Showing 1 - 20 results of 617 for search '"formal verification"', query time: 0.27s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Formal verification of security protocols by Mok, Xin Mun

    Published 2022
    “…Formal verification is the use of mathematical rules and logic to ensure the correctness of a system, whereby the system does not reach an undesirable state given a set of actions. …”
    Get full text
    Final Year Project (FYP)
  7. 7
  8. 8
  9. 9

    Formal Verification, Engineering and Business Value by Ralf Huuck

    Published 2012-12-01
    “…How to package this technology in a way that it can be used by software developers and engineers, who might have no background in formal verification? And how to convince business managers to actually pay for such a software? …”
    Get full text
    Article
  10. 10
  11. 11

    Formal Verification of STPA with Model Checking by Ryeonggu Kwon, Gihwon Kwon

    Published 2023-03-01
    Subjects: “…formal verification, model checking, STPA…”
    Get full text
    Article
  12. 12

    Formal Verification of Robot Rotary Kinematics by Guojun Xie, Huanhuan Yang, Hao Deng, Zhengpu Shi, Gang Chen

    Published 2023-01-01
    Subjects: “…formal verification…”
    Get full text
    Article
  13. 13
  14. 14

    Formal Verification of an Implementation of the Roughtime Server by Altamirano, Christian

    Published 2022
    “…Formal verification has been used in the past few decades to prove correctness of programs. …”
    Get full text
    Thesis
  15. 15

    Formal verification meets stochastic analysis by Cosentino, F

    Published 2021
    “…<p>The thesis goal is to explore the relations between Formal Verification techniques in Computer Science and Stochastic Analysis in Mathematics. …”
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    Formal Verification of the xDAuth Protocol by Alam, Q., Tabbasum, S., Malik, S.U.R., Alam, M., Ali, T., Akhunzada, A., Khan, S.U., Vasilakos, A.V., Buyya, R.

    Published 2016
    “…This paper focuses on the formal verification of the xDAuth protocol, which is one of the prominent protocols for identity management in cross domain scenarios. …”
    Article
  20. 20