Sciweavers

1036 search results - page 34 / 208
» Verification Programs for Abduction
Sort
View
CCR
2004
151views more  CCR 2004»
15 years 17 days ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
143
Voted
CSI
2004
186views more  CSI 2004»
15 years 16 days ago
Towards a BioAPI compliant face verification system
Standards are important to the growth and acceptance of emerging industries such as the biometric industry. To promote biometric standard, the BioAPI Consortium has developed a wi...
X. Yuan, Siu Cheung Hui, Maylor K. H. Leung, Yongs...
SEFM
2009
IEEE
15 years 7 months ago
Completeness of Pointer Program Verification by Separation Logic
Makoto Tatsuta, Wei-Ngan Chin, Mahmudul Faisal Al ...