نتایج جستجو برای: validating
تعداد نتایج: 15741 فیلتر نتایج به سال:
The wide spread of services on the internet has aggravated the issue of maintaining multiple identities such as the virtual identities that are based on specific login credentials like username, passwords and PINs. On the other hand, multiple physical identities also prove to be difficult to maintain since different sources require the presence of different smart cards, mobile devices or other ...
This paper discusses aspects of validating simulation models designed to describe, explain and predict realworld phenomena. It starts with a short review of arguments used in the simsoc mailing list discussion on theory, simulation and explanation a few months ago, deals with the use of quantitative and qualitative computational models to make quantitative and qualitative predictions or rather ...
The growing design-productivity gap has made designers shift toward using high-level languages like C, C++ and Java to do system-level design. High-Level Synthesis (HLS) is the process of generating Register Transfer Level (RTL) design from these initial high-level programs. Unfortunately, this translation process itself can be buggy, which can create a mismatch between what a designer intends ...
Norms describe the permissions, prohibitions and obligations of agents in multi-agent systems in order to regulate their behavior. In this paper we propose a normative modeling language that makes possible the modeling of norms motivating the modeling of such norms together with the nonnormative part of the system. In addition, we also propose a mechanism to validate the norms at design time, i...
This paper reports on our experiences in building an execution-driven architectural simulator that is meant to accurately capture performance costs of a machine for a particular class of software, namely, network protocol stacks such as TCP/IP. The simulator models a single processor of our Silicon Graphics Challenge shared-memory multiprocessor, which has 100 MHz MIPS R4400 chips and two level...
The role of XML in data exchange is evolving from one of merely conveying the structure of data to one that also conveys its semantics. In particular, several proposals for key and foreign key constraints have recently appeared, and aspects of these proposals have been adopted within XMLSchema. Although several validators for XMLSchema appear to check for keys, relatively little attention has b...
in astrophysics necessarily involves the development of models and simulation technology to help us understand the complex phenomena underlying astrophysical events. As with any modeling approach, numerical models and simulation codes developed for astrophysical applications must be thoroughly verified and validated to demonstrate their accuracy and assess their credibility. Although verificati...
Programmers who develop large, mature applications often want to optimize the performance of their program without changing its semantics. They often do so by changing how their program invokes a library function or a function implemented in another module of the program. Unfortunately, once a programmer makes such an optimization, it is difficult for him to validate that the optimization does ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید