Academic literature on the topic 'Verification'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Verification.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Verification"
Benoit, Anne, Saurabh K. Raina, and Yves Robert. "Efficient checkpoint/verification patterns." International Journal of High Performance Computing Applications 31, no. 1 (July 28, 2016): 52–65. http://dx.doi.org/10.1177/1094342015594531.
Full textShaik, Bushra, Jyothi Manohar Katikireddy, Vamsidhar Kambham, and K. Sravani. "Offline Signature Verification Using Image Processing." E3S Web of Conferences 391 (2023): 01074. http://dx.doi.org/10.1051/e3sconf/202339101074.
Full textDeboo, Cyrus, Shubham Kshatriya, and Rajat Bhat. "Video Liveness Verification." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 2449–52. http://dx.doi.org/10.31142/ijtsrd12772.
Full textPucella, Riccardo. "Logical verification and equational verification." ACM SIGACT News 36, no. 2 (June 2005): 77–88. http://dx.doi.org/10.1145/1067309.1067326.
Full textRegehr, John, and Nathan Cooprider. "Interrupt Verification via Thread Verification." Electronic Notes in Theoretical Computer Science 174, no. 9 (June 2007): 139–50. http://dx.doi.org/10.1016/j.entcs.2007.04.002.
Full textSimonova, Natalia S. "An International Verifi cation Institute as an Element of the Mechanism of Ensuring for Meeting Commitments under International Treaties." Moscow Journal of International Law, no. 1 (March 30, 2014): 82–102. http://dx.doi.org/10.24833/0869-0049-2014-1-82-102.
Full textJiang, Long Long, and Dai Ping Li. "Using Contour Marking Bytecode Verification Algorithm on the Java Card." Applied Mechanics and Materials 556-562 (May 2014): 4120–23. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.4120.
Full textPhelps, Doug. "Verification." Cataloging & Classification Quarterly 9, no. 1 (December 19, 1988): 5–9. http://dx.doi.org/10.1300/j104v09n01_02.
Full textRobb, Jonathan Peter. "Verification." AJN, American Journal of Nursing 117, no. 6 (June 2017): 72. http://dx.doi.org/10.1097/01.naj.0000520263.18448.55.
Full textClassen, Julie. "Verification." Nursing Management (Springhouse) 40, no. 8 (August 2009): 8. http://dx.doi.org/10.1097/01.numa.0000359199.37081.f7.
Full textDissertations / Theses on the topic "Verification"
Wang, Xuan. "Verification of Digital Controller Verifications." BYU ScholarsArchive, 2005. https://scholarsarchive.byu.edu/etd/681.
Full textKrupp, Alfred Alexander. "A verification plan for systematic verification of mechatronic systems." Aachen Shaker, 2009. http://d-nb.info/995161909/04.
Full textTiikkainen, M. (Martti). "Automated functional coverage driven verification with Universal Verification Methodology." Master's thesis, University of Oulu, 2017. http://jultika.oulu.fi/Record/nbnfioulu-201711033027.
Full textSandström, Krantz Alexander. "Node hardening verification." Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11822.
Full textSecure networks require each node to individually be as secure as possible. Transporting telecommunication data using IP based networks increases the need for security solutions due to increased exposure to threats. Ericsson currently provides a reference solution for carrying radio traffic over standardized Ethernet using IP, which in the current version relies on third party equipment. This equipment, and their recommended configuration, needs to be tested to ensure that the reference solution is as secure as possible.
The main purpose of this thesis is to provide Ericsson with a template that describes how security testing of the currently recommended equipment can be carried out.
För att ett nätverk skall vara säkert krävs att dess noder är invidivuellt säkrade. Transportering av telekommunikation över IP baserade nätverk ökar behovet av säkerhetslösningar då det ökar riskerna. Ericsson erbjuder idag en referenslösning för transport av telekommunikationstrafik över IP nätverk, som i dagsläget använder tredje-parts-utrustning. Denna utrustning och den konfiguration som rekommenderas i referenslösningen behöver säkerhetstestas för att säkerställa att den erbjudna lösningen håller en hög säkerhetsnivå.
Huvudsyftet med detta exjobb är att ta fram en praktisk metod som kan användas vid Ericsson för att säkerhetstesta den utrustning som i dagsläget rekommenderas i referenslösningen.
Yager, Neil Gordon Computer Science & Engineering Faculty of Engineering UNSW. "Hierarchical fingerprint verification." Awarded by:University of New South Wales. Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/27008.
Full textWahab, Matthew. "Object code verification." Thesis, University of Warwick, 1998. http://wrap.warwick.ac.uk/61068/.
Full textGonzalez, Perez Carlos Alberto. "Pragmatic model verification." Thesis, Nantes, Ecole des Mines, 2014. http://www.theses.fr/2014EMNA0189/document.
Full textModel-Driven Engineering (MDE) is a popular approach to the development of software which promotes the use of models as first-Class citizens in the software development process. In a MDE-Based software development process, software is developed by creating models to be successively transformed into another models and eventually into the software source code. When MDE is applied to the development of complex software systems, the complexity of models and model transformations increase, thus risking both, the reliability of the software development process and the soundness of the resulting software. Traditionally, ensuring software correctness and absence of errors has been addressed by means of software verification approaches, based on the utilization of formal analysis techniques, and software testing approaches. In order to ensure the reliability of MDE-Based software development processes, these techniques have some how been adapted to try to ensure correctness of models and model transformations. The objective of this thesis is to provide new mechanisms to improve the landscape of approaches devoted to the verification of static models, and analyze how these static model verification approaches can be of assistance at the time of testing model transformations
Ingraham, Daniel. "Verification of a Computational Aeroacoustics Code Using External Verification Analysis (EVA)." University of Toledo / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1271271426.
Full textKenger, Patrik. "Module property verification : A method to plan and perform quality verifications in modular architectures." Doctoral thesis, Stockholm, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-3965.
Full textKrupp, Alfred Alexander [Verfasser]. "A Verification Plan for Systematic Verification of Mechatronic Systems / Alfred Alexander Krupp." Aachen : Shaker, 2009. http://d-nb.info/1156518482/34.
Full textBooks on the topic "Verification"
United States. Environmental Protection Agency. Office of Research and Development., ed. Environmental Technology Verification Program: Verification strategy. Washington, DC: Office of Research and Development, U.S. Environmental Protection Agency, 1997.
Find full textCanada. Dept. of External Affairs., ed. Verification research: Canada's Verification Research Program. Ottawa, Ont: External Affairs Canada, 1988.
Find full textFeng, Lu, and Dana Fisman, eds. Runtime Verification. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88494-9.
Full textBloem, Roderick, Rayna Dimitrova, Chuchu Fan, and Natasha Sharygina, eds. Software Verification. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95561-8.
Full textColombo, Christian, and Gordon J. Pace. Runtime Verification. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09268-8.
Full textDang, Thao, and Volker Stolz, eds. Runtime Verification. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17196-3.
Full textLahiri, Shuvendu, and Giles Reger, eds. Runtime Verification. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67531-2.
Full textBartocci, Ezio, and Rupak Majumdar, eds. Runtime Verification. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23820-3.
Full textBarringer, Howard, Ylies Falcone, Bernd Finkbeiner, Klaus Havelund, Insup Lee, Gordon Pace, Grigore Roşu, Oleg Sokolsky, and Nikolai Tillmann, eds. Runtime Verification. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16612-9.
Full textColombo, Christian, and Martin Leucker, eds. Runtime Verification. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03769-7.
Full textBook chapters on the topic "Verification"
Verbeek, Eric, and Moe Wynn. "Verification." In Modern Business Process Automation, 513–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03121-2_20.
Full textBalarin, Felice, Massimiliano Chiodo, Paolo Giusto, Harry Hsieh, Attila Jurecska, Luciano Lavagno, Claudio Passerone, et al. "Verification." In Hardware-Software Co-Design of Embedded Systems, 199–246. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6127-9_5.
Full textKunze, Matthias, and Mathias Weske. "Verification." In Behavioural Models, 231–72. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44960-9_8.
Full textKeating, Michael. "Verification." In The Simple Art of SoC Design, 71–87. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-8586-6_6.
Full textMcGettrick, Andrew D., Owen Traynor, and David Duffy. "Verification." In Program Development by Specification and Transformation, 129–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/3-540-56733-x_146.
Full textWeik, Martin H. "verification." In Computer Science and Communications Dictionary, 1886. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_20718.
Full textGajski, Daniel D., Samar Abdi, Andreas Gerstlauer, and Gunar Schirner. "Verification." In Embedded System Design, 255–85. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-0504-8_7.
Full textKoomen, C. J. "Verification." In The Design of Communicating Systems, 27–47. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4615-4020-5_3.
Full textDillenberger, Felix. "Verification." In On the anisotropic plastic behaviour of short fibre reinforced thermoplastics and its description by phenomenological material modelling, 163–84. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-28199-1_6.
Full textTabuada, Paulo. "Verification." In Verification and Control of Hybrid Systems, 43–50. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-0224-5_5.
Full textConference papers on the topic "Verification"
Silva, Nuno, and Rui Lopes. "Independent Test Verification: Consolidated Experience Report." In Simpósio Brasileiro de Qualidade de Software. Sociedade Brasileira de Computação - SBC, 2012. http://dx.doi.org/10.5753/sbqs.2012.15326.
Full textHansen, O. H., J. Stang, and V. Jaiswal. "A Trustworthy Digital Twin for Data Driven Verification." In Offshore Technology Conference. OTC, 2024. http://dx.doi.org/10.4043/35081-ms.
Full textBacchini, Francine, Robert Damiano, Bob Bentley, Kurt Baty, Kevin Normoyle, Makoto Ishii, and Einat Yogev. "Verification." In the 41st annual conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/996566.996648.
Full textIbrahim, Mohamed, Hansi Liu, Minitha Jawahar, Viet Nguyen, Marco Gruteser, Richard Howard, Bo Yu, and Fan Bai. "Verification." In MobiCom '18: The 24th Annual International Conference on Mobile Computing and Networking. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3241539.3241555.
Full textDehbashi, Farzan, Ali Abedi, Tim Brecht, and Omid Abari. "Verification." In ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3447993.3448622.
Full textChen, Lu, Fang Liu, and Kannan Srinivasan. "Verification." In MobiCom '19: The 25th Annual International Conference on Mobile Computing and Networking. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3300061.3345445.
Full textLebrun, A., S. C. Kane, L. Bourva, S. Poirier, N. E. Loghin, and D. Langlands. "Improved verification methods for safeguards verifications at enrichment plants." In 2009 1st International Conference on Advancements in Nuclear Instrumentation, Measurement Methods and their Applications (ANIMMA). IEEE, 2009. http://dx.doi.org/10.1109/animma.2009.5503777.
Full textYang, Jin, and Avi Puder. "Tightly integrate dynamic verification with formal verification." In the 2005 conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1120725.1120860.
Full textPamula, Pranuti, Durga Prasad Gorthy, Phalguni Singh Ngangbam, and Aravindhan Alagarsamy. "Verification of SoC Using Advanced Verification Methodology." In HMAM2. Basel Switzerland: MDPI, 2023. http://dx.doi.org/10.3390/hmam2-14160.
Full textChitti, Sridevi, P. Chandrasekhar, and M. Asha Rani. "Gigabit Ethernet verification using efficient verification methodology." In 2015 International Conference on Industrial Instrumentation and Control (ICIC). IEEE, 2015. http://dx.doi.org/10.1109/iic.2015.7150935.
Full textReports on the topic "Verification"
Ernst, Michael. Verification Games: Crowd-Sourced Formal Verification. Fort Belvoir, VA: Defense Technical Information Center, March 2016. http://dx.doi.org/10.21236/ad1006471.
Full textKamboj, S., C. Yu, B. M. Biwer, and T. Klett. RESRAD-BUILD verification. Office of Scientific and Technical Information (OSTI), January 2002. http://dx.doi.org/10.2172/792140.
Full textDoebling, Scott William. Physics Verification Overview. Office of Scientific and Technical Information (OSTI), September 2017. http://dx.doi.org/10.2172/1392833.
Full textSimpkins, A. A. Verification of AXAIRQ. Office of Scientific and Technical Information (OSTI), October 1995. http://dx.doi.org/10.2172/221022.
Full textMcCowan, C. N., and J. D. Splett. Charpy machine verification :. Gaithersburg, MD: National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.260-171.
Full textMyers, Rodney S., and Geetha Mandava. Retention Model Verification. Fort Belvoir, VA: Defense Technical Information Center, March 2004. http://dx.doi.org/10.21236/ada421782.
Full textSimpkins, A. A. Verification of VENTSAR. Office of Scientific and Technical Information (OSTI), January 1995. http://dx.doi.org/10.2172/105111.
Full textStrichman, Ofer. Software Regression Verification. Fort Belvoir, VA: Defense Technical Information Center, December 2013. http://dx.doi.org/10.21236/ada594501.
Full textAlur, Rajeev, Luca de Alfaro, Thomas A. Henzinger, and Freddy Y. Mang. Automating Modular Verification. Fort Belvoir, VA: Defense Technical Information Center, January 1999. http://dx.doi.org/10.21236/ada461302.
Full textRaymond L. Mazza. PRODUCTION VERIFICATION TESTS. Office of Scientific and Technical Information (OSTI), September 2003. http://dx.doi.org/10.2172/822391.
Full text