Journal articles on the topic 'Verification'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Verification.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Benoit, Anne, Saurabh K. Raina, and Yves Robert. "Efficient checkpoint/verification patterns." International Journal of High Performance Computing Applications 31, no. 1 (July 28, 2016): 52–65. http://dx.doi.org/10.1177/1094342015594531.
Full textShaik, Bushra, Jyothi Manohar Katikireddy, Vamsidhar Kambham, and K. Sravani. "Offline Signature Verification Using Image Processing." E3S Web of Conferences 391 (2023): 01074. http://dx.doi.org/10.1051/e3sconf/202339101074.
Full textDeboo, Cyrus, Shubham Kshatriya, and Rajat Bhat. "Video Liveness Verification." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 2449–52. http://dx.doi.org/10.31142/ijtsrd12772.
Full textPucella, Riccardo. "Logical verification and equational verification." ACM SIGACT News 36, no. 2 (June 2005): 77–88. http://dx.doi.org/10.1145/1067309.1067326.
Full textRegehr, John, and Nathan Cooprider. "Interrupt Verification via Thread Verification." Electronic Notes in Theoretical Computer Science 174, no. 9 (June 2007): 139–50. http://dx.doi.org/10.1016/j.entcs.2007.04.002.
Full textSimonova, Natalia S. "An International Verifi cation Institute as an Element of the Mechanism of Ensuring for Meeting Commitments under International Treaties." Moscow Journal of International Law, no. 1 (March 30, 2014): 82–102. http://dx.doi.org/10.24833/0869-0049-2014-1-82-102.
Full textJiang, Long Long, and Dai Ping Li. "Using Contour Marking Bytecode Verification Algorithm on the Java Card." Applied Mechanics and Materials 556-562 (May 2014): 4120–23. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.4120.
Full textPhelps, Doug. "Verification." Cataloging & Classification Quarterly 9, no. 1 (December 19, 1988): 5–9. http://dx.doi.org/10.1300/j104v09n01_02.
Full textRobb, Jonathan Peter. "Verification." AJN, American Journal of Nursing 117, no. 6 (June 2017): 72. http://dx.doi.org/10.1097/01.naj.0000520263.18448.55.
Full textClassen, Julie. "Verification." Nursing Management (Springhouse) 40, no. 8 (August 2009): 8. http://dx.doi.org/10.1097/01.numa.0000359199.37081.f7.
Full textKassirer, Jerome P., and Richard I. Kopelman. "Verification." Hospital Practice 24, no. 1 (January 15, 1989): 21–30. http://dx.doi.org/10.1080/21548331.1989.11703639.
Full textKwiatkowska, Marta. "From software verification to ‘everyware’ verification." Computer Science - Research and Development 28, no. 4 (September 7, 2013): 295–310. http://dx.doi.org/10.1007/s00450-013-0249-1.
Full textDas, Rajat Suvra, and Arjun Pal Chowdhury. "Enhancing Semiconductor Functional Verification with Deep Learning with Innovation and Challenges." International Journal of Computing and Engineering 5, no. 3 (April 19, 2024): 22–32. http://dx.doi.org/10.47941/ijce.1814.
Full textRoache, Patrick J. "Code Verification by the Method of Manufactured Solutions." Journal of Fluids Engineering 124, no. 1 (November 12, 2001): 4–10. http://dx.doi.org/10.1115/1.1436090.
Full textFuller, David L., B. Ravikumar, and Yuzhe Zhang. "Unemployment Insurance Fraud and Optimal Monitoring." American Economic Journal: Macroeconomics 7, no. 2 (April 1, 2015): 249–90. http://dx.doi.org/10.1257/mac.20130255.
Full textSangargir, Maryam, and Joël Brose. "Safety Verification Procedure in the Implementation of Alternative Equipment Maintenance at The Ottawa Hospital." Journal of Clinical Engineering 49, no. 3 (July 2024): 108–13. http://dx.doi.org/10.1097/jce.0000000000000657.
Full textJadhav, Angarika, and Prof N. M. Shahane. "Privacy Preserving Biometric Verification." International Journal of Engineering Research 3, no. 1 (January 1, 2014): 6–8. http://dx.doi.org/10.17950/ijer/v3s1/102.
Full textChary, V. Vishnu Vardhan, and Ch Sandeep Ch.Sandeep. "Robust Offline Signature Verification." International Journal of Scientific Research 2, no. 12 (June 1, 2012): 93–95. http://dx.doi.org/10.15373/22778179/dec2013/30.
Full textYamada, Chikatoshi, Yasunori Nagata, and Zensho Nakao. "An Efficient Specification for System Verification." Journal of Advanced Computational Intelligence and Intelligent Informatics 10, no. 6 (November 20, 2006): 931–38. http://dx.doi.org/10.20965/jaciii.2006.p0931.
Full textYim, Joon-Seo, Chang-Jae Park, In-Cheol Park, and Chong-Min Kyung. "Design Verification of Complex Microprocessors." Journal of Circuits, Systems and Computers 07, no. 04 (August 1997): 301–18. http://dx.doi.org/10.1142/s021812669700022x.
Full textDong, Zhijiang, Yujian Fu, and Yue Fu. "Runtime Verification on Robotics Systems." International Journal of Robotics Applications and Technologies 3, no. 1 (January 2015): 23–40. http://dx.doi.org/10.4018/ijrat.2015010102.
Full textRangi, Anshuka, Long Tran-Thanh, Haifeng Xu, and Massimo Franceschetti. "Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 7 (June 28, 2022): 8054–61. http://dx.doi.org/10.1609/aaai.v36i7.20777.
Full textNajeeb, Shaima Miqdad Mohamed, Raid Rafi Omar Al-Nima, and Mohand Lokman Ahmad Al-Dabag. "Reinforced Deep Learning for Verifying Finger Veins." International Journal of Online and Biomedical Engineering (iJOE) 17, no. 07 (July 2, 2021): 19. http://dx.doi.org/10.3991/ijoe.v17i07.24655.
Full textGolodnova, N. N., and M. A. Pivovarova. "Verification of classification modernization solutions (the case study of Library Bibliographic Classification)." Scientific and Technical Libraries, no. 8 (August 14, 2023): 122–40. http://dx.doi.org/10.33186/1027-3689-2023-8-122-140.
Full textLazić, Ranko. "Verification column." ACM SIGLOG News 8, no. 2 (April 2021): 3. http://dx.doi.org/10.1145/3467001.3467002.
Full textLazić, Ranko. "Verification column." ACM SIGLOG News 7, no. 4 (October 2020): 3. http://dx.doi.org/10.1145/3458593.3458594.
Full textKrishna, Chandana. "Speaker Verification." IOSR Journal of VLSI and Signal Processing 2, no. 5 (2013): 01–08. http://dx.doi.org/10.9790/4200-0250108.
Full textMcGregor, John D. "Variation Verification." Journal of Object Technology 8, no. 2 (2009): 7. http://dx.doi.org/10.5381/jot.2009.8.2.c1.
Full textYehia, Ahmed. "Scalable Verification." International Conference on Electrical Engineering 9, no. 9th (May 1, 2014): 1. http://dx.doi.org/10.21608/iceeng.2014.30507.
Full textLazić, Ranko. "Verification column." ACM SIGLOG News 8, no. 3 (July 2021): 5. http://dx.doi.org/10.1145/3477986.3477987.
Full textVardi, Moshe Y. "Program verification." Communications of the ACM 64, no. 7 (July 2021): 5. http://dx.doi.org/10.1145/3469113.
Full textLazić, Ranko. "Verification column." ACM SIGLOG News 8, no. 4 (October 2021): 3. http://dx.doi.org/10.1145/3527372.3527373.
Full textLazić, Ranko. "Verification column." ACM SIGLOG News 9, no. 1 (January 2022): 5. http://dx.doi.org/10.1145/3527540.3527541.
Full textRungta, Neha. "Verification column." ACM SIGLOG News 3, no. 3 (August 8, 2016): 66. http://dx.doi.org/10.1145/2984450.2984458.
Full textRungta, Neha. "Verification column." ACM SIGLOG News 2, no. 2 (April 22, 2015): 28. http://dx.doi.org/10.1145/2766189.2766194.
Full textLazić, Ranko. "Verification column." ACM SIGLOG News 7, no. 3 (November 16, 2020): 28. http://dx.doi.org/10.1145/3436980.3436983.
Full textDrell, Sidney D. "Verification Triumphs." Bulletin of the Atomic Scientists 47, no. 9 (November 1991): 28–29. http://dx.doi.org/10.1080/00963402.1991.11460036.
Full textMaruyama. "Hardware Verification." Computer 18, no. 2 (February 1985): 22–32. http://dx.doi.org/10.1109/mc.1985.1662796.
Full textLazić, Ranko. "Verification column." ACM SIGLOG News 5, no. 4 (November 12, 2018): 25. http://dx.doi.org/10.1145/3292048.3292051.
Full textRungta, Neha. "Verification column." ACM SIGLOG News 4, no. 2 (May 3, 2017): 54. http://dx.doi.org/10.1145/3090064.3090069.
Full textO’Sullivan, Jack W., Amitava Banerjee, Carl Heneghan, and Annette Pluddemann. "Verification bias." BMJ Evidence-Based Medicine 23, no. 2 (February 27, 2018): 54–55. http://dx.doi.org/10.1136/bmjebm-2018-110919.
Full textLazić, Ranko. "Verification column." ACM SIGLOG News 5, no. 3 (July 26, 2018): 66. http://dx.doi.org/10.1145/3242953.3242963.
Full textRicanek, Karl. "Kinship Verification." Computer 53, no. 1 (January 2020): 7–8. http://dx.doi.org/10.1109/mc.2019.2952537.
Full textAtkins, Wendy. "Speaker verification." Biometric Technology Today 8, no. 3 (March 2000): 8–11. http://dx.doi.org/10.1016/s0969-4765(00)03012-5.
Full textMeenakshi, B. "Formal verification." Resonance 10, no. 5 (May 2005): 26–38. http://dx.doi.org/10.1007/bf02871329.
Full textAguilera, Juan Pablo, and David Fernández-Duque. "Verification logic." Journal of Logic and Computation 27, no. 8 (August 14, 2017): 2451–69. http://dx.doi.org/10.1093/logcom/exx027.
Full textSivilotti, Paolo A. G. "Verification Benchmarks." ACM SIGSOFT Software Engineering Notes 43, no. 3 (December 7, 2018): 19. http://dx.doi.org/10.1145/3229783.3299107.
Full textLazić, Ranko. "Verification column." ACM SIGLOG News 6, no. 2 (April 22, 2019): 42. http://dx.doi.org/10.1145/3326938.3326941.
Full textRungta, Neha. "Verification column." ACM SIGLOG News 3, no. 2 (May 31, 2016): 68. http://dx.doi.org/10.1145/2948896.2948904.
Full textLazić, Ranko. "Verification column." ACM SIGLOG News 7, no. 2 (April 29, 2020): 3. http://dx.doi.org/10.1145/3397619.3397620.
Full text