نتایج جستجو برای: verification is not verifiable
تعداد نتایج: 7944505 فیلتر نتایج به سال:
SV-COMP 2015 marks the start of a new epoch of software verification: In the 4th Competition on Software Verification, software verifiers produced for each reported property violation a machine-readable error witness in a common exchange format (so far restricted to reachability properties of sequential programs without recursion). Error paths were reported previously, but always in different, ...
The wide variety of small, computationally weak devices, and the growing number of computationally intensive tasks makes it appealing to delegate computation to data centers. However, outsourcing computation is useful only when the returned result can be trusted, which makes verifiable computation (VC) a must for such scenarios. In this work we extend the definition of verifiable computation in...
A social choice function A is implementable with verification if there exists a payment scheme P such that (A,P ) is a truthful mechanism for verifiable agents [Nisan and Ronen, STOC 99]. We give a simple sufficient condition for a social choice function to be implementable with verification for comparable types. Comparable types are a generalization of the well-studied one-parameter agents. Ba...
in civil engineering concrete is a material combined of hydraulic cement, sand, gravel and water. gravel and sand compose 60 to 70 percent of concrete. these aggregates support compression force of concrete. cement paste acts as glue to stick grain together. in bushehr factories producing aggregates do not operate according to astm standards, so that fineness modulus (fm) of the produced sands ...
Botnet, network malware and anomaly detection algorithms are hard to evaluate and compare against each other due to different data sets. In some cases overspecialization on known malware gives high detection rates due to unknown artifacts in the training data set. This may lead to new malware being unnoticed on a network, because the detection algorithm has not been optimized for this case. Our...
abstract the aim of this study was threefold: (1) to investigate the relationship between knowledge of semantic prosody and efl learners general language proficiency; (2) to examine the relationship between qualitative as well as quantitative knowledge of words, and (3) to compare the performance of efl learner on receptive and productive measures of semantic prosody. the study is based on a...
There are numerous application examples for hybrid systems verification in recent literature. Most of them were introduced to illustrate a new approach to hybrid systems verification, and are therefore of a limited size. Others are case studies that serve to prove that an approach can be applied to real world problems. Verification of these typically requires a lot of domain experience to obtai...
Many storage systems need to do authorized verification for data integrity. For example, a user stores his data into cloud storage servers and shares his data with his friends. They check data integrity periodically to ensure data intact. However, they don’t want a stranger to check data integrity on their data. Therefore, public verification is undesired in this situation. The user can share h...
template typename s td : : e n a b l e i f< ! s td : : i s t r i v i a l l y c o p y a s s i g n a b l e : : va lue > : : type mycopy( const T∗ source , T∗ dest , s td : : s i z e t count ) { for ( s td : : s i z e t i = 0 ; i < count ; ++i ) ∗ dest++ = ∗ source++; } Gdy pierwszym argumentem szablonu std :: enable if jest true, to zawiera on pole type określające typ drugiego ar...
‘romanticism’ and ‘romantic’ are among the most controversial terms in literature. most readers, when encountering these words, would think of the well-known period of romanticism of the first three decades of the nineteenth century and the great six english poets known as ‘the big six’ of this period. however, romanticism does not belong to certain artists in a special period; one may seek ele...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید