Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 80.036
1.
  • Data Policy Data Policy
    syth, Ann Journal of the American Planning Association, 01/2022, Letnik: 88, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop
Celotno besedilo
Dostopno za: BFBNIB, DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
2.
  • Verification Settings Verification Settings
    Duncan, Whitney L. Anthropology and humanism, June 2022, 2022-06-00, 20220601, Letnik: 47, Številka: 1
    Journal Article
    Recenzirano
Celotno besedilo
Dostopno za: FZAB, GIS, IJS, IZUM, KILJ, NLZOH, NUK, OILJ, PILJ, PNG, SAZU, SBCE, SBMB, UL, UM, UPUK
3.
  • A logic for locally complet... A logic for locally complete abstract interpretations
    Bruni, Roberto; Giacobazzi, Roberto; Gori, Roberta ... 2021 36th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 06/2021
    Conference Proceeding
    Odprti dostop

    We introduce the notion of local completeness in abstract interpretation and define a logic for proving both the correctness and incorrectness of some program specification. Abstract interpretation ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
4.
  • Guiding Dynamic Symbolic Execution toward Unverified Program Executions
    Christakis, Maria; Muller, Peter; Wustholz, Valentin 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE), 05/2016
    Conference Proceeding
    Odprti dostop

    Most techniques to detect program errors, such as testing, code reviews, and static program analysis, do not fully verify all possible executions of a program. They leave executions unverified when ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM

PDF
5.
  • A Survey of Smart Contract ... A Survey of Smart Contract Formal Specification and Verification
    Tolmach, Palina; Li, Yi; Lin, Shang-Wei ... ACM computing surveys, 09/2022, Letnik: 54, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    A smart contract is a computer program that allows users to automate their actions on the blockchain platform. Given the significance of smart contracts in supporting important activities across ...
Celotno besedilo
Dostopno za: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK

PDF
6.
  • CoVeriTeam Service: Verific... CoVeriTeam Service: Verification as a Service
    Beyer, Dirk; Kanav, Sudeep; Wachowitz, Henrik 2023 IEEE/ACM 45th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), 05/2023
    Conference Proceeding
    Odprti dostop

    The research community has developed numerous tools for solving verification problems, but we are missing a common web interface for executing them. This means, users have to commit to install and ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
7.
  • Forecast verification: curr... Forecast verification: current status and future directions
    Casati, B.; Wilson, L. J.; Stephenson, D. B. ... Meteorological applications, March 2008, Letnik: 15, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Research and development of new verification strategies and reassessment of traditional forecast verification methods has received a great deal of attention from the scientific community in the last ...
Celotno besedilo
Dostopno za: BFBNIB, FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK

PDF
8.
  • Efficient sampling of SAT s... Efficient sampling of SAT solutions for testing
    Dutra, Rafael; Laeufer, Kevin; Bachrach, Jonathan ... 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE), 05/2018
    Conference Proceeding
    Odprti dostop

    In software and hardware testing, generating multiple inputs which satisfy a given set of constraints is an important problem with applications in fuzz testing and stimulus generation. However, it is ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM

PDF
9.
  • AsDroid: detecting stealthy... AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction
    Huang, Jianjun; Zhang, Xiangyu; Tan, Lin ... Proceedings of the 36th International Conference on Software Engineering, 05/2014
    Conference Proceeding

    Android smartphones are becoming increasingly popular. The open nature of Android allows users to install miscellaneous applications, including the malicious ones, from third-party marketplaces ...
Celotno besedilo
Dostopno za: NUK, UL
10.
Preverite dostopnost
1 2 3 4 5
zadetkov: 80.036

Nalaganje filtrov