Zeitschriftenartikel zum Thema „Computer software Verification“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Computer software Verification" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Goerigk, Wolfgang. „Mechanical Software Verification“. Electronic Notes in Theoretical Computer Science 58, Nr. 2 (November 2001): 117–37. http://dx.doi.org/10.1016/s1571-0661(04)00282-8.
Kwiatkowska, Marta. „From software verification to ‘everyware’ verification“. Computer Science - Research and Development 28, Nr. 4 (07.09.2013): 295–310. http://dx.doi.org/10.1007/s00450-013-0249-1.
Dobrescu, Mihai, und Katerina Argyraki. „Software dataplane verification“. Communications of the ACM 58, Nr. 11 (23.10.2015): 113–21. http://dx.doi.org/10.1145/2823400.
Malkis, Alexander, und Anindya Banerjee. „Verification of software barriers“. ACM SIGPLAN Notices 47, Nr. 8 (11.09.2012): 313–14. http://dx.doi.org/10.1145/2370036.2145871.
Halpern, J. D., S. Owre, N. Proctor und W. F. Wilson. „Muse—A Computer Assisted Verification System“. IEEE Transactions on Software Engineering SE-13, Nr. 2 (Februar 1987): 151–56. http://dx.doi.org/10.1109/tse.1987.226477.
Flanagan, Cormac, und Shaz Qadeer. „Predicate abstraction for software verification“. ACM SIGPLAN Notices 37, Nr. 1 (Januar 2002): 191–202. http://dx.doi.org/10.1145/565816.503291.
Greengard, Samuel. „Formal software verification measures up“. Communications of the ACM 64, Nr. 7 (Juli 2021): 13–15. http://dx.doi.org/10.1145/3464933.
Andersen, B. Scott, und George Romanski. „Verification of safety-critical software“. Communications of the ACM 54, Nr. 10 (Oktober 2011): 52–57. http://dx.doi.org/10.1145/2001269.2001286.
Andersen, B. Scott, und George Romanski. „Verification of Safety-critical Software“. Queue 9, Nr. 8 (August 2011): 50–59. http://dx.doi.org/10.1145/2016036.2024356.
Hailpern, B., und P. Santhanam. „Software debugging, testing, and verification“. IBM Systems Journal 41, Nr. 1 (2002): 4–12. http://dx.doi.org/10.1147/sj.411.0004.
Wang, Shihao. „Software Simulation for Hardware/Software Co-Verification“. Journal of Computer Research and Development 42, Nr. 3 (2005): 514. http://dx.doi.org/10.1360/crad20050322.
Ding, Zuohua, und Jing Liu. „An Improvement of Software Architecture Verification“. Electronic Notes in Theoretical Computer Science 243 (Juli 2009): 49–67. http://dx.doi.org/10.1016/j.entcs.2009.07.005.
Xu, Jian, Xinai Zhang, Yi Zhao und Bing Xu. „Verification of Air Data Computer Software using Formal Methods“. Journal of Physics: Conference Series 1827, Nr. 1 (01.03.2021): 012207. http://dx.doi.org/10.1088/1742-6596/1827/1/012207.
Krämer, Bernd, und Wolfgang Halang. „Computer-Aided Specification and Verification of Process Control Software“. IFAC Proceedings Volumes 25, Nr. 30 (Oktober 1992): 7–12. http://dx.doi.org/10.1016/s1474-6670(17)49399-2.
Gotlieb, Arnaud. „TCAS software verification using constraint programming“. Knowledge Engineering Review 27, Nr. 3 (26.07.2012): 343–60. http://dx.doi.org/10.1017/s0269888912000252.
Kishi, Tomoji, und Natsuko Noda. „Formal verification and software product lines“. Communications of the ACM 49, Nr. 12 (Dezember 2006): 73–77. http://dx.doi.org/10.1145/1183236.1183270.
Guo, Yinghua, Jill Slay und Jason Beckett. „Validation and verification of computer forensic software tools—Searching Function“. Digital Investigation 6 (September 2009): S12—S22. http://dx.doi.org/10.1016/j.diin.2009.06.015.
Benoit, Anne, Saurabh K. Raina und Yves Robert. „Efficient checkpoint/verification patterns“. International Journal of High Performance Computing Applications 31, Nr. 1 (28.07.2016): 52–65. http://dx.doi.org/10.1177/1094342015594531.
Abadi, Martín, und Bruno Blanchet. „Computer-assisted verification of a protocol for certified email“. Science of Computer Programming 58, Nr. 1-2 (Oktober 2005): 3–27. http://dx.doi.org/10.1016/j.scico.2005.02.002.
Khanna, S. „Logic Programming for Software Verification and Testing“. Computer Journal 34, Nr. 4 (01.04.1991): 350–57. http://dx.doi.org/10.1093/comjnl/34.4.350.
Min, Byungho, und Vijay Varadharajan. „Rethinking Software Component Security: Software Component Level Integrity and Cross Verification“. Computer Journal 59, Nr. 11 (10.08.2016): 1735–48. http://dx.doi.org/10.1093/comjnl/bxw047.
Kajiwara, M., M. Itoh und H. Ichikawa. „Specification and verification technologies for communication software“. IEEE Communications Magazine 23, Nr. 8 (August 1985): 15–25. http://dx.doi.org/10.1109/mcom.1985.1092633.
Thüm, Thomas, Ina Schaefer, Sven Apel und Martin Hentschel. „Family-based deductive verification of software product lines“. ACM SIGPLAN Notices 48, Nr. 3 (10.04.2013): 11–20. http://dx.doi.org/10.1145/2480361.2371404.
Ozkaya, Mert. „Formal Verification of Contractual Software Architectures using SPIN“. Malaysian Journal of Computer Science 28, Nr. 4 (01.12.2015): 318–37. http://dx.doi.org/10.22452/mjcs.vol28no4.4.
Calinescu, Radu, Carlo Ghezzi, Marta Kwiatkowska und Raffaela Mirandola. „Self-adaptive software needs quantitative verification at runtime“. Communications of the ACM 55, Nr. 9 (September 2012): 69–77. http://dx.doi.org/10.1145/2330667.2330686.
Sacha, Krzysztof. „Verification and implementation of software for dependable controllers“. International Journal of Critical Computer-Based Systems 1, Nr. 1/2/3 (2010): 238. http://dx.doi.org/10.1504/ijccbs.2010.031717.
Gagliardi, John. „Medical Device Software: Verification, Validation and Compliance“. Biomedical Instrumentation & Technology 45, Nr. 2 (01.03.2011): 95. http://dx.doi.org/10.2345/0899-8205-45.2.95.
Dyer, M., und A. Kouchakdjian. „Correctness verification: alternative to structural software testing“. Information and Software Technology 32, Nr. 1 (Januar 1990): 53–59. http://dx.doi.org/10.1016/0950-5849(90)90046-t.
Li, Shao Feng. „A Study on Network Protocol Validation Based on Timed Automata“. Applied Mechanics and Materials 543-547 (März 2014): 3386–90. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3386.
Ivančić, Franjo, Sriram Sankaranarayanan und Chao Wang. „Foreword: Special issue on numerical software verification“. Formal Methods in System Design 35, Nr. 3 (Dezember 2009): 227–28. http://dx.doi.org/10.1007/s10703-009-0090-0.
Chaki, Sagar, Edmund Clarke, Joël Ouaknine, Natasha Sharygina und Nishant Sinha. „Concurrent software verification with states, events, and deadlocks“. Formal Aspects of Computing 17, Nr. 4 (21.09.2005): 461–83. http://dx.doi.org/10.1007/s00165-005-0071-z.
Elqortobi, Mounia, Warda El-Khouly, Amine Rahj, Jamal Bentahar und Rachida Dssouli. „Verification and testing of safety-critical airborne systems: A model-based methodology“. Computer Science and Information Systems 17, Nr. 1 (2020): 271–92. http://dx.doi.org/10.2298/csis190430040e.
He, Chaobing. „Verification of Several Important Theorems in Simple Random Sampling Using R Software“. Journal of Advance Research in Mathematics And Statistics (ISSN: 2208-2409) 8, Nr. 12 (31.12.2021): 01–07. http://dx.doi.org/10.53555/nnms.v8i12.1134.
Zhang, Xingjun, Yan Yang, Endong Wang, Ilsun You und Xiaoshe Dong. „Modelling software fault management with runtime verification“. International Journal of Ad Hoc and Ubiquitous Computing 20, Nr. 1 (2015): 26. http://dx.doi.org/10.1504/ijahuc.2015.071660.
Rehman, Waqas Ur, Muhammad Sohaib Ayub und Junaid Haroon Siddiqui. „Verification of MPI Java programs using software model checking“. ACM SIGPLAN Notices 51, Nr. 8 (09.11.2016): 1–2. http://dx.doi.org/10.1145/3016078.2851192.
Cao, Zongyu, Wanyou Lv, Yanhong Huang, Jianqi Shi und Qin Li. „Formal Analysis and Verification of Airborne Software Based on DO-333“. Electronics 9, Nr. 2 (14.02.2020): 327. http://dx.doi.org/10.3390/electronics9020327.
Murrill, Branson W. „Integrating Software Analysis, Testing, and Verification into the Undergraduate Computer Science Curriculum“. Computer Science Education 8, Nr. 2 (August 1998): 85–99. http://dx.doi.org/10.1076/csed.8.2.85.3819.
Staskauskas, M. G. „An experience in the formal verification of industrial software“. Communications of the ACM 39, Nr. 12es (Dezember 1996): 256. http://dx.doi.org/10.1145/272682.272719.
Hinsen, Konrad. „Verifiability in computer-aided research: the role of digital scientific notations at the human-computer interface“. PeerJ Computer Science 4 (23.07.2018): e158. http://dx.doi.org/10.7717/peerj-cs.158.
Curzon, Paul, Rimvydas Rukšėnas und Ann Blandford. „An approach to formal verification of human–computer interaction“. Formal Aspects of Computing 19, Nr. 4 (02.06.2007): 513–50. http://dx.doi.org/10.1007/s00165-007-0035-6.
Parizek, P., und F. Plasil. „Assume-guarantee verification of software components in SOFA 2 framework“. IET Software 4, Nr. 3 (2010): 210. http://dx.doi.org/10.1049/iet-sen.2009.0016.
Zhang, Min, Kazuhiro Ogata und Kokichi Futatsugi. „Formalization and Verification of Behavioral Correctness of Dynamic Software Updates“. Electronic Notes in Theoretical Computer Science 294 (März 2013): 12–23. http://dx.doi.org/10.1016/j.entcs.2013.02.013.
Ferreira, Nelson Guimarães, und Paulo Sérgio Muniz Silva. „Automatic Verification of Safety Rules for a Subway Control Software“. Electronic Notes in Theoretical Computer Science 130 (Mai 2005): 323–43. http://dx.doi.org/10.1016/j.entcs.2005.03.017.
Feinerer, Ingo, und Gernot Salzer. „A comparison of tools for teaching formal software verification“. Formal Aspects of Computing 21, Nr. 3 (11.06.2008): 293–301. http://dx.doi.org/10.1007/s00165-008-0084-5.
Chaki, Sagar, Edmund Clarke, Natasha Sharygina und Nishant Sinha. „Verification of evolving software via component substitutability analysis“. Formal Methods in System Design 32, Nr. 3 (02.05.2008): 235–66. http://dx.doi.org/10.1007/s10703-008-0053-x.
Ray, Arnab, Raoul Jetley, Paul L. Jones und Yi Zhang. „Model-Based Engineering for Medical-Device Software“. Biomedical Instrumentation & Technology 44, Nr. 6 (01.11.2010): 507–18. http://dx.doi.org/10.2345/0899-8205-44.6.507.
Ochsenschläger, P., J. Repp, R. Rieke und U. Nitsche. „The SH-Verification Tool -- Abstraction-Based Verification of Co-operating Systems“. Formal Aspects of Computing 10, Nr. 4 (27.04.1998): 381–404. http://dx.doi.org/10.1007/s001650050023.
Muñoz-Quijada, Maria, Luis Sanz und Hipolito Guzman-Miranda. „SW-VHDL Co-Verification Environment Using Open Source Tools“. Electronics 9, Nr. 12 (10.12.2020): 2104. http://dx.doi.org/10.3390/electronics9122104.
Satin, Lukáš, und Jozef Bílik. „Verification CAE System for Plastic Injection“. Applied Mechanics and Materials 834 (April 2016): 79–83. http://dx.doi.org/10.4028/www.scientific.net/amm.834.79.
Revesz, Peter Z., und Robert J. Woodward. „Estimating the maximum rise in temperature according to climate models using abstract interpretation“. Acta Universitatis Sapientiae, Informatica 11, Nr. 1 (01.08.2019): 5–23. http://dx.doi.org/10.2478/ausi-2019-0001.