نتایج جستجو برای: verification is not verifiable

تعداد نتایج: 7944505  

2014
Domenico Lembo José Mora Riccardo Rosati Domenico Fabio Savo Evgenij Thorstensen

In this paper we study mapping analysis in ontology-based data access (OBDA), providing an initial set of foundational results for this problem. We start by defining general, language-independent notions of mapping inconsistency, mapping subsumption, and mapping redundancy in OBDA. Then, we focus on specific mapping languages for OBDA and illustrate techniques for verifying the above properties...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان - دانشکده علوم انسانی 1393

postcolonial feminism, also dubbed as third world feminism, is an innovative approach, demonstrating the way women of colonized countries suffer from both native patriarchies and imperial ideology. also due to this double-colonization, postcolonial feminists contend that third world women are subjected to both colonial domination of empire and male domination of patriarchy. while western femini...

2017

We introduce Proof-of-Replication (PoRep), a new kind of Proof-of-Storage, that can be used to prove that some data D has been replicated to its own uniquely dedicated physical storage. Enforcing unique physical copies enables a verifier to check that a prover is not deduplicating multiple copies of D into the same storage space. This construction is particularly useful in Cloud Computing and D...

2005
Samar Abdi Daniel Gajski

Increase in system level modeling has given rise to a need for efficient functional validation of models above cycle accurate level. This paper presents a tool for comparing system level models, before and after a refinement. Verifiable refinements include mapping functionality in the specification to platform components, static scheduling of functions mapped to a component and routing of trans...

2016
Ge Bai Ivan Damgård Claudio Orlandi Yu Xia

We propose a computationally secure and non-interactive verifiable secret sharing scheme that can be efficiently constructed from any monotone Boolean circuit. By non-interactive we mean that the dealer needs to be active only once, where he posts a public message as well as a private message to each shareholder. In the random oracle model, we can even avoid interaction between shareholders. By...

2012
Rachid El Bansarkhani Mohammed Meziani

This paper presents a new construction of a lattice-based verifiable secret sharing scheme. Our proposal is based on lattices and the usage of linear hash functions to enable each participant to verify its received secret share. The security of this scheme relies on the hardness of some well known approximation problems in lattices such as n-approximate SVP. Different to protocols proposed by P...

2013
Dmitry Solomakhin Marco Montali Sergio Tessaris Riccardo De Masellis

Abstract. Artifact-centric business processes have recently emerged as an approach in which processes are centred around the evolution of business entities, called artifacts, giving equal importance to control-flow and data. The recent Guard-State-Milestone (GSM) framework provides means for specifying business artifacts lifecycles in a declarative manner, using constructs that match how execut...

2010
Enric Xargay Vladimir Dobrokhodov Naira Hovakimyan Isaac Kaminer Ioannis Kitsios Chengyu Cao Irene M. Gregory Lena Valavani

The paper presents new results on the verification and in–flight validation of an L1 adaptive flight control system, and proposes a general methodology for verification and validation of adaptive flight control algorithms. The proposed framework is based on Rohrs’ counterexample, a benchmark problem presented in the early 80s to show the limitations of adaptive controllers developed at that tim...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده زبانهای خارجی 1390

as the canon is shaped by white male standards rewriting the canonical works of literature is one of the ways through which postcolonial writers subvert the authority of the masters. writing in the language of the masters the colonized writers use the very suppressive tool in the hands of the masters i.e. their language to question the validity of their norms. regarded by most critics to be the...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مدیریت و حسابداری 1391

the application of e-learning systems - as one of the solutions to the issue of anywhere and anytime learning – is increasingly spreading in the area of education. content management - one of the most important parts of any e-learning system- is in the concern of tutors and teachers through which they can obtain means and paths to achieve the goals of the course and learning objectives. e-learn...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید