Sciweavers

1219 search results - page 123 / 244
» Verification of Equivalent-Results Methods
Sort
View
113
Voted
JCIT
2008
94views more  JCIT 2008»
15 years 3 months ago
Finding Semantic Errors in the Rule-base of Production Systems, and Reasoning with Insufficient Input Data Petri-net-based Appro
Two simple but practical production systems are modeled using Petri Nets. Petri-net models are very useful in finding semantic errors like generalization error and missing conditi...
Hong-Youl Lee
166
Voted
INLG
2010
Springer
15 years 1 months ago
Generating Natural Language Descriptions of Z Test Cases
Critical software most often requires an independent validation and verification (IVV). IVV is usually performed by domain experts, who are not familiar with specific, many times ...
Maximiliano Cristiá, Brian Plüss
SIGSOFT
2010
ACM
15 years 1 months ago
Separation of concerns for dependable software design
For `mixed-criticality' systems that have both critical and non-critical functions, the greatest leverage on dependability may be at the design level. By designing so that ea...
Daniel Jackson, Eunsuk Kang
COMPSEC
2010
142views more  COMPSEC 2010»
15 years 6 days ago
Provably correct Java implementations of Spi Calculus security protocols specifications
Spi Calculus is an untyped high level modeling language for security protocols, used for formal protocols specification and verification. In this paper, a type system for the Spi ...
Alfredo Pironti, Riccardo Sisto
EKAW
2006
Springer
15 years 7 months ago
From Natural Language to Formal Proof Goal
Guidelines (Extended abstract) Ruud Stegers1 , Annette ten Teije1 , and Frank van Harmelen1 Vrije Universiteit, Amsterdam The main problem encountered when starting verification of...
Ruud Stegers, Annette ten Teije, Frank van Harmele...