Sciweavers

5525 search results - page 183 / 1105
» Verification of Model Transformations
Sort
View
109
Voted
FM
2003
Springer
129views Formal Methods» more  FM 2003»
15 years 8 months ago
Trends in Software Verification
With the steady increase in computational power of general purpose computers, our ability to analyze routine software artifacts is also steadily increasing. As a result, we are wit...
Gerard J. Holzmann
FORTE
2004
15 years 5 months ago
Automatized Verification of Ad Hoc Routing Protocols
Numerous specialized ad hoc routing protocols are currently proposed for use, or being implemented. Few of them have been subjected to formal verification. This paper evaluates two...
Oskar Wibling, Joachim Parrow, Arnold Neville Pear...
132
Voted
TCAD
2008
181views more  TCAD 2008»
15 years 3 months ago
A Survey of Automated Techniques for Formal Software Verification
The quality and the correctness of software is often the greatest concern in electronic systems. Formal verification tools can provide a guarantee that a design is free of specific...
Vijay D'Silva, Daniel Kroening, Georg Weissenbache...
109
Voted
ICASSP
2009
IEEE
15 years 10 months ago
Support vector machines and Joint Factor Analysis for speaker verification
This article presents several techniques to combine between Support vector machines (SVM) and Joint Factor Analysis (JFA) model for speaker verification. In this combination, the...
Najim Dehak, Patrick Kenny, Réda Dehak, Ond...
141
Voted
ACSC
2007
IEEE
15 years 7 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...