the compensating element of a sampled-data feedback system, the system performance is degenerated…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE