Dissertationen zum Thema „Computer software Verification“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Computer software Verification" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Dimovski, Aleksandar. „Compositional software verification based on game semantics“. Thesis, University of Warwick, 2007. http://wrap.warwick.ac.uk/2398/.
Der volle Inhalt der QuelleAddy, Edward A. „Verification and validation in software product line engineering“. Morgantown, W. Va. : [West Virginia University Libraries], 1999. http://etd.wvu.edu/templates/showETD.cfm?recnum=1068.
Der volle Inhalt der QuelleTitle from document title page. Document formatted into pages; contains vi, 75 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 35-39).
Wahab, Matthew. „Object code verification“. Thesis, University of Warwick, 1998. http://wrap.warwick.ac.uk/61068/.
Der volle Inhalt der QuelleSwart, Riaan. „A language to support verification of embedded software“. Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/49823.
Der volle Inhalt der QuelleENGLISH ABSTRACT: Embedded computer systems form part of larger systems such as aircraft or chemical processing facilities. Although testing and debugging of such systems are difficult, reliability is often essential. Development of embedded software can be simplified by an environment that limits opportunities for making errors and provides facilities for detection of errors. We implemented a language and compiler that can serve as basis for such an experimental environment. Both are designed to make verification of implementations feasible. Correctness and safety were given highest priority, but without sacrificing efficiency wherever possible. The language is concurrent and includes measures for protecting the address spaces of concurrently running processes. This eliminates the need for expensive run-time memory protection and will benefit resource-strapped embedded systems. The target hardware is assumed to provide no special support for concurrency. The language is designed to be small, simple and intuitive, and to promote compile-time detection of errors. Facilities for abstraction, such as modules and abstract data types support implementation and testing of bigger systems. We have opted for model checking as verification technique, so our implementation language is similar in design to a modelling language for a widely used model checker. Because of this, the implementation code can be used as input for a model checker. However, since the compiler can still contain errors, there might be discrepancies between the implementation code written in our language and the executable code produced by the compiler. Therefore we are attempting to make verification of executable code feasible. To achieve this, our compiler generates code in a special format, comprising a transition system of uninterruptible actions. The actions limit the scheduling points present in processes and reduce the different interleavings of process code possible in a concurrent system. Requirements that conventional hardware places on this form of code are discussed, as well as how the format influences efficiency and responsiveness.
AFRIKAANSE OPSOMMING: Ingebedde rekenaarstelsels maak deel uit van groter stelsels soos vliegtuie of chemiese prosesseerfasiliteite. Hoewel toetsing en ontfouting van sulke stelsels moeilik is, is betroubaarheid dikwels onontbeerlik. Ontwikkeling van ingebedde sagteware kan makliker gemaak word met 'n ontwikkelingsomgewing wat geleenthede vir foutmaak beperk en fasiliteite vir foutbespeuring verskaf. Ons het 'n programmeertaal en vertaler geïmplementeer wat as basis kan dien vir so 'n eksperimentele omgewing. Beide is ontwerp om verifikasie van implementasies haalbaar te maak. Korrektheid en veiligheid het die hoogste prioriteit geniet, maar sonder om effektiwiteit prys te gee, waar moontlik. Die taal is gelyklopend en bevat maatreëls om die adresruimtes van gelyklopende prosesse te beskerm. Dit maak duur looptyd-geheuebeskerming onnodig, tot voordeel van ingebedde stelsels met 'n tekort aan hulpbronne. Daar word aangeneem dat die teikenhardeware geen spesiale ondersteuning vir gelyklopendheid bevat nie. Die programmeertaal is ontwerp om klein, eenvoudig en intuïtief te wees, en om vertaaltyd-opsporing van foute te bevorder. Fasiliteite vir abstraksie, byvoorbeeld modules en abstrakte datatipes, ondersteun implementering en toetsing van groter stelsels. Ons het modeltoetsing as verifikasietegniek gekies, dus is die ontwerp van ons programmeertaal soortgelyk aan dié van 'n modelleertaal vir 'n modeltoetser wat algemeen gebruik word. As gevolg hiervan kan die implementasiekode as toevoer vir 'n modeltoetser gebruik word. Omdat die vertaler egter steeds foute kan bevat, mag daar teenstrydighede bestaan tussen die implementasie geskryf in ons implementasietaal, en die uitvoerbare masjienkode wat deur die vertaler gelewer word. Daarom poog ons om verifikasie van die uitvoerbare masjienkode haalbaar te maak. Om hierdie doelwit te bereik, is ons vertaler ontwerp om 'n spesiale formaat masjienkode te genereer bestaande uit 'n oorgangstelsel wat ononderbreekbare (atomiese) aksies bevat. Die aksies beperk die skeduleerpunte in prosesse en verminder sodoende die aantal interpaginasies van proseskode wat moontlik is in 'n gelyklopende stelsel. Die vereistes wat konvensionele hardeware aan dié spesifieke formaat kode stel, word bespreek, asook hoe die formaat effektiwiteit en reageerbaarheid van die stelsel beïnvloed.
Wang, Xuan. „Verification of Digital Controller Verifications“. BYU ScholarsArchive, 2005. https://scholarsarchive.byu.edu/etd/681.
Der volle Inhalt der QuelleTagore, Aditi. „Techniques to Improve Automated Software Verification“. The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397661277.
Der volle Inhalt der QuelleKirschenbaum, Jason P. „Investigations in Automating Software Verification“. The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1306862918.
Der volle Inhalt der QuelleHughes, Roger Brett. „Automated interactive software verification and synthesis“. Thesis, Brunel University, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.306741.
Der volle Inhalt der QuelleJackson, David Mark. „Logical verification of reactive software systems“. Thesis, University of Oxford, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.305989.
Der volle Inhalt der QuelleIbrahim, Alaa E. „Scenario-based verification and validation of dynamic UML specifications“. Morgantown, W. Va. : [West Virginia University Libraries], 2001. http://etd.wvu.edu/templates/showETD.cfm?recnum=1799.
Der volle Inhalt der QuelleTitle from document title page. Document formatted into pages; contains x, 143 p. : ill. (some col.). Vita. Includes abstract. Includes bibliographical references (p. 96-99).
Argote, Garcia Gonzalo. „Formal verification and testing of software architectural models“. FIU Digital Commons, 2009. http://digitalcommons.fiu.edu/etd/1308.
Der volle Inhalt der QuelleUbhayakar, Sonali S. „Evalutation of program specification and verification systems“. Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FUbhayakar.pdf.
Der volle Inhalt der QuelleGrobler, Leon D. „A kernel to support computer-aided verification of embedded software“. Thesis, Stellenbosch : University of Stellenbosch, 2006. http://hdl.handle.net/10019.1/2479.
Der volle Inhalt der QuelleFormal methods, such as model checking, have the potential to improve the reliablility of software. Abstract models of systems are subjected to formal analysis, often showing subtle defects not discovered by traditional testing.
Wickerson, John Peter. „Concurrent verification for sequential programs“. Thesis, University of Cambridge, 2013. https://www.repository.cam.ac.uk/handle/1810/265613.
Der volle Inhalt der QuelleBatten, Ian Gilbert. „Trusted execution : applications and verification“. Thesis, University of Birmingham, 2016. http://etheses.bham.ac.uk//id/eprint/6684/.
Der volle Inhalt der QuelleLatham, J. T. „Abstraction in program verification“. Thesis, University of Manchester, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.372026.
Der volle Inhalt der QuelleWoo, Yan. „A dynamic integrity verification scheme for tamper-resistance software“. Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B34740478.
Der volle Inhalt der QuelleWoo, Yan, und 胡昕. „A dynamic integrity verification scheme for tamper-resistancesoftware“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B34740478.
Der volle Inhalt der QuelleLi, Juncao. „An Automata-Theoretic Approach to Hardware/Software Co-verification“. PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/12.
Der volle Inhalt der QuelleUbhayakar, Sonali S. „Evaluation of program specification and verification systems“. Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/893.
Der volle Inhalt der QuelleNaval Postgraduate School author (civilian).
Smyth, Ben. „Formal verification of cryptographic protocols with automated reasoning“. Thesis, University of Birmingham, 2011. http://etheses.bham.ac.uk//id/eprint/1604/.
Der volle Inhalt der QuelleAndrade-Gómez, Héctor Adolfo. „Model checking for open systems a compositional approach to software verification /“. [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/ank6403.
Der volle Inhalt der QuelleTitle from first page of PDF file. Document formatted into pages; contains xi, 144 p.; also contains graphics. Vita. Includes bibliographical references (p. 139-143).
Wang, Xuan. „Verification of digital controller implementations /“. Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd1073.pdf.
Der volle Inhalt der QuelleStringer-Calvert, David William John. „Mechanical verification of compiler correctness“. Thesis, University of York, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.245867.
Der volle Inhalt der QuelleLarson, Trent N. „A Formal Method to Analyze Framework-Based Software“. BYU ScholarsArchive, 2002. https://scholarsarchive.byu.edu/etd/104.
Der volle Inhalt der QuelleAntti, William. „Virtualized Functional Verification of Cross-Platform Software Applications“. Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74599.
Der volle Inhalt der QuelleGarner, Scott A. „Metrics directed verification of UML designs“. Virtual Press, 2005. http://liblink.bsu.edu/uhtbin/catkey/1328113.
Der volle Inhalt der QuelleDepartment of Computer Science
Ulu, Cemil. „Specification And Verification Of Confidentiality In Software Architectures“. Phd thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12604809/index.pdf.
Der volle Inhalt der QuelleNagarajan, R. „Typed concurrent programs : specification and verification“. Thesis, Imperial College London, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.369244.
Der volle Inhalt der QuelleJohn, Sheline Anna. „Runtime verification of composite web services“. To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Der volle Inhalt der QuelleJohnsen, Andreas. „Architecture-Based Verification of Software-Intensive Systems“. Thesis, Mälardalen University, School of Innovation, Design and Engineering, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-8917.
Der volle Inhalt der QuelleDevelopment of software-intensive systems such as embedded systems for telecommunications, avionics and automotives occurs under severe quality, schedule and budget constraints. As the size and complexity of software-intensive systems increase dramatically, the problems originating from the design and specification of the system architecture becomes increasingly significant. Architecture-based development approaches promise to improve the efficiency of software-intensive system development processes by reducing costs and time, while increasing quality. This paradox is partially explained by the fact that the system architecture abstracts away unnecessary details, so that developers can concentrate both on the system as a whole, and on its individual pieces, whether it's the components, the components' interfaces, or connections among components. The use of architecture description languages (ADLs) provides an important basis for verification since it describes how the system should behave, in a high level view and in a form where automated tests can be generated. Analysis and testing based on architecture specifications allow detection of problems and faults early in the development process, even before the implementation phase, thereby reducing a significant amount of costs and time. Furthermore, tests derived from the architecture specification can later be applied to the implementation to see the conformance of the implementation with respect to the specification. This thesis extends the knowledge base in the area of architecture-based verification. In this thesis report, an airplane control system is specified using the Architecture Analysis and Description Language (AADL). This specification will serve as a starting point of a system development process where developed architecture-based verification algorithms are applied.
Imanian, James A. „Automated test case generation for reactive software systems based on environment models“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FImanian.pdf.
Der volle Inhalt der QuelleThesis Advisor(s): Mikhail Auguston, James B. Michael. Includes bibliographical references (p. 55-56). Also available online.
Grissino-Mayer, Henri D. „Computer Assisted, Independent Observer Verification of Tree-Ring Measurements“. Tree-Ring Society, 1997. http://hdl.handle.net/10150/262380.
Der volle Inhalt der QuelleMüller-Olm, Markus. „Modular compiler verification : a refinement algebraic approach advocating stepwise abstraction /“. Berlin [u.a.] : Springer, 1997. http://www.loc.gov/catdir/enhancements/fy0815/97013428-d.html.
Der volle Inhalt der QuelleTsalgatidou, Aphrodite. „Dynamics of information systems : modelling and verification“. Thesis, University of Manchester, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.257152.
Der volle Inhalt der QuelleZhang, Bairong. „Formal specification and verification of OSI protocols“. Thesis, University of Bristol, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.337284.
Der volle Inhalt der QuelleChantatub, Wachara. „The integration of software specification, verification, and testing techniques with software requirements and design processes“. Thesis, University of Sheffield, 1995. http://etheses.whiterose.ac.uk/1850/.
Der volle Inhalt der QuelleAcosta, Zapién Carlos Eduardo. „A constraint-based approach to verification of programs with floating-point numbers“. To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2007. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Der volle Inhalt der QuelleHe, Xudong. „Integrating formal specification and verification methods in software development“. Diss., Virginia Polytechnic Institute and State University, 1989. http://hdl.handle.net/10919/54535.
Der volle Inhalt der QuellePh. D.
Qian, Kairong Computer Science & Engineering Faculty of Engineering UNSW. „Formal symbolic verification using heuristic search and abstraction techniques“. Awarded by:University of New South Wales. School of Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/25703.
Der volle Inhalt der QuellePappalardo, Giuseppe. „Specification and verification issues in a process language“. Thesis, University of Newcastle Upon Tyne, 1996. http://hdl.handle.net/10443/2016.
Der volle Inhalt der QuelleMatias, Matthew John. „Program Verification of FreeRTOS using Microsoft Dafny“. Cleveland State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=csu1400085349.
Der volle Inhalt der QuelleGaither, Danielle. „Improving Software Quality through Syntax and Semantics Verification of Requirements Models“. Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404542/.
Der volle Inhalt der QuelleChen, Jinjun. „Towards effective and efficient temporal verification in grid workflow systems“. Australasian Digital Thesis Program, 2007. http://adt.lib.swin.edu.au/public/adt-VSWT20070424.112326/index.html.
Der volle Inhalt der QuelleA thesis to CITR - Centre for Information Technology Research, Faculty of Information and Communication Technologies, Swinburne University of Technology, for the degree of Doctor of Philosophy, 2007. Typescript. Bibliography p. 145-160.
Borges, Rafael. „A neural-symbolic system for temporal reasoning with application to model verification and learning“. Thesis, City University London, 2012. http://openaccess.city.ac.uk/1303/.
Der volle Inhalt der QuelleGerber, Erick D. B. „A model checker for the LF system“. Thesis, Stellenbosch : Stellenbosch University, 2007. http://hdl.handle.net/10019.1/19597.
Der volle Inhalt der QuelleENGLISH ABSTRACT: Computer aided veri cation techniques, such as model checking, can be used to improve the reliability of software. Model checking is an algorithmic approach to illustrate the correctness of temporal logic speci cations in the formal description of hardware and software systems. In contrast to traditional testing tools, model checking relies on an exhaustive search of all the possible con gurations that these systems may exhibit. Traditionally model checking is applied to abstract or high level designs of software. However, often interpreting or translating these abstract designs to implementations introduce subtle errors. In recent years one trend in model checking has been to apply the model checking algorithm directly to the implementations instead. This thesis is concerned with building an e cient model checker for a small concurrent langauge developed at the University of Stellenbosch. This special purpose langauge, LF, is aimed at developement of small embedded systems. The design of the language was carefully considered to promote safe programming practices. Furthermore, the language and its runtime support system was designed to allow directly model checking LF programs. To achieve this, the model checker extends the existing runtime support infrastructure to generate the state space of an executing LF program.
AFRIKAANSE OPSOMMING: Rekenaar gebaseerde program toetsing, soos modeltoetsing, kan gebruik word om die betroubaarheid van sagteware te verbeter. Model toetsing is 'n algoritmiese benadering om die korrektheid van temporale logika spesi kasies in die beskrywing van harde- of sagteware te bewys. Anders as met tradisionlee program toetsing, benodig modeltoetsing 'n volledige ondersoek van al die moontlike toestande waarin so 'n beskrywing homself kan bevind. Model toetsing word meestal op abstrakte modelle van sagteware of die ontwerp toegepas. Indien die ontwerp of model aan al die spesi kasies voldoen word die abstrakte model gewoontlik vertaal na 'n implementasie. Die vertalings proses word gewoontlik met die hand gedoen en laat ruimte om nuwe foute, en selfs foute wat uitgeskakel in die model of ontwerp is te veroorsaak. Deesdae, is 'n gewilde benadering tot modeltoetsing om di e tegnieke direk op die implementasie toe te pas, en sodoende die ekstra moeite van model konstruksie en vertaling uit te skakel. Hierdie tesis handel oor die ontwerp, implementasie en toetsing van 'n e ektiewe modeltoetser vir 'n klein gelyklopende taal, LF, wat by die Universiteit van Stellenbosch ontwikkel is. Die enkeldoelige taal, LF, is gemik op die veilige ontwikkeling van ingebedde sagteware. Die taal is ontwerp om veilige programmerings praktyke aan te moedig. Verder is die taal en die onderliggende bedryfstelsel so ontwerp om 'n model toetser te akkomodeer. Om die LF programme direk te kan toets, is die model toetser 'n integrale deel van die bedryfstelsel sodat dit die program kan aandryf om alle moontlike toestande te besoek.
Zaccai, Diego Sebastian. „A Balanced Verification Effort for the Java Language“. The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1461243619.
Der volle Inhalt der QuelleGomez, Rodolfo. „Verification of real-time systems : improving tool support“. Thesis, University of Kent, 2006. https://kar.kent.ac.uk/14401/.
Der volle Inhalt der QuelleMoschoglou, Georgios Moschos. „Software testing tools and productivity“. Virtual Press, 1996. http://liblink.bsu.edu/uhtbin/catkey/1014862.
Der volle Inhalt der QuelleDepartment of Computer Science
Shaffer, Alan B. „An application of Alloy to static analysis for secure information flow and verification of software systems“. Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/dissert/2008/Dec/08Dec%5FShaffer_PhD.pdf.
Der volle Inhalt der QuelleDissertation Supervisor: Auguston, Mikhail. "December 2008." Description based on title screen as viewed on January 29, 2009. Includes bibliographical references (p. 87-93). Also available in print.