نتایج جستجو برای: verification is not verifiable

تعداد نتایج: 7944505  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1389

abstract: about 60% of total premium of insurance industry is pertained?to life policies in the world; while the life insurance total premium in iran is less than 6% of total premium in insurance industry in 2008 (sigma, no 3/2009). among the reasons that discourage the life insurance industry is the problem of adverse selection. adverse selection theory describes a situation where the inf...

Journal: :IEEE Transactions on Parallel and Distributed Systems 2022

Despite increasingly emerging applications, a primary concern for blockchain to be fully practical is the inefficiency of data query. Direct queries on take much time by searching every block, while indirect database greatly degrade authenticity query results. To conquer problem, we propose Verifiable Query Layer (VQL) that can deployed in cloud provide both efficient and verifiable services sy...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند 1389

there has been a gradual shift of focus from the study of rule systems, which have increasingly been regarded as impoverished, … to the study of systems of principles, which appear to occupy a much more central position in determining the character and variety of possible human languages. there is a set of absolute universals, notions and principles existing in ug which do not vary from one ...

Journal: :Dagstuhl Reports 2017
Erika Ábrahám Hadas Kress-Gazit Lorenzo Natale Armando Tacchella

This report documents the program and the outcomes of Dagstuhl Seminar 17071 “ComputerAssisted Engineering for Robotics and Autonomous Systems”. This seminar brought together researchers from three distinct communities – Robotics, Model-driven Software Engineering, and Formal Methods – to discuss the path towards creating safe and verifiable autonomous systems. Seminar February 12–17, 2017 – ht...

Journal: :IACR Cryptology ePrint Archive 2014
José Bacelar Almeida Manuel Barbosa Gilles Barthe Guillaume Davy François Dupressoir Benjamin Grégoire Pierre-Yves Strub

Formal verification of the security of software systems is gradually moving from the traditional focus on idealized models, to the more ambitious goal of producing verified implementations. This trend is also present in recent work targeting the verification of cryptographic software, but the reach of existing tools has so far been limited to cryptographic primitives, such as RSA-OAEP encryptio...

Journal: :IACR Cryptology ePrint Archive 2017
Elena Pagnin Aikaterini Mitrokotsa Keisuke Tanaka

Server-Aided Verification (SAV) is a method that can be employed to speed up the process of verifying signatures by letting the verifier outsource part of its computation load to a third party. Achieving fast and reliable verification under the presence of an untrusted server is an attractive goal in cloud computing and internet of things scenarios. In this paper, we describe a simple framework...

Journal: :Int. J. General Systems 2008
Moon Ho Hwang Bernard P. Zeigler

The modelling and analysis of multi-component discrete event systems is a challenging research area. Over 30 years, modelling and simulation research of discrete event system specification (DEVS) has been developed with (1) dense-time, (2) the I/O concept, and (3) hierarchical model construction. Nevertheless, DEVS model verification research began relatively recently considering the whole DEVS...

Journal: :J. Symb. Comput. 2005
Hanne Gottliebsen Tom Kelsey Ursula Martin

We present hidden verification as a means to make the power of computational logic available to users of computer algebra systems while shielding them from its complexity. We have implemented in PVS a library of facts about elementary and transcendental functions, and automatic procedures to attempt proofs of continuity, convergence and differentiability for functions in this class. These are c...

2007
Robert Brayton Alan Mishchenko

This report is a case-study of the synergy between sequential synthesis and verification. Described is an efficient implementation of a sequential synthesis that uses simple induction to detect and merge sequentially-equivalent registers and nodes in a sequential circuit with a given initial state. Since retiming is not performed, state-encoding, scan chains, and test vectors are essentially pr...

Journal: :Games and Economic Behavior 2023

We use laboratory experiments to study communication games with partially verifiable information.In these games, based on Glazer and Rubinstein (2004, 2006), an informed sender sends a two-dimensional message receiver, but only one dimension of the can be verified. investigate effect evidence verification control using three treatments: where messages are unverifiable, receiver chooses which ve...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید