Search alternatives:
"specification" » "specifications" (Expand Search), "purification" (Expand Search)
"publication" » "publications" (Expand Search)
"verification" » "modification" (Expand Search)
"specification" » "specifications" (Expand Search), "purification" (Expand Search)
"publication" » "publications" (Expand Search)
"verification" » "modification" (Expand Search)
-
1
Specification and Verification of Strong Timing Isolation of Hardware Enclaves
Published 2025Get full text
Article -
2
What is formal verification without specifications? A survey on mining LTL specifications
Published 2024“…Virtually all verification techniques using formal methods rely on the availability of a formal specification, which describes the design requirements precisely. …”
Book section -
3
-
4
APB bus IWDG verification based on universal verification methodology
Published 2024“…A structured verification plan, alongside specific test cases, is meticulously crafted to validate the IWDG module's functionality comprehensively. …”
Get full text
Thesis-Master by Coursework -
5
Specification mining for digital circuits
Published 2016“…During the verification of a hardware system, one of the most important steps is formal specification which is used to describe a system and to analyze its behaviors. …”
Get full text
Final Year Project (FYP) -
6
Live Verification in an Interactive Proof Assistant
Published 2024“…We prototyped our technique in the interactive proof assistant Coq, so our framework creates machine-checked proofs that the developed functions satisfy their specifications when executed according to the formal semantics of the source language. …”
Get full text
Article -
7
Speed up verification with hardware accelerator
Published 2018“…It also makes the normal ways of verification a bottleneck in the Integrated Circuit (IC) design process due to the cost and time-to-market requirement. …”
Get full text
Thesis -
8
Counterexample computation in compositional nonblocking verification
Published 2018Subjects: “…Verification…”
Get full text
Get full text
Journal Article -
9
Probabilistic verification beyond context-freeness
Published 2024“…Originating from the Restricted Tree-Stack Automaton (rTSA), the rPTSA model inherits broad connections to various fields, including linguistics and higher-order verification. Building on these connections, the research also introduces Probabilistic Additive HORS (PAHORS), which incorporates an affineness constraint and pair-product structures into PHORS.…”
Thesis -
10
The development of electronic publication in China
Published 2021“…The article discusses the current situation of electronic publication in China: its achievement and its problems. …”
Get full text
Journal Article -
11
Unprinted: publication beyond the press
Published 2025“…This Element explores the idea of publication in media used before, alongside, and after print. …”
Book -
12
Foundational Integration Verification of a Cryptographic Server
Published 2024“…We present verification of a bare-metal server built using diverse implementation techniques and languages against a whole-system input-output specification in terms of machine code, network packets, and mathematical specifications of elliptic-curve cryptography. …”
Get full text
Article -
13
American Society for Echocardiography Software Suite for Verification and
Published 2005“…In this paper, we discuss a software suite soon to be released into the public domain for reading, parsing and verifying DICOM 3.0 ultrasonic objects. …”
Get full text
Article -
14
-
15
-
16
Translation of culture-specific items in foreign publicity texts : a case study of a bite of China II episode 1 & 2
Published 2020“…The particular text type of foreign publicity requires the translation to be accurate, objective and communicative, which poses more challenges in CSI translation. …”
Get full text
Thesis-Master by Coursework -
17
Expectation vs. reality: towards verification of psychological games
Published 2024“…In this paper, we start to bridge that gap, proposing methods to solve PGs and implementing them within PRISM-games, a formal verification tool for stochastic games. We discuss how to model these games, highlight specific challenges for their analysis and illustrate the usefulness of our approach on several case studies, including human behaviour in traffic scenarios.…”
Book section -
18
Experimental verification of breeding performance of fast reactor blankets.
Published 2024Get full text
Thesis -
19
Discriminative deep metric learning for face verification in the wild
Published 2015“…Our method achieves very competitive face verification performance on the widely used LFW and YouTube Faces (YTF) datasets.…”
Get full text
Get full text
Conference Paper -
20
Robust text-independent speaker verification in environmental noise
Published 2011“…Automatic speaker verification has many potential applications in security, surveillance and access control. …”
Get full text
Thesis