Search results
Create the page "System verification" on this wiki! See also the search results found.
- ...nt of view, there are open issues at many levels. Among the others, at the system design level, both traditional approaches based on UML and approaches takin ...ast years, and many attempts at using formal methods for specification and verification in this setting have been made. Session correlation, service types, contrac7 KB (957 words) - 15:15, 11 August 2008
- During the last couple of years, several approaches for system verification, development and evolution methodology. This9 KB (1,151 words) - 18:27, 13 October 2008
- hardly fully capture during the system development. User requirements of requirements in a progressive manner by starting from system-level4 KB (471 words) - 23:33, 13 August 2008
- ...ities include but are not limited to formal methods, software and hardware verification, static analysis, programming languages, software engineering, real-time sy * Specification and verification techniques for finite and infinite-state systems;4 KB (543 words) - 16:39, 16 July 2020
- Programming and system engineering: ORC paradigms, object/component specification, design, verification, validation, testing, maintenance,5 KB (715 words) - 17:43, 11 September 2008
- for design, development, testing, analysis, and verification of correct Submissions should be uploaded at EasyChair Conference system:5 KB (614 words) - 17:22, 11 September 2008
- (architecture/system-oriented), (iii) methodologies/languages properties (like cooperation, coordination etc...), agent verification10 KB (1,371 words) - 16:14, 12 November 2020
- |Field=Software Verification software verification. The Working Conference is open to anyone who is5 KB (686 words) - 12:27, 12 September 2008
- ...levels, formal, semi-formal, and specification-driven verification on the system level. Transaction-level modeling. * 2. Design and verification methods for composition of concurrent systems: Multi-core architectures, ne5 KB (708 words) - 18:23, 13 October 2008
- ...tworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in p ...dels, negotiation, cooperation, competition, self-organization, emergence, verification etc.9 KB (1,216 words) - 17:32, 14 October 2008
- .System on Chip (SoC) and Multicore systems .Hardware/Software Co-Verification3 KB (375 words) - 17:48, 14 October 2008
- ...hitecture: Novel logic block architectures, combination of FPGA fabric and system blocks (DSP, processors, memories, etc.), design of routing fabric, I/O int ...chnology mapping, system-level partitioning, logic generators, testing and verification, CAD for FPGA-based accelerators, CAD for incremental FPGA design and on-li4 KB (561 words) - 17:48, 14 October 2008
- Verification and validation (including model checking) of dependable software architectu .... All received papers will be acknowledged via the an automated submission system.7 KB (960 words) - 17:48, 14 October 2008
- ...sign, logic and behavioral synthesis, logic mapping, simulation and formal verification, layout (partitioning, placement, routing, floorplanning, compaction), algo and the classification system detailed at: http://www.acm.org/class/1998/4 KB (459 words) - 21:03, 14 October 2008
- ...lgorithms for: analytic modeling, system measurement and monitoring, model verification and validation, simulation, statistical analysis, experimental design, and3 KB (361 words) - 21:16, 14 October 2008
- - Reliability: verification and validation; model checking; = and business models; large-scale system integration; legal, economic9 KB (1,193 words) - 22:53, 14 October 2008
- �?� Cooperative design analysis, verification, integration and interoperability, standards �?� System architecture, prototypes, user interfaces for CV: web applications, textual4 KB (468 words) - 22:54, 14 October 2008
- - automata for system analysis and programme verification6 KB (788 words) - 23:01, 14 October 2008
- - Program and system verification5 KB (799 words) - 21:49, 26 February 2020
- Petri nets (system design/verification with nets, protocols and networks) Time series and system modeling5 KB (634 words) - 23:05, 14 October 2008
- exploitation of theory through methods and tools for system * software specification, refinement, verification and testing8 KB (1,085 words) - 18:01, 12 February 2009
- - automata for system analysis and programme verification7 KB (994 words) - 23:06, 14 October 2008
- * Reasoning over MOF-based models using ontologies: verification and * Ontology connectors to system models: methods and techniques for8 KB (994 words) - 23:09, 14 October 2008
- ...ications often require the creation of a collaborative workflow management system as part of their sophisticated problem solving processes so that e-scientis · Workflow verification and validation in grid environments7 KB (886 words) - 23:10, 14 October 2008
- ...ng the management of experiment routines, a scientific workflow management system hides the underlying integration details of the e-Science resources and all ...tions were organized as three sessions: scientific workflows applications, system architecture and middleware, and development issues. A special session for4 KB (560 words) - 23:10, 14 October 2008
- in a distributed embedded system is quite important for the military, sub-areas of research: adaptation of system operations to the network5 KB (651 words) - 23:13, 14 October 2008
- * Verification and validation of resilient systems * System structuring for resilience9 KB (1,264 words) - 18:14, 8 November 2008
- # SOA-based system testing and maintenance * Industry System Experience and Report6 KB (733 words) - 12:48, 27 October 2016
- ...ngoing and planned efforts towards this vision: CORDET, DOMENG, SOIS, AOCS system studies, ASSERT, spin-in from IMA and AUTOSAR etc... * AOCS system architecture studies18 KB (2,714 words) - 23:23, 14 October 2008
- - Embedded System Architecture for Ubiquitous - Specification, Validation and Verification of Embedded System and Software6 KB (697 words) - 23:19, 14 October 2008
- | Title = The Second IEE International Conference on Secure System Integration and Reliability Improvement # System integration for human computer interaction3 KB (337 words) - 23:20, 14 October 2008
- ...UBICC journal is to publish the most recent results in the development of system aspects of ubiquitous computing. Researchers and practitioners working in t Confidentiality, Data and system integrity4 KB (502 words) - 23:20, 14 October 2008
- * System-in-package design * Electronic System Level Design2 KB (282 words) - 23:21, 14 October 2008
- Any submission whose content is relevant to the area of resource constrained system design will be considered, but submission whose subject matter is related t * formal techniques for verification and validation of2 KB (254 words) - 23:22, 14 October 2008
- * Computer and system architectures * Test and verification3 KB (377 words) - 23:24, 14 October 2008
- * embedded system hardware/software co-design and co-verification * network and system on-a-chip and applications9 KB (1,181 words) - 00:37, 15 October 2008
- * Test, Verification, and Reliability * System Packaging & Integration2 KB (228 words) - 23:24, 14 October 2008
- * System-Level Design, Simulation, and Verification2 KB (275 words) - 23:24, 14 October 2008
- * Computer and system architectures * Test and verification3 KB (391 words) - 23:24, 14 October 2008
- In the last years, new system concepts have been promoted and partially embedded in new deployments. Anti ...eworks and system design methodologies supported by appropriate models and system specification languages, the deployment of application-oriented systems rai11 KB (1,492 words) - 23:26, 14 October 2008
- - Model analysis, verification and validation. ...made electronically in PDF format via the ACM SAC online track management system at http://sac.cs.iupui.edu/SAC2009/6 KB (746 words) - 23:26, 14 October 2008
- In the last years, new system concepts have been promoted and partially embedded in new deployments. Anti ...eworks and system design methodologies supported by appropriate models and system specification languages, the deployment of application-oriented systems rai6 KB (765 words) - 23:26, 14 October 2008
- ...de dependable operation - in terms of reliability and availability - for a system made of unreliable components. ...echanisms such as clock- and Vdd-gating are increasing voltage droops; the verification manpower budget is becoming a significant part of the design effort; oxide5 KB (598 words) - 01:12, 31 May 2012
- * Hardware and software testing, verification, and validation. * Dependability in high-bandwidth and system area networks.4 KB (528 words) - 23:27, 14 October 2008
- * Design, simulation and analysis tools with experimental verification * System architecture2 KB (278 words) - 22:54, 4 February 2009
- technologies that allows for the decomposition of a complex system individual components to achieve system functions collectively,6 KB (707 words) - 23:29, 14 October 2008
- ...ry complex as they are responsible for controlling and regulating multiple system functionalities. Often embedded systems are also safety-critical requiring ...sors controlling the modern cars or aircrafts and airport baggage handling system that track and trace unsafe baggage. To address this growing need for safet4 KB (456 words) - 23:30, 14 October 2008
- Hardware/Software Codesign and System Synthesis 2) VLSI and circuit techniques for embedded system design11 KB (1,352 words) - 00:33, 15 October 2008
- research challenges are encountered in areas such as verification, system and compiler5 KB (673 words) - 23:30, 14 October 2008
- improve efficiency in the use of system resources.... However, adaptability also incurs overhead in terms of system7 KB (851 words) - 23:30, 14 October 2008