Search alternatives:
"verification" » "modification" (Expand Search)
Showing 21 - 40 results of 218 for search '"verification"', query time: 0.06s Refine Results
  1. 21

    A contract negotiation scheme for safety verification of interconnected systems by Tan, X, Papachristodoulou, A, Dimarogonas, DV

    Published 2024
    “…This paper proposes a (control) barrier function synthesis and safety verification scheme for interconnected nonlinear systems based on assume-guarantee contracts (AGC) and sum-of-squares (SOS) techniques. …”
    Journal article
  2. 22

    Vehicle number plate detection and verification using yolo frameworks. by H. Hussein, S. Y. S., M. Ariff, M. H., A. Rahman, M. A.

    Published 2023
    “…The system aims to compare the effectiveness of different frameworks by outlining each one's unique advantages and disadvantages by determining the best performance in terms of confidence level and accuracy. The verification is applied to the Malaysian number plates following the regulation of the Malaysian transportation system. …”
    Get full text
    Article
  3. 23

    UVM-based PCIe interrupt model for verification of networking platform IP by Liu, Nanxi

    Published 2023
    “…This means there is currently no appropriate interrupt model for verification of Network system IP at both the IP and SoC levels. …”
    Get full text
    Thesis-Master by Coursework
  4. 24

    Separation microkernel security studies and its formal verification related work by Lu, Shengliang

    Published 2016
    “…In order to guarantee that it is free of bugs and is following security policies, completely formal verification on XtratuM is conducted by Securify team. …”
    Get full text
    Final Year Project (FYP)
  5. 25

    kboolnet: a toolkit for the verification, validation, and visualization of reaction-contingency (rxncon) models by Carretero Chavez, Willow, Krantz, Marcus, Klipp, Edda, Kufareva, Irina

    Published 2023
    “…The verification script VerifyModel.R checks for responsiveness to repeated stimulations as well as consistency of steady state behavior. …”
    Get full text
    Article
  6. 26
  7. 27
  8. 28
  9. 29
  10. 30

    Towards formal verification of Bayesian inference in probabilistic programming via guaranteed bounds by Zaiser, F

    Published 2024
    “…Overall, these contributions mark a significant step towards formal verification of Bayesian inference results in probabilistic programming.…”
    Thesis
  11. 31

    What is formal verification without specifications? A survey on mining LTL specifications by Neider, D, Roy, R

    Published 2024
    “…Virtually all verification techniques using formal methods rely on the availability of a formal specification, which describes the design requirements precisely. …”
    Book section
  12. 32

    Implementation of industry-standard functional coverage in UVM testbench for SoC level verification by Zhang, Shaoyan

    Published 2023
    “…As ICs(Integrated Circuits)process technologies and SoC (system-on-chip) design techniques continue to advance, IC chip designs continue to grow in size and complexity. Verification IP automates the generation of test stimulus, data comparison and coverage statistics, and its verification components are well integrated and reused in the SoC system-level verification environment. …”
    Get full text
    Thesis-Master by Coursework
  13. 33

    Chebyshev Functional Link Neural Network-based modeling and experimental verification for photovoltaic arrays by Jiang, Lian Lian., Maskell, Douglas L., Patra, Jagdish C.

    Published 2013
    “…In the experimental section, the operating current predicted by CFLNN is compared with the outputs from other two modeling methods - MLP and the two-diode model. Finally, verification is performed using experimental datasets. …”
    Get full text
    Get full text
    Conference Paper
  14. 34

    Dose verification of 3D printed male pelvic phantom for radiotherapy quality assurance by Maniam, Peraveen M

    Published 2024
    “…In addition, dose verification was conducted using the phantom with thermoluminescent dosimeter-100 (TLD-100) and ionisation chamber. …”
    Get full text
    Monograph
  15. 35
  16. 36

    Verification of social media content for news production: a thematic review of journalistic technique and strategies by Baharom, Melinda, Ghazali, Akmar Hayati Ahmad, Bin Ahmad, Abdul Mua'ti Zamri

    Published 2023
    “…This study will benefit knowledge of journalists' verification social media techniques and strategies and future study of journalists' verification practices.…”
    Get full text
    Article
  17. 37
  18. 38

    Achieving 500x acceleration for adversarial robustness verification of tree-based smart grid dynamic security assessment by Ren, Chao, Zou, Chunran, Xiong, Zehui, Yu, Han, Dong, Zhao Yang, Dusit, Niyato

    Published 2024
    “…This letter presents a novel and efficient adversarial robustness verification method for tree-based smart grid dynamic security assessment (DSA). …”
    Get full text
    Journal Article
  19. 39
  20. 40