نتایج جستجو برای: verification is not verifiable

تعداد نتایج: 7944505  

2015
Dirk Beyer

SV-COMP 2015 marks the start of a new epoch of software verification: In the 4th Competition on Software Verification, software verifiers produced for each reported property violation a machine-readable error witness in a common exchange format (so far restricted to reachability properties of sequential programs without recursion). Error paths were reported previously, but always in different, ...

Journal: :IACR Cryptology ePrint Archive 2011
Bryan Parno Mariana Raykova Vinod Vaikuntanathan

The wide variety of small, computationally weak devices, and the growing number of computationally intensive tasks makes it appealing to delegate computation to data centers. However, outsourcing computation is useful only when the returned result can be trusted, which makes verifiable computation (VC) a must for such scenarios. In this work we extend the definition of verifiable computation in...

2006
Vincenzo Auletta Roberto De Prisco Paolo Penna Giuseppe Persiano Carmine Ventre

A social choice function A is implementable with verification if there exists a payment scheme P such that (A,P ) is a truthful mechanism for verifiable agents [Nisan and Ronen, STOC 99]. We give a simple sufficient condition for a social choice function to be implementable with verification for comparable types. Comparable types are a generalization of the well-studied one-parameter agents. Ba...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه خلیج فارس - دانشکده مهندسی 1393

in civil engineering concrete is a material combined of hydraulic cement, sand, gravel and water. gravel and sand compose 60 to 70 percent of concrete. these aggregates support compression force of concrete. cement paste acts as glue to stick grain together. in bushehr factories producing aggregates do not operate according to astm standards, so that fineness modulus (fm) of the produced sands ...

2013
Marcel Fourné Dominique Petersen Norbert Pohlmann

Botnet, network malware and anomaly detection algorithms are hard to evaluate and compare against each other due to different data sets. In some cases overspecialization on known malware gives high detection rates due to unknown artifacts in the training data set. This may lead to new malware being unnoticed on a network, because the detection algorithm has not been optimized for this case. Our...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اراک - دانشکده علوم انسانی 1388

abstract the aim of this study was threefold: (1) to investigate the relationship between knowledge of semantic prosody and efl learners general language proficiency; (2) to examine the relationship between qualitative as well as quantitative knowledge of words, and (3) to compare the performance of efl learner on receptive and productive measures of semantic prosody. the study is based on a...

2004
Ansgar Fehnker Franjo Ivancic

There are numerous application examples for hybrid systems verification in recent literature. Most of them were introduced to illustrate a new approach to hybrid systems verification, and are therefore of a limited size. Others are case studies that serve to prove that an approach can be applied to real world problems. Verification of these typically requires a lot of domain experience to obtai...

2011
Shiuan-Tzuo Shen Wen-Guey Tzeng

Many storage systems need to do authorized verification for data integrity. For example, a user stores his data into cloud storage servers and shares his data with his friends. They check data integrity periodically to ensure data intact. However, they don’t want a stranger to check data integrity on their data. Therefore, public verification is undesired in this situation. The user can share h...

Journal: :CoRR 2013
Piotr Beling

template typename s td : : e n a b l e i f< ! s td : : i s t r i v i a l l y c o p y a s s i g n a b l e : : va lue > : : type mycopy( const T∗ source , T∗ dest , s td : : s i z e t count ) { for ( s td : : s i z e t i = 0 ; i < count ; ++i ) ∗ dest++ = ∗ source++; } Gdy pierwszym argumentem szablonu std :: enable if jest true, to zawiera on pole type określające typ drugiego ar...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده ادبیات و علوم انسانی 1391

‘romanticism’ and ‘romantic’ are among the most controversial terms in literature. most readers, when encountering these words, would think of the well-known period of romanticism of the first three decades of the nineteenth century and the great six english poets known as ‘the big six’ of this period. however, romanticism does not belong to certain artists in a special period; one may seek ele...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید