咨询与建议

限定检索结果

文献类型

  • 30 篇 期刊文献
  • 7 篇 会议

馆藏范围

  • 37 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 工学
    • 23 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 8 篇 网络空间安全
    • 5 篇 机械工程
    • 4 篇 仪器科学与技术
    • 3 篇 电子科学与技术(可...
    • 3 篇 信息与通信工程
    • 1 篇 冶金工程
    • 1 篇 控制科学与工程
    • 1 篇 建筑学
    • 1 篇 交通运输工程
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 理学
    • 1 篇 系统科学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 37 篇 formal verificat...
  • 3 篇 boolean satisfia...
  • 2 篇 boolean comparis...
  • 2 篇 model checking
  • 2 篇 model
  • 2 篇 service composit...
  • 2 篇 unknown constrai...
  • 2 篇 black box
  • 2 篇 uppaal
  • 1 篇 service choreogr...
  • 1 篇 hybrid system
  • 1 篇 security control...
  • 1 篇 knowledge-based ...
  • 1 篇 reliability
  • 1 篇 theorem proving
  • 1 篇 smv
  • 1 篇 unified modeling...
  • 1 篇 system theory pr...
  • 1 篇 information flow...
  • 1 篇 modeling

机构

  • 1 篇 facultyof comput...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 beijing institut...
  • 1 篇 school of inform...
  • 1 篇 state key labora...
  • 1 篇 icb-pmdm-lermps ...
  • 1 篇 school of manage...
  • 1 篇 department of co...
  • 1 篇 faculty of compu...
  • 1 篇 school of inform...
  • 1 篇 institute of com...
  • 1 篇 school of comput...
  • 1 篇 school of electr...
  • 1 篇 department of au...
  • 1 篇 college of compu...
  • 1 篇 departmentofcomp...
  • 1 篇 department of co...
  • 1 篇 riphah institute...
  • 1 篇 兰州大学

作者

  • 1 篇 xuqing liang
  • 1 篇 zaheed ahmed
  • 1 篇 zhiyuan liu
  • 1 篇 dan pescaru
  • 1 篇 weizhong qian
  • 1 篇 zhao jin
  • 1 篇 liangjun deng
  • 1 篇 蒋树
  • 1 篇 sun cong
  • 1 篇 ma jianfeng
  • 1 篇 fausto pedro gar...
  • 1 篇 seyed amin hosse...
  • 1 篇 xiao-qi ma
  • 1 篇 hongsong chen
  • 1 篇 qian junyan
  • 1 篇 xi ning
  • 1 篇 shao-feng li
  • 1 篇 chunjie zhou
  • 1 篇 庄雷
  • 1 篇 zhang ningrong z...

语言

  • 33 篇 英文
  • 4 篇 中文
检索条件"主题词=Formal verification"
37 条 记 录,以下是1-10 订阅
排序:
formal verification of synchronous data-flow program transformations toward certified compilers
收藏 引用
Frontiers of Computer Science 2013年 第5期7卷 598-616页
作者: Van Chan NGO Jean-Pierre TALPIN Thierry GAUTIER Paul Le GUERNIC Loic BESNARD INRIA Rennes-Bretagne Atlantique Rennes 35042 France IRISA/CNRS Rennes 35042 France
Translation validation was invented in the 90's by Pnueli et al. as a technique to formally verify the correctness of code generators. Rather than certifying the code generator or exhaustively qualifying it, translat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
formal verification of Temporal Properties for Reduced Overhead in Grid Scientific Workflows
收藏 引用
Journal of Computer Science & Technology 2011年 第6期26卷 1017-1030页
作者: 曹军威 张帆 许可 刘连臣 吴澄 CCF ACM IEEE Research Institute of Information Technology Tsinghua University Tsinghua National Laboratory for Information Science and Technology National CIMS Engineering and Research Center Tsinghua University Morgan Stanley
With quick development of grid techniques and growing complexity of grid applications, it is becoming critical for reasoning temporal properties of grid workflows to probe potential pitfalls and errors, in order to en... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
formal verification of Data Modifications in Cloud Block Storage Based on Separation Logic
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 112-127页
作者: Bowen ZHANG Zhao JIN Hanpin WANG Yongzhi CAO Key Laboratory of High Confidence Software Technologies (MOE) School of Computer Science Peking University School of Computer and Artificial Intelligence Zhengzhou University School of Computer Science and Cyber Engineering Guangzhou University
Cloud storage is now widely used, but its reliability has always been a major concern. Cloud block storage(CBS) is a famous type of cloud storage. It has the closest architecture to the underlying storage and can prov... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
formal verification Platform as a Service:WebAssembly Vulnerability Detection Application
收藏 引用
Computer Systems Science & Engineering 2023年 第5期45卷 2155-2170页
作者: LiangJun Deng Hang Lei Zheng Yang WeiZhong Qian XiaoYu Li Hao Wu Sihao Deng RuChao Sha WeiDong Deng School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu610054China School of Physics University of Electronic Science and Technology of ChinaChengdu611731China ICB-PMDM-LERMPS UMR 6303 CNRSUTBMUniversitéde Bourgogne Franche-ComtéBelfort90010France Chengdu Railway Science and Technology Innovation Co.LTD Chengdu640041China
In order to realize a general-purpose automatic formal verification platform based on WebAssembly technology as a web service(FVPS),which aims to provide an automated report of vulnerability detections,this work build... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
formal verification under Unknown Constraints
收藏 引用
Wuhan University Journal of Natural Sciences 2005年 第1期10卷 43-46页
作者: LI Guang-hui 1,2,3 , LI Xiao-wei 2,31. School of Information Engineering, Zhejiang Forestry College, Hangzhou 311300, Zhejiang, China 2. Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, China 3. Graduate School of the Chinese Academy of Sciences, Beijing 100039, China School of Information Engineering Zhejiang Forestry College Hangzhou Zhejiang China Institute of Computing Technology Chinese Academy of Sciences Beijing China Graduate School of the Chinese Academy of Sciences Beijing China
We present a formal method of verifying designs with unknown constraints (e.g., black boxes) using Boolean satisfiability (SAT). This method is based on a new encoding scheme of unknown constraints, and solves the cor... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
formal verification of TASM Models by Translating into UPPAAL
收藏 引用
Journal of Donghua University(English Edition) 2012年 第1期29卷 51-54页
作者: 胡凯 张腾 杨志斌 顾斌 蒋树 姜泮昌 School of Computer Science and Engineering Beihang University Beijing Institute of Control Engineering
Timed abstract state machine(TASM) is a formal specification language used to specify and simulate the behavior of real-time systems. formal verification of TASM model can be fulfilled through model checking activitie... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Design and formal verification of a CEM protoco with transparent TTP
收藏 引用
Frontiers of Computer Science 2013年 第2期7卷 279-297页
作者: Zhiyuan LIU Jun PANG Chenyi ZHANG School of Management Science and Engineering Shandong Normal UniversityChina Jinan 250000 Faculty of Science Technology and Communication University of LuxembourgLuxembourg Luxembourg 1359 School of Information Technology and Electrical Engineering University of Queensland Australia Brisbane QLD4072
In certified email (CEM) protocols, trusted third party (TTP) transparency is an important security require- ment which helps to avoid bad publicity as well as protecting individual users' privacy. Cederquist et ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Research on Microkernel Integrity Semantics Model and formal verification
收藏 引用
Chinese Journal of Electronics 2014年 第1期23卷 43-48页
作者: QIAN Zhenjiang LIU Wei HUANG Hao State Key Laboratory for Novel Software Technology Nanjing University Department of Computer Science and Technology Nanjing University
Microkernel integrity is an important aspect of security for the whole microkernel system. Many of the research works on microkernel integrity focus on analysis and safeguards against the existing kernel attacks, and ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cloud Manufacturing Service Composition Modeling and formal verification Based on Calculus for Orchestration of Web Service
Cloud Manufacturing Service Composition Modeling and Formal ...
收藏 引用
第25届中国控制与决策会议
作者: LI Yongxiang YAO Xifan ZHANG Jie LI Bin School of Mechanical & Automotive Engineering South China University of Technology State Key Laboratory of Automotive Simulation and Control Jilin University
To solve the problem of modeling and formally verifying the composition of cloud manufacturing services, a new modeling and formal verification approach based on Calculus for Orchestration of Web Service (COWS) comb... 详细信息
来源: cnki会议 评论
formal verification of the Merchant Registration Phase of the SET Protocol
收藏 引用
International Journal of Automation and computing 2005年 第2期2卷 155-162页
作者: Xiao-Qi Ma Xiao-Chun Cheng Department of Computer Science The University of Reading Reading UK
This paper describes the formal verification of the Merchant Registration phase of the Secure Electronic Transactions (SET) protocol, a realistic electronic transaction security protocol which is used to protect the s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论