Showing 321 - 340 results of 3,898 for search '("specification" OR ("verifications" OR "verification"))', query time: 0.12s Refine Results
  1. 321

    Automatic program repair and synthesis using genetic programming by Lee, Yue Yu

    Published 2017
    “…When bugs in a program are identified by a debugger or a program verifier, the developer of the program would have to manually interpret the bugs, refine the program, and perform verification for the fix until the program is bug free. …”
    Get full text
    Final Year Project (FYP)
  2. 322

    Identification of alternative-splicing events in human monocyte differentiation by Sim, Donald Yuhui

    Published 2018
    “…The data obtained from RNA-seq still required verification through traditional methods, such as RT-PCR. …”
    Get full text
    Final Year Project (FYP)
  3. 323

    16.358J / 16.863J System Safety, Spring 2005 by Leveson, Nancy

    Published 2005
    “…Topics covered include: the nature of risk, formal accident and human error models, causes of accidents, fundamental concepts of system safety engineering, system and software hazard analysis, designing for safety, fault tolerance, safety issues in the design of human-machine interaction, verification of safety, creating a safety culture, and management of safety-critical projects. …”
    Get full text
    Learning Object
  4. 324
  5. 325

    On Modular Pluggable Analyses Using Set Interfaces by Lam, Patrick, Kuncak, Viktor, Rinard, Martin

    Published 2005
    “…Each analysis verifies that the implementation of themodule 1) preserves important internal data structure representationinvariants and 2) conforms to a specification that uses formulas in a setalgebra to characterize the effects of operations on the data structure.The analyses use the common set abstraction to 1) characterize howobjects participate in multiple data structures and to 2) enable the interanalysiscommunication required to verify properties that depend onmultiple modules analyzed by different analyses.We characterize the key soundness property that an analysis plugin mustsatisfy to successfully participate in our system and present several analysisplugins that satisfy this property: a flag plugin that analyzes modulesin which abstract set membership is determined by a flag field in eachobject, and a graph types plugin that analyzes modules in which abstractset membership is determined by reachability properties of objects storedin tree-like data structures.…”
    Get full text
  6. 326

    Exploring human computation via interactive online application by Lee, Ming Hua.

    Published 2010
    “…This is a FYP Final Report to document all relevant background information, the game specification, its test results and findings regarding the project "Exploring Human Computation via Interactive Online Application". …”
    Get full text
    Final Year Project (FYP)
  7. 327

    SEM-I rational MT : enriching deep grammars with a semantic interface for scalable machine translation by Bond, Francis, Flickinger, Dan., Lønning, Jan Tore., Dyvik, Helge., Oepen, Stephan.

    Published 2011
    “…In the LOGON machine translation system where semantic transfer using Minimal Recursion Semantics is being developed in conjunction with two existing broad-coverage grammars of Norwegian and English, we motivate the use of a grammar-specific semantic interface (SEM-I) to facilitate the construction and maintenance of a scalable translation engine. …”
    Get full text
    Get full text
    Conference Paper
  8. 328

    Mechanised Hypersafety Proofs about Structured Data by Gladshtein, Vladimir, Zhao, Qiyuan, Ahrens, Willow, Amarasinghe, Saman, Sergey, Ilya

    Published 2024
    “…To turn this observation into an effective verification methodology, we developed the Logic for Graceful Tensor Manipulation (LGTM), a new Hoare-style relational separation logic for specifying and verifying computations over structured data. …”
    Get full text
    Article
  9. 329

    3D Printing for Marketing and Advertisement Industry by Wu, Wenjin, Tor, Shu Beng

    Published 2016
    “…3D printing provides a new dimension for the communication of value of products and services to the audience through concept modelling, which prevents ambiguity of design throughout the product life cycle for design, visualisation, verification and presentation purposes. It provides near identical model of the prelaunch product for the customer to touch and see, and even to test the product functionality. …”
    Get full text
    Get full text
    Conference Paper
  10. 330

    DDA based grouting prediction and linkage between fracture aperture distribution and grouting characteristics by Xiao, Fei, Shang, Junlong, Zhao, Zhiye

    Published 2021
    “…The observed agreement can be treated as an indirect verification of the robustness of our proposed grouting module. …”
    Get full text
    Journal Article
  11. 331

    Game theoretical security detection strategy for networked systems by Wu, Hao, Wang, Wei, Wen, Changyun, Li, Zhengguo

    Published 2020
    “…Finally, a sampling based Nash equilibrium verification and calculation approach is proposed for the game model with continuous kernels. …”
    Get full text
    Journal Article
  12. 332

    Protecting FPGA design with elliptic curve cryptography by Wei, Wei

    Published 2014
    “…This report discusses the complete FPGA design process, including architectural design, scheduling, Verilog coding, simulation and on-board verification.…”
    Get full text
    Final Year Project (FYP)
  13. 333

    Investigation and enhancement of viola jones face detection algorithm performance using contrast-limited adaptive histogram equalization by Mulyadi, Erina

    Published 2015
    “…Face detection is the first and the most important steps to the entire face analysis algorithms, including face alignment, face relighting, face modeling, face recognition, head pose tracking, face verification/authentication, facial expression tracking/recognition, gender or age recognition, and many more. [1] While this sound like a simple task for humans, it is still an extremely challenging task for computers. …”
    Get full text
    Final Year Project (FYP)
  14. 334

    Determining the impact of unexpected disruptions to a complex supply chain by Aw, Waldron Jun Jie

    Published 2016
    “…A FlexSim model was created to study the propagation of disruptions in a supply chain. Verification was done by checking the structure, code and animated flow of the entities. …”
    Get full text
    Final Year Project (FYP)
  15. 335

    Heterologous expression of cannabidiolic acid synthase in a microbial host for cannabinoid production by Toh, Wing Loon

    Published 2019
    “…DsbA CBDAS appears to have yielded some success in obtaining a soluble protein but further verification is required. Fusion with expression reporter mCherry produced a soluble, and correctly folded mCherry protein but appeared to show degradation of CBDAS despite a correctly constructed plasmid. …”
    Get full text
    Final Year Project (FYP)
  16. 336

    Efficient visual search for objects in videos by Sivic, J, Zisserman, A

    Published 2008
    “…We discuss three research directions for the presented video retrieval approach and review some recent work addressing them: 1) building visual vocabularies for very large-scale retrieval; 2) retrieval of 3-D objects; and 3) more thorough verification and ranking using the spatial structure of objects.…”
    Journal article
  17. 337

    Complexity-Theoretic Limitations on Quantum Algorithms for Topological Data Analysis by Schmidhuber, Alexander, Lloyd, Seth

    Published 2024
    “…Finally, we argue that an exponential quantum advantage can be recovered if the input data is given as a specification of simplices rather than as a list of vertices and edges.…”
    Get full text
    Article
  18. 338

    Breast cancer diagnosis through an optimization-driven multispectral gamma correction (ODMGC) by Raj A, Arul Edwin, Ahmad, Nabihah, Durai S, Ananiah

    Published 2024
    “…The classifier results showed an accuracy of 96.4%, sensitivity of 98.1%, and specificity of 96.9%.…”
    Get full text
    Article
  19. 339

    Sure (EM)-Autometrics: An Automated Model Selection Procedure with Expectation Maximization Algorithm Estimation Method (S/O 14925) by Kamarudin, Nur Azulia

    Published 2021
    “…Three econometric models have been utilised as a testbed for true specification search. The results were divided into four categories where a tight significance level of 1% had contributed a high percentage of all equations in the model contain variables precisely comparable to the true specifications. …”
    Get full text
    Monograph
  20. 340

    Financial option insurance by Wang, Qi-Wen, Shu, Jian-Jun

    Published 2017
    “…It consists of two portions: the business strategy of matching and a verification-and-modification process. The proposed model enables the option investors with calls and puts of different moneyness to be protected by the issued option insurance. …”
    Get full text
    Get full text
    Journal Article