Results 51 to 60 of about 253,484 (163)

THE SPACE INFORMATION AND CONTROL SYSTEM AVAILABILITY ASSESSMENT CONSIDERING ELIMINATION OF SOFTWARE FAULTS AFTER ON-LINE VERIFICATION

open access: yesРадіоелектронні і комп'ютерні системи, 2019
The paper deals the multi-fragmental model of the two-channel space on-board information and control system of piloted spaceship. The model describes process of on-line software verification considering subsequent elimination of detected software faults.
Вячеслав Сергійович Харченко   +4 more
doaj   +1 more source

Locality-guided based optimization method for bounded model checker

open access: yesTongxin xuebao, 2018
For software model checking,approaches that combine with different kind of verification methods are now under research.The key to improve scale and complexity of verifiable software is handling the method for abstraction widening and strengthening wisely
Shun WANG, Ye DU, Zhen HAN, Jiqiang LIU
doaj  

Numerical Verification of Tucuxi, a Promising Bayesian Adaptation Tool for Model‐Informed Precision Dosing

open access: yesCPT: Pharmacometrics & Systems Pharmacology
Tucuxi, a Swiss‐developed Model‐Informed Precision Dosing (MIPD) software, aims to support clinical dosage decision‐making to achieve therapeutic concentration targets.
Anne Ravix   +5 more
doaj   +1 more source

Verification and validation: process VS procedure [PDF]

open access: yesЯдерна фізика та енергетика, 2013
Scheme of continuous process of verification and validation is developed. It not only permits a software user to perform verification of results of every calculation, but also obligates him to do this, thus increasing the relia-bility of the obtained ...
V. L. Diemokhin   +2 more
doaj  

Verification Analysis of the Ground Comprehensive Application Software for CMD System

open access: yes机车电传动, 2011
Software verification was an important way to enhance the reliability of software products and to assure software to fullfill customer’s needs. In accordance with the high-reliability requirements of ground comprehensive application software for CMD ...
杨颖, 金炜东
doaj  

Verification-based Software-fault Detection

open access: yes, 2011
Software is used in many safety- and security-critical systems. Software development is, however, an error-prone task. In this dissertation new techniques for the detection of software faults (or software "bugs") are described which are based on a formal deductive verification technology.
openaire   +5 more sources

Black-Box Testing Technique for Information Visualization. Sequencing Constraints with Low-Level Interactions

open access: yesJournal of Computer Science and Technology, 2017
The software development process has matured significantly over the past decade. We are currently in a state where the need for the verification and validation of the product under development is unquestionable. Visualizations, as software products, must
Martín Leonardo Larrea
doaj  

Verification System of Removable Key Carriers Software

open access: yesБезопасность информационных технологий, 2013
Removable key carriers are most widespread devices for cryptographic key systems. The most popular platform for them is JavaCard. However, an on-card bytecode verifier is only optional on JavaCard smartcards, and indeed most cards do not include it. That’
Sergey Sergeevich Agafyin   +1 more
doaj  

Industrial hardware and software verification with ACL2. [PDF]

open access: yesPhilos Trans A Math Phys Eng Sci, 2017
Hunt WA   +3 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy