نتایج جستجو برای: automated methods

تعداد نتایج: 1974455  

2009
David Lorge Parnas

views must be simpler but true Nobody doubts the value of abstraction, but it is essential to remember that everything that we can derive from an abstraction must be true of the real thing. If we can derive something that is not actually true, what we have is not an abstraction but a lie. Our role model should be engineers, not philosophers or logicians Engineers use mathematics in very differe...

2003
Mar Marcos Michael Balser Annette ten Teije Frank van Harmelen Christoph Duelli

Medical practice protocols or guidelines are statements to assist practitioners and patient decisions about appropriate health care for specific circumstances. In order to reach their potential benefits, protocols must fulfill strong quality requirements. Medical bodies worldwide have made efforts in this direction, mostly using informal methods such as peer review of protocols. We are concerne...

2001
Mark Bickford Christoph Kreitz Robbert van Renesse Robert Constable

Formal methods tools have greatly influenced our ability to increase the reliability of software and hardware systems by revealing errors and clarifying critical concepts. In this article we show how a rich specification language and a theorem prover for it have contributed to the design and implementation of verifiably correct adaptive protocols. The protocol building team included experts in ...

1999
Warren A. Hunt Jun Sawada

0272-1732/99/$10.00  1999 IEEE Hardware verification accounts for a considerable portion of the costs in the microprocessor design process. Traditionally, designers have verified microprocessor designs using simulation techniques that help find most design faults. However, simulation never guarantees the correct operation of the final product. Some design faults are very difficult to detect by...

2002
Achim D. Brucker Burkhart Wolff

Tools for a specification language can be implemented directly (by building a special purpose theorem prover) or by a conservative embedding into a typed meta-logic, which allows their safe and logically consistent implementation and the reuse of existing theorem prover engines. For being useful, the conservative extension approach must provide derivations for several thousand “folklore” theore...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :The Journal of the Acoustical Society of America 1995

Journal: :Biodiversity Information Science and Standards 2019

Journal: :SIAM Journal on Scientific Computing 2009

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید