We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Automated Software Verification of Hyperliveness

    Hyperproperties relate multiple executions of a program and are commonly used to specify security and information-flow policies. Most existing work...
    Conference paper Open access 2024
  2. Automated Quantum Program Verification in Dynamic Quantum Logic

    Dynamic Quantum Logic (DQL) has been used as a logical framework for manually proving the correctness of quantum programs. This paper presents an...
    Tsubasa Takagi, Canh Minh Do, Kazuhiro Ogata in Dynamic Logic. New Trends and Applications
    Conference paper 2024
  3. Automated Program Repair Using Formal Verification Techniques

    We focus on two different approaches to automatic program repair, based on formal verification methods. Both repair techniques consider...
    Hadar Frenkel, Orna Grumberg, ... Sarai Sheinvald in Principles of Systems Design
    Chapter 2022
  4. Formal Modeling, Verification and Automated Synthesis

    This chapter outlines the use of formal techniques and tools for modeling and analysis of safety systems. When used judiciously, this approach can...
    Gopinath Karmakar, Amol Wakankar, ... Paritosh Pandya in Development of Safety-Critical Systems
    Chapter 2023
  5. Automated Compositional Verification of Interlocking Systems

    Model checking techniques have often been applied to the verification of railway interlocking systems. However, these techniques may fail to scale to...
    Anne E. Haxthausen, Alessandro Fantechi, ... Sofie-Amalie Petersen in Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification
    Conference paper 2023
  6. Automated Verification for Real-Time Systems

    The correctness of real-time systems depends both on the correct functionalities and the realtime constraints. To go beyond the existing Timed...
    Conference paper Open access 2023
  7. Isadora: automated information-flow property generation for hardware security verification

    Isadora is a specification mining tool for creating information-flow properties for hardware. Isadora combines hardware information-flow tracking and...

    Calvin Deutschbein, Andres Meza, ... Cynthia Sturton in Journal of Cryptographic Engineering
    Article 11 November 2022
  8. symQV: Automated Symbolic Verification of Quantum Programs

    We present symQV, a symbolic execution framework for writing and verifying quantum computations in the quantum circuit model. symQV can automatically...
    Fabian Bauer-Marquart, Stefan Leue, Christian Schilling in Formal Methods
    Conference paper 2023
  9. Automated verification of concurrent go programs via bounded model checking

    The Go programming language offers a wide range of primitives to coordinate lightweight threads, e.g., channels, waitgroups, and mutexes—all of which...

    Nicolas Dilley, Julien Lange in Automated Software Engineering
    Article 26 August 2023
  10. Automated Verification of Correctness for Masked Arithmetic Programs

    Masking is a widely-used effective countermeasure against power side-channel attacks for implementing cryptographic algorithms. Surprisingly, few...
    Mingyang Liu, Fu Song, Taolue Chen in Computer Aided Verification
    Conference paper Open access 2023
  11. A multi-dimensional review on handwritten signature verification: strengths and gaps

    A handwritten signature is the most widely accepted method to authenticate an individual in banking, financial, business transactions, cheque...

    S. D. Bhavani, R. K. Bharathi in Multimedia Tools and Applications
    Article 13 May 2023
  12. Providing Evidence for the Validity of the Virtual Verification of Automated Driving Systems

    With the increasing complexity of automated driving systems, formal verification as well as statistical verification that solely relies on real-world...
    Birte Neurohr, Thies de Graaff, ... Eike Möhlmann in Dependable Computing – EDCC 2024 Workshops
    Conference paper 2024
  13. Parameterized Recursive Refinement Types for Automated Program Verification

    Refinement types have recently been applied to program verification, where program verification problems are reduced to type checking or inference...
    Ryoya Mukai, Naoki Kobayashi, Ryosuke Sato in Static Analysis
    Conference paper 2022
  14. Automated Temporal Verification for Algebraic Effects

    Although effect handlers offer a versatile abstraction for user-defined effects, they produce complex and less restricted execution traces due to the...
    Yahui Song, Darius Foo, Wei-Ngan Chin in Programming Languages and Systems
    Conference paper 2022
  15. CAN-verify: A Verification Tool For BDI Agents

    CAN-verify is an automated tool that aids the development, verification, and analysis of BDI agents written in the Conceptual Agent Notation (Can)...
    Mengwei Xu, Thibault Rivoalen, ... Michele Sevegnani in Integrated Formal Methods
    Conference paper 2024
  16. A review on kinship verification from facial information

    Abstract

    Kinship verification is a challenging computer vision task that aims to mainly answer the question: “Are these two persons blood relatives?”....

    Mohamed Charfeddine Mzoughi, Najib Ben Aoun, Sami Naouali in The Visual Computer
    Article 14 June 2024
  17. On applying residual reasoning within neural network verification

    As neural networks are increasingly being integrated into mission-critical systems, it is becoming crucial to ensure that they meet various safety...

    Yizhak Yisrael Elboher, Elazar Cohen, Guy Katz in Software and Systems Modeling
    Article 16 November 2023
  18. Multi-dilation Convolutional Neural Network for Automatic Handwritten Signature Verification

    With the recent advancements in deep learning techniques, the application areas of unstructured data analytics are emerging in multiple domains. One...

    Rashmi Rathi Upadhyay, Ravishankar Mehta, Koushlendra Kumar Singh in SN Computer Science
    Article 24 June 2023
  19. Integrating runtime verification into an automated UAS traffic management system

    Unmanned Aerial Systems (UAS) are quickly integrating into the National Air Space. Doing so safely is a pressing concern, as the US alone has over...

    Abigail Hammer, Matthew Cauwels, ... Kristin Y. Rozier in Innovations in Systems and Software Engineering
    Article 14 July 2021
  20. An Empirical Study on Automated Test Generation Tools for Java: Effectiveness and Challenges

    Automated test generation tools enable test automation and further alleviate the low efficiency caused by writing hand-crafted test cases. However,...

    **ang-Jun Liu, ** Yu, **ao-**ng Ma in Journal of Computer Science and Technology
    Article 26 June 2024
Did you find what you were looking for? Share feedback.