Sciweavers

1036 search results - page 34 / 208
» Verification Programs for Abduction
Sort
View
CCR
2004
151views more  CCR 2004»
15 years 4 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
CSI
2004
186views more  CSI 2004»
15 years 3 months ago
Towards a BioAPI compliant face verification system
Standards are important to the growth and acceptance of emerging industries such as the biometric industry. To promote biometric standard, the BioAPI Consortium has developed a wi...
X. Yuan, Siu Cheung Hui, Maylor K. H. Leung, Yongs...
SEFM
2009
IEEE
15 years 10 months ago
Completeness of Pointer Program Verification by Separation Logic
Makoto Tatsuta, Wei-Ngan Chin, Mahmudul Faisal Al ...
104
Voted
FM
2009
Springer
118views Formal Methods» more  FM 2009»
15 years 10 months ago
Certifiable Specification and Verification of C Programs
Christoph Lüth, Dennis Walter