DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 79.648
1.
  • Data Policy Data Policy
    syth, Ann Journal of the American Planning Association, 01/2022, Letnik: 88, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop
Celotno besedilo
Dostopno za: UL
2.
  • Verification Settings Verification Settings
    Duncan, Whitney L. Anthropology and humanism, June 2022, 2022-06-00, 20220601, Letnik: 47, Številka: 1
    Journal Article
    Recenzirano
Celotno besedilo
Dostopno za: UL
3.
  • A logic for locally complet... A logic for locally complete abstract interpretations
    Bruni, Roberto; Giacobazzi, Roberto; Gori, Roberta ... 2021 36th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 06/2021
    Conference Proceeding
    Odprti dostop

    We introduce the notion of local completeness in abstract interpretation and define a logic for proving both the correctness and incorrectness of some program specification. Abstract interpretation ...
Celotno besedilo
Dostopno za: UL
4.
  • Guiding Dynamic Symbolic Execution toward Unverified Program Executions
    Christakis, Maria; Muller, Peter; Wustholz, Valentin 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE), 05/2016
    Conference Proceeding
    Odprti dostop

    Most techniques to detect program errors, such as testing, code reviews, and static program analysis, do not fully verify all possible executions of a program. They leave executions unverified when ...
Celotno besedilo
Dostopno za: UL

PDF
5.
  • A Survey of Smart Contract ... A Survey of Smart Contract Formal Specification and Verification
    Tolmach, Palina; Li, Yi; Lin, Shang-Wei ... ACM computing surveys, 09/2022, Letnik: 54, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    A smart contract is a computer program that allows users to automate their actions on the blockchain platform. Given the significance of smart contracts in supporting important activities across ...
Celotno besedilo
Dostopno za: UL

PDF
6.
  • CoVeriTeam Service: Verific... CoVeriTeam Service: Verification as a Service
    Beyer, Dirk; Kanav, Sudeep; Wachowitz, Henrik 2023 IEEE/ACM 45th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), 05/2023
    Conference Proceeding
    Odprti dostop

    The research community has developed numerous tools for solving verification problems, but we are missing a common web interface for executing them. This means, users have to commit to install and ...
Celotno besedilo
Dostopno za: UL
7.
  • Forecast verification: curr... Forecast verification: current status and future directions
    Casati, B.; Wilson, L. J.; Stephenson, D. B. ... Meteorological applications, March 2008, Letnik: 15, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Research and development of new verification strategies and reassessment of traditional forecast verification methods has received a great deal of attention from the scientific community in the last ...
Celotno besedilo
Dostopno za: UL

PDF
8.
  • Linear-time temporal logic ... Linear-time temporal logic guided greybox fuzzing
    Meng, Ruijie; Dong, Zhen; Li, Jialin ... 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE), 05/2022
    Conference Proceeding
    Odprti dostop

    Software model checking as well as runtime verification are verification techniques which are widely used for checking temporal properties of software systems. Even though they are property ...
Celotno besedilo
Dostopno za: UL
9.
  • Efficient sampling of SAT s... Efficient sampling of SAT solutions for testing
    Dutra, Rafael; Laeufer, Kevin; Bachrach, Jonathan ... 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE), 05/2018
    Conference Proceeding
    Odprti dostop

    In software and hardware testing, generating multiple inputs which satisfy a given set of constraints is an important problem with applications in fuzz testing and stimulus generation. However, it is ...
Celotno besedilo
Dostopno za: UL

PDF
10.
  • AsDroid: detecting stealthy... AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction
    Huang, Jianjun; Zhang, Xiangyu; Tan, Lin ... Proceedings of the 36th International Conference on Software Engineering, 05/2014
    Conference Proceeding

    Android smartphones are becoming increasingly popular. The open nature of Android allows users to install miscellaneous applications, including the malicious ones, from third-party marketplaces ...
Celotno besedilo
Dostopno za: UL
1 2 3 4 5
zadetkov: 79.648

Nalaganje filtrov