Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Software Verification). Showing records 1 – 30 of 312 total matches.

[1] [2] [3] [4] [5] … [11]

Search Limiters

Last 2 Years | English Only

Department

Degrees

Levels

Languages

Country

▼ Search Limiters


McMaster University

1. Zhong, Hongsheng. Secure and Trusted Partial White-box Verification Based on Garbled Circuits.

Degree: MSc, 2016, McMaster University

Verification is a process that checks whether a program G, implemented by a devel- oper, correctly complies with the corresponding requirement specifications. A verifier, whose… (more)

Subjects/Keywords: Cryptography; Software Engineering; Software Verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhong, H. (2016). Secure and Trusted Partial White-box Verification Based on Garbled Circuits. (Masters Thesis). McMaster University. Retrieved from http://hdl.handle.net/11375/20551

Chicago Manual of Style (16th Edition):

Zhong, Hongsheng. “Secure and Trusted Partial White-box Verification Based on Garbled Circuits.” 2016. Masters Thesis, McMaster University. Accessed March 07, 2021. http://hdl.handle.net/11375/20551.

MLA Handbook (7th Edition):

Zhong, Hongsheng. “Secure and Trusted Partial White-box Verification Based on Garbled Circuits.” 2016. Web. 07 Mar 2021.

Vancouver:

Zhong H. Secure and Trusted Partial White-box Verification Based on Garbled Circuits. [Internet] [Masters thesis]. McMaster University; 2016. [cited 2021 Mar 07]. Available from: http://hdl.handle.net/11375/20551.

Council of Science Editors:

Zhong H. Secure and Trusted Partial White-box Verification Based on Garbled Circuits. [Masters Thesis]. McMaster University; 2016. Available from: http://hdl.handle.net/11375/20551


Rice University

2. Song, Daniel W. The Design and Implementation of a Verified File System with End-to-End Data Integrity.

Degree: PhD, Engineering, 2020, Rice University

 Despite significant research and engineering efforts, many of today's important computer systems suffer from bugs. To increase the reliability of software systems, recent work has… (more)

Subjects/Keywords: software security; systems; formal verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, D. W. (2020). The Design and Implementation of a Verified File System with End-to-End Data Integrity. (Doctoral Dissertation). Rice University. Retrieved from http://hdl.handle.net/1911/108425

Chicago Manual of Style (16th Edition):

Song, Daniel W. “The Design and Implementation of a Verified File System with End-to-End Data Integrity.” 2020. Doctoral Dissertation, Rice University. Accessed March 07, 2021. http://hdl.handle.net/1911/108425.

MLA Handbook (7th Edition):

Song, Daniel W. “The Design and Implementation of a Verified File System with End-to-End Data Integrity.” 2020. Web. 07 Mar 2021.

Vancouver:

Song DW. The Design and Implementation of a Verified File System with End-to-End Data Integrity. [Internet] [Doctoral dissertation]. Rice University; 2020. [cited 2021 Mar 07]. Available from: http://hdl.handle.net/1911/108425.

Council of Science Editors:

Song DW. The Design and Implementation of a Verified File System with End-to-End Data Integrity. [Doctoral Dissertation]. Rice University; 2020. Available from: http://hdl.handle.net/1911/108425


University of Waterloo

3. Wu, Chun Wah Wallace. Methods for Reducing Monitoring Overhead in Runtime Verification.

Degree: 2013, University of Waterloo

 Runtime verification is a lightweight technique that serves to complement existing approaches, such as formal methods and testing, to ensure system correctness. In runtime verification,… (more)

Subjects/Keywords: software; runtime verification; runtime monitoring

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, C. W. W. (2013). Methods for Reducing Monitoring Overhead in Runtime Verification. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/7215

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wu, Chun Wah Wallace. “Methods for Reducing Monitoring Overhead in Runtime Verification.” 2013. Thesis, University of Waterloo. Accessed March 07, 2021. http://hdl.handle.net/10012/7215.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wu, Chun Wah Wallace. “Methods for Reducing Monitoring Overhead in Runtime Verification.” 2013. Web. 07 Mar 2021.

Vancouver:

Wu CWW. Methods for Reducing Monitoring Overhead in Runtime Verification. [Internet] [Thesis]. University of Waterloo; 2013. [cited 2021 Mar 07]. Available from: http://hdl.handle.net/10012/7215.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wu CWW. Methods for Reducing Monitoring Overhead in Runtime Verification. [Thesis]. University of Waterloo; 2013. Available from: http://hdl.handle.net/10012/7215

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Iowa State University

4. Awadhutkar, Payas. Human-centric verification for software safety and security.

Degree: 2020, Iowa State University

Software forms a critical part of our lives today. Verifying software to avoid violations of safety and security properties is a necessary task. It is… (more)

Subjects/Keywords: Software Analysis; Software Assurance; Software Safety; Software Security; Software Verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Awadhutkar, P. (2020). Human-centric verification for software safety and security. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/18009

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Awadhutkar, Payas. “Human-centric verification for software safety and security.” 2020. Thesis, Iowa State University. Accessed March 07, 2021. https://lib.dr.iastate.edu/etd/18009.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Awadhutkar, Payas. “Human-centric verification for software safety and security.” 2020. Web. 07 Mar 2021.

Vancouver:

Awadhutkar P. Human-centric verification for software safety and security. [Internet] [Thesis]. Iowa State University; 2020. [cited 2021 Mar 07]. Available from: https://lib.dr.iastate.edu/etd/18009.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Awadhutkar P. Human-centric verification for software safety and security. [Thesis]. Iowa State University; 2020. Available from: https://lib.dr.iastate.edu/etd/18009

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Stellenbosch University

5. Rajaona, Solofomampionona Fortunat. An algebraic framework for reasoning about security.

Degree: MSc, Mathematical Sciences, 2013, Stellenbosch University

ENGLISH ABSTRACT: Stepwise development of a program using refinement ensures that the program correctly implements its requirements. The specification of a system is “refined” incrementally… (more)

Subjects/Keywords: Mathematics; Computer software  – Development; Computer software  – Verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rajaona, S. F. (2013). An algebraic framework for reasoning about security. (Masters Thesis). Stellenbosch University. Retrieved from http://hdl.handle.net/10019/9983

Chicago Manual of Style (16th Edition):

Rajaona, Solofomampionona Fortunat. “An algebraic framework for reasoning about security.” 2013. Masters Thesis, Stellenbosch University. Accessed March 07, 2021. http://hdl.handle.net/10019/9983.

MLA Handbook (7th Edition):

Rajaona, Solofomampionona Fortunat. “An algebraic framework for reasoning about security.” 2013. Web. 07 Mar 2021.

Vancouver:

Rajaona SF. An algebraic framework for reasoning about security. [Internet] [Masters thesis]. Stellenbosch University; 2013. [cited 2021 Mar 07]. Available from: http://hdl.handle.net/10019/9983.

Council of Science Editors:

Rajaona SF. An algebraic framework for reasoning about security. [Masters Thesis]. Stellenbosch University; 2013. Available from: http://hdl.handle.net/10019/9983


University of Illinois – Urbana-Champaign

6. Pek, Edgar. Automated deductive verification of systems software.

Degree: PhD, Computer Science, 2015, University of Illinois – Urbana-Champaign

Software has become an integral part of our everyday lives, and so is our reliance on his correct functioning. Systems software lies at the heart… (more)

Subjects/Keywords: software verification; software security; automated deductive reasoning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pek, E. (2015). Automated deductive verification of systems software. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/88993

Chicago Manual of Style (16th Edition):

Pek, Edgar. “Automated deductive verification of systems software.” 2015. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed March 07, 2021. http://hdl.handle.net/2142/88993.

MLA Handbook (7th Edition):

Pek, Edgar. “Automated deductive verification of systems software.” 2015. Web. 07 Mar 2021.

Vancouver:

Pek E. Automated deductive verification of systems software. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2015. [cited 2021 Mar 07]. Available from: http://hdl.handle.net/2142/88993.

Council of Science Editors:

Pek E. Automated deductive verification of systems software. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/88993


University of Minnesota

7. Lee, Young Sub. Evaluation of the Benefits and Limitations of Verification Activities in Developing a Critical System using Model-Based Development.

Degree: M.S.E.E., Electrical Engineering, 2018, University of Minnesota

 In developing safety-critical cyber-physical systems, model-based development (MBD) promotes design and verification activities at the model-level, which is an abstract description of the behavior of… (more)

Subjects/Keywords: Model-Based Development; Software Development; Software Verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lee, Y. S. (2018). Evaluation of the Benefits and Limitations of Verification Activities in Developing a Critical System using Model-Based Development. (Masters Thesis). University of Minnesota. Retrieved from http://hdl.handle.net/11299/200995

Chicago Manual of Style (16th Edition):

Lee, Young Sub. “Evaluation of the Benefits and Limitations of Verification Activities in Developing a Critical System using Model-Based Development.” 2018. Masters Thesis, University of Minnesota. Accessed March 07, 2021. http://hdl.handle.net/11299/200995.

MLA Handbook (7th Edition):

Lee, Young Sub. “Evaluation of the Benefits and Limitations of Verification Activities in Developing a Critical System using Model-Based Development.” 2018. Web. 07 Mar 2021.

Vancouver:

Lee YS. Evaluation of the Benefits and Limitations of Verification Activities in Developing a Critical System using Model-Based Development. [Internet] [Masters thesis]. University of Minnesota; 2018. [cited 2021 Mar 07]. Available from: http://hdl.handle.net/11299/200995.

Council of Science Editors:

Lee YS. Evaluation of the Benefits and Limitations of Verification Activities in Developing a Critical System using Model-Based Development. [Masters Thesis]. University of Minnesota; 2018. Available from: http://hdl.handle.net/11299/200995


University of Oxford

8. Lewis, Matt. Precise verification of C programs.

Degree: PhD, 2014, University of Oxford

 Most current approaches to software verification are one-sided  – a safety prover will try to prove that a program is safe, while a bug-finding tool… (more)

Subjects/Keywords: 005.3; Theory and automated verification; Software verification; program synthesis; software engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lewis, M. (2014). Precise verification of C programs. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:34b5ed5a-160b-4e2c-8dac-eab62a24f78c ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.664841

Chicago Manual of Style (16th Edition):

Lewis, Matt. “Precise verification of C programs.” 2014. Doctoral Dissertation, University of Oxford. Accessed March 07, 2021. http://ora.ox.ac.uk/objects/uuid:34b5ed5a-160b-4e2c-8dac-eab62a24f78c ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.664841.

MLA Handbook (7th Edition):

Lewis, Matt. “Precise verification of C programs.” 2014. Web. 07 Mar 2021.

Vancouver:

Lewis M. Precise verification of C programs. [Internet] [Doctoral dissertation]. University of Oxford; 2014. [cited 2021 Mar 07]. Available from: http://ora.ox.ac.uk/objects/uuid:34b5ed5a-160b-4e2c-8dac-eab62a24f78c ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.664841.

Council of Science Editors:

Lewis M. Precise verification of C programs. [Doctoral Dissertation]. University of Oxford; 2014. Available from: http://ora.ox.ac.uk/objects/uuid:34b5ed5a-160b-4e2c-8dac-eab62a24f78c ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.664841


University of Oxford

9. Ramsay, Steven J. Intersection types and higer-order model checking.

Degree: PhD, 2014, University of Oxford

 Higher-order recursion schemes are systems of equations that are used to define finite and infinite labelled trees. Since, as Ong has shown, the trees defined… (more)

Subjects/Keywords: 005.3; Theory and automated verification; software verification; intersection types; model checking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ramsay, S. J. (2014). Intersection types and higer-order model checking. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:46b7bc70-3dfe-476e-92e7-245b7629ae4e ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.596036

Chicago Manual of Style (16th Edition):

Ramsay, Steven J. “Intersection types and higer-order model checking.” 2014. Doctoral Dissertation, University of Oxford. Accessed March 07, 2021. http://ora.ox.ac.uk/objects/uuid:46b7bc70-3dfe-476e-92e7-245b7629ae4e ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.596036.

MLA Handbook (7th Edition):

Ramsay, Steven J. “Intersection types and higer-order model checking.” 2014. Web. 07 Mar 2021.

Vancouver:

Ramsay SJ. Intersection types and higer-order model checking. [Internet] [Doctoral dissertation]. University of Oxford; 2014. [cited 2021 Mar 07]. Available from: http://ora.ox.ac.uk/objects/uuid:46b7bc70-3dfe-476e-92e7-245b7629ae4e ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.596036.

Council of Science Editors:

Ramsay SJ. Intersection types and higer-order model checking. [Doctoral Dissertation]. University of Oxford; 2014. Available from: http://ora.ox.ac.uk/objects/uuid:46b7bc70-3dfe-476e-92e7-245b7629ae4e ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.596036


Princeton University

10. Savary Bélanger, Olivier. Verified Extraction for Coq .

Degree: PhD, 2019, Princeton University

 Interactive theorem provers allow for the development, in the same environment, of programs and of proofs about them. The programmatic portion of the development can… (more)

Subjects/Keywords: Compilers; Extraction; Formal software verification; Functional Languages; Program verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Savary Bélanger, O. (2019). Verified Extraction for Coq . (Doctoral Dissertation). Princeton University. Retrieved from http://arks.princeton.edu/ark:/88435/dsp01zw12z817f

Chicago Manual of Style (16th Edition):

Savary Bélanger, Olivier. “Verified Extraction for Coq .” 2019. Doctoral Dissertation, Princeton University. Accessed March 07, 2021. http://arks.princeton.edu/ark:/88435/dsp01zw12z817f.

MLA Handbook (7th Edition):

Savary Bélanger, Olivier. “Verified Extraction for Coq .” 2019. Web. 07 Mar 2021.

Vancouver:

Savary Bélanger O. Verified Extraction for Coq . [Internet] [Doctoral dissertation]. Princeton University; 2019. [cited 2021 Mar 07]. Available from: http://arks.princeton.edu/ark:/88435/dsp01zw12z817f.

Council of Science Editors:

Savary Bélanger O. Verified Extraction for Coq . [Doctoral Dissertation]. Princeton University; 2019. Available from: http://arks.princeton.edu/ark:/88435/dsp01zw12z817f

11. Moore, Brandon Michael. Coinductive program verification.

Degree: PhD, Computer Science, 2016, University of Illinois – Urbana-Champaign

 We present a program-verification approach based on coinduction, which makes it feasible to verify programs given an operational semantics of a programming language, without constructing… (more)

Subjects/Keywords: Program Verification; Coinduction; Operational Semantics; Formal Methods; Software Verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moore, B. M. (2016). Coinductive program verification. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/95372

Chicago Manual of Style (16th Edition):

Moore, Brandon Michael. “Coinductive program verification.” 2016. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed March 07, 2021. http://hdl.handle.net/2142/95372.

MLA Handbook (7th Edition):

Moore, Brandon Michael. “Coinductive program verification.” 2016. Web. 07 Mar 2021.

Vancouver:

Moore BM. Coinductive program verification. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2016. [cited 2021 Mar 07]. Available from: http://hdl.handle.net/2142/95372.

Council of Science Editors:

Moore BM. Coinductive program verification. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2016. Available from: http://hdl.handle.net/2142/95372

12. Oliveira, João Paulo dos Santos. Rabbit: A novel approach to find data-races during state-space exploration .

Degree: 2012, Universidade Federal de Pernambuco

 Data-races are an important kind of error in concurrent shared-memory programs. Software model checking is a popular approach to find them. This research proposes a… (more)

Subjects/Keywords: Concorrency; Software Verification; Model Checking; Race conditions

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Oliveira, J. P. d. S. (2012). Rabbit: A novel approach to find data-races during state-space exploration . (Thesis). Universidade Federal de Pernambuco. Retrieved from http://repositorio.ufpe.br/handle/123456789/10891

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Oliveira, João Paulo dos Santos. “Rabbit: A novel approach to find data-races during state-space exploration .” 2012. Thesis, Universidade Federal de Pernambuco. Accessed March 07, 2021. http://repositorio.ufpe.br/handle/123456789/10891.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Oliveira, João Paulo dos Santos. “Rabbit: A novel approach to find data-races during state-space exploration .” 2012. Web. 07 Mar 2021.

Vancouver:

Oliveira JPdS. Rabbit: A novel approach to find data-races during state-space exploration . [Internet] [Thesis]. Universidade Federal de Pernambuco; 2012. [cited 2021 Mar 07]. Available from: http://repositorio.ufpe.br/handle/123456789/10891.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Oliveira JPdS. Rabbit: A novel approach to find data-races during state-space exploration . [Thesis]. Universidade Federal de Pernambuco; 2012. Available from: http://repositorio.ufpe.br/handle/123456789/10891

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Utah

13. Pagariya, Rohit. Direct equivalence testing of embedded software.

Degree: MS, School of Computing, 2011, University of Utah

 Direct equivalence testing is a framework for detecting errors in C compilers and application programs that exploits the fact that program semantics should be preserved… (more)

Subjects/Keywords: Compiler testing; Embedded software; Equivalence testing; Verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pagariya, R. (2011). Direct equivalence testing of embedded software. (Masters Thesis). University of Utah. Retrieved from http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/48/rec/740

Chicago Manual of Style (16th Edition):

Pagariya, Rohit. “Direct equivalence testing of embedded software.” 2011. Masters Thesis, University of Utah. Accessed March 07, 2021. http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/48/rec/740.

MLA Handbook (7th Edition):

Pagariya, Rohit. “Direct equivalence testing of embedded software.” 2011. Web. 07 Mar 2021.

Vancouver:

Pagariya R. Direct equivalence testing of embedded software. [Internet] [Masters thesis]. University of Utah; 2011. [cited 2021 Mar 07]. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/48/rec/740.

Council of Science Editors:

Pagariya R. Direct equivalence testing of embedded software. [Masters Thesis]. University of Utah; 2011. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/48/rec/740


Bond University

14. Larkin, James. A flexible framework for leveraging verification tools to enhance the verification technologies available for policy enforcement.

Degree: 2009, Bond University

 Program verification is vital as more and more users are creating, downloading and executing foreign computer programs. Software verification tools provide a means for determining… (more)

Subjects/Keywords: Computer software Verification.; Computer Science (0984)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Larkin, J. (2009). A flexible framework for leveraging verification tools to enhance the verification technologies available for policy enforcement. (Thesis). Bond University. Retrieved from https://epublications.bond.edu.au/theses/12

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Larkin, James. “A flexible framework for leveraging verification tools to enhance the verification technologies available for policy enforcement.” 2009. Thesis, Bond University. Accessed March 07, 2021. https://epublications.bond.edu.au/theses/12.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Larkin, James. “A flexible framework for leveraging verification tools to enhance the verification technologies available for policy enforcement.” 2009. Web. 07 Mar 2021.

Vancouver:

Larkin J. A flexible framework for leveraging verification tools to enhance the verification technologies available for policy enforcement. [Internet] [Thesis]. Bond University; 2009. [cited 2021 Mar 07]. Available from: https://epublications.bond.edu.au/theses/12.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Larkin J. A flexible framework for leveraging verification tools to enhance the verification technologies available for policy enforcement. [Thesis]. Bond University; 2009. Available from: https://epublications.bond.edu.au/theses/12

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Newcastle

15. Hogavanaghatta Kumaraswamy, Jnanamurthy. Model-driven engineering to enhance the reliability of software development by verifying system properties and detecting clones.

Degree: PhD, 2019, University of Newcastle

Research Doctorate - Doctor of Philosophy (PhD)

Computer software is used in almost every facet of day-to-day life, such as air conditioners, refrigerators, washing machines,… (more)

Subjects/Keywords: formal verification; model-driven engineering; software clones

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hogavanaghatta Kumaraswamy, J. (2019). Model-driven engineering to enhance the reliability of software development by verifying system properties and detecting clones. (Doctoral Dissertation). University of Newcastle. Retrieved from http://hdl.handle.net/1959.13/1397849

Chicago Manual of Style (16th Edition):

Hogavanaghatta Kumaraswamy, Jnanamurthy. “Model-driven engineering to enhance the reliability of software development by verifying system properties and detecting clones.” 2019. Doctoral Dissertation, University of Newcastle. Accessed March 07, 2021. http://hdl.handle.net/1959.13/1397849.

MLA Handbook (7th Edition):

Hogavanaghatta Kumaraswamy, Jnanamurthy. “Model-driven engineering to enhance the reliability of software development by verifying system properties and detecting clones.” 2019. Web. 07 Mar 2021.

Vancouver:

Hogavanaghatta Kumaraswamy J. Model-driven engineering to enhance the reliability of software development by verifying system properties and detecting clones. [Internet] [Doctoral dissertation]. University of Newcastle; 2019. [cited 2021 Mar 07]. Available from: http://hdl.handle.net/1959.13/1397849.

Council of Science Editors:

Hogavanaghatta Kumaraswamy J. Model-driven engineering to enhance the reliability of software development by verifying system properties and detecting clones. [Doctoral Dissertation]. University of Newcastle; 2019. Available from: http://hdl.handle.net/1959.13/1397849


Boston University

16. Skowyra, Richard William. Verificare: a platform for composable verification with application to SDN-Enabled systems.

Degree: PhD, Computer Science, 2014, Boston University

Software-Defined Networking (SDN) has become increasing prevalent in both the academic and industrial communities. A new class of system built on SDNs, which we refer… (more)

Subjects/Keywords: Computer science; Verification; Software-defined networking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Skowyra, R. W. (2014). Verificare: a platform for composable verification with application to SDN-Enabled systems. (Doctoral Dissertation). Boston University. Retrieved from http://hdl.handle.net/2144/15116

Chicago Manual of Style (16th Edition):

Skowyra, Richard William. “Verificare: a platform for composable verification with application to SDN-Enabled systems.” 2014. Doctoral Dissertation, Boston University. Accessed March 07, 2021. http://hdl.handle.net/2144/15116.

MLA Handbook (7th Edition):

Skowyra, Richard William. “Verificare: a platform for composable verification with application to SDN-Enabled systems.” 2014. Web. 07 Mar 2021.

Vancouver:

Skowyra RW. Verificare: a platform for composable verification with application to SDN-Enabled systems. [Internet] [Doctoral dissertation]. Boston University; 2014. [cited 2021 Mar 07]. Available from: http://hdl.handle.net/2144/15116.

Council of Science Editors:

Skowyra RW. Verificare: a platform for composable verification with application to SDN-Enabled systems. [Doctoral Dissertation]. Boston University; 2014. Available from: http://hdl.handle.net/2144/15116


Hong Kong University of Science and Technology

17. Lee, Hongjoo. DeepLink : deep-learning word semantics to link software artifacts.

Degree: 2015, Hong Kong University of Science and Technology

 It is widely understood that developers’ language and bug reporters’ language are different, and the differences limit traceability between commit logs and bug reports. However,… (more)

Subjects/Keywords: Computer software ; Verification ; Mathematical models ; Quality control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lee, H. (2015). DeepLink : deep-learning word semantics to link software artifacts. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-76839 ; https://doi.org/10.14711/thesis-b1514720 ; http://repository.ust.hk/ir/bitstream/1783.1-76839/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lee, Hongjoo. “DeepLink : deep-learning word semantics to link software artifacts.” 2015. Thesis, Hong Kong University of Science and Technology. Accessed March 07, 2021. http://repository.ust.hk/ir/Record/1783.1-76839 ; https://doi.org/10.14711/thesis-b1514720 ; http://repository.ust.hk/ir/bitstream/1783.1-76839/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lee, Hongjoo. “DeepLink : deep-learning word semantics to link software artifacts.” 2015. Web. 07 Mar 2021.

Vancouver:

Lee H. DeepLink : deep-learning word semantics to link software artifacts. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2015. [cited 2021 Mar 07]. Available from: http://repository.ust.hk/ir/Record/1783.1-76839 ; https://doi.org/10.14711/thesis-b1514720 ; http://repository.ust.hk/ir/bitstream/1783.1-76839/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lee H. DeepLink : deep-learning word semantics to link software artifacts. [Thesis]. Hong Kong University of Science and Technology; 2015. Available from: http://repository.ust.hk/ir/Record/1783.1-76839 ; https://doi.org/10.14711/thesis-b1514720 ; http://repository.ust.hk/ir/bitstream/1783.1-76839/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

18. Poon, Chi Yin. A study of eliminating irrelevant access patterns for fault localization in concurrent programs.

Degree: 2012, Hong Kong University of Science and Technology

 Fault localization is usually the most time-consuming step when debugging software bugs in general and concurrency bugs in particular. Automatic fault localization identifies faulty code… (more)

Subjects/Keywords: Debugging in computer science ; Computer software  – Verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Poon, C. Y. (2012). A study of eliminating irrelevant access patterns for fault localization in concurrent programs. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-7765 ; https://doi.org/10.14711/thesis-b1198616 ; http://repository.ust.hk/ir/bitstream/1783.1-7765/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Poon, Chi Yin. “A study of eliminating irrelevant access patterns for fault localization in concurrent programs.” 2012. Thesis, Hong Kong University of Science and Technology. Accessed March 07, 2021. http://repository.ust.hk/ir/Record/1783.1-7765 ; https://doi.org/10.14711/thesis-b1198616 ; http://repository.ust.hk/ir/bitstream/1783.1-7765/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Poon, Chi Yin. “A study of eliminating irrelevant access patterns for fault localization in concurrent programs.” 2012. Web. 07 Mar 2021.

Vancouver:

Poon CY. A study of eliminating irrelevant access patterns for fault localization in concurrent programs. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2012. [cited 2021 Mar 07]. Available from: http://repository.ust.hk/ir/Record/1783.1-7765 ; https://doi.org/10.14711/thesis-b1198616 ; http://repository.ust.hk/ir/bitstream/1783.1-7765/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Poon CY. A study of eliminating irrelevant access patterns for fault localization in concurrent programs. [Thesis]. Hong Kong University of Science and Technology; 2012. Available from: http://repository.ust.hk/ir/Record/1783.1-7765 ; https://doi.org/10.14711/thesis-b1198616 ; http://repository.ust.hk/ir/bitstream/1783.1-7765/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

19. Healy, Andrew. Predicting SMT solver performance for software verification.

Degree: 2016, RIAN

 The approach Why3 takes to interfacing with a wide variety of interactive and automatic theorem provers works well: it is designed to overcome limitations on… (more)

Subjects/Keywords: Predicting; SMT solver performance; software verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Healy, A. (2016). Predicting SMT solver performance for software verification. (Thesis). RIAN. Retrieved from http://eprints.maynoothuniversity.ie/8770/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Healy, Andrew. “Predicting SMT solver performance for software verification.” 2016. Thesis, RIAN. Accessed March 07, 2021. http://eprints.maynoothuniversity.ie/8770/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Healy, Andrew. “Predicting SMT solver performance for software verification.” 2016. Web. 07 Mar 2021.

Vancouver:

Healy A. Predicting SMT solver performance for software verification. [Internet] [Thesis]. RIAN; 2016. [cited 2021 Mar 07]. Available from: http://eprints.maynoothuniversity.ie/8770/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Healy A. Predicting SMT solver performance for software verification. [Thesis]. RIAN; 2016. Available from: http://eprints.maynoothuniversity.ie/8770/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Healy, Andrew. Predicting SMT solver performance for software verification.

Degree: 2016, RIAN

 The approach Why3 takes to interfacing with a wide variety of interactive and automatic theorem provers works well: it is designed to overcome limitations on… (more)

Subjects/Keywords: Predicting; SMT solver performance; software verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Healy, A. (2016). Predicting SMT solver performance for software verification. (Thesis). RIAN. Retrieved from http://mural.maynoothuniversity.ie/8770/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Healy, Andrew. “Predicting SMT solver performance for software verification.” 2016. Thesis, RIAN. Accessed March 07, 2021. http://mural.maynoothuniversity.ie/8770/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Healy, Andrew. “Predicting SMT solver performance for software verification.” 2016. Web. 07 Mar 2021.

Vancouver:

Healy A. Predicting SMT solver performance for software verification. [Internet] [Thesis]. RIAN; 2016. [cited 2021 Mar 07]. Available from: http://mural.maynoothuniversity.ie/8770/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Healy A. Predicting SMT solver performance for software verification. [Thesis]. RIAN; 2016. Available from: http://mural.maynoothuniversity.ie/8770/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Limerick

21. Fogarty, Padraig Justin. Utilizing multicore architectures to enhance software verification in real-time embedded systems.

Degree: 2013, University of Limerick

peer-reviewed

The hypothesis of this research is that new techniques are required to facilitate software verification on the highly-integrated, but resource constrained, real-time embedded systems;… (more)

Subjects/Keywords: software verification; real-time embedded systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fogarty, P. J. (2013). Utilizing multicore architectures to enhance software verification in real-time embedded systems. (Thesis). University of Limerick. Retrieved from http://hdl.handle.net/10344/3602

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fogarty, Padraig Justin. “Utilizing multicore architectures to enhance software verification in real-time embedded systems.” 2013. Thesis, University of Limerick. Accessed March 07, 2021. http://hdl.handle.net/10344/3602.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fogarty, Padraig Justin. “Utilizing multicore architectures to enhance software verification in real-time embedded systems.” 2013. Web. 07 Mar 2021.

Vancouver:

Fogarty PJ. Utilizing multicore architectures to enhance software verification in real-time embedded systems. [Internet] [Thesis]. University of Limerick; 2013. [cited 2021 Mar 07]. Available from: http://hdl.handle.net/10344/3602.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fogarty PJ. Utilizing multicore architectures to enhance software verification in real-time embedded systems. [Thesis]. University of Limerick; 2013. Available from: http://hdl.handle.net/10344/3602

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Oklahoma

22. Ralston, Ryan. Translating Clojure to ACL2 for Verification.

Degree: PhD, 2016, University of Oklahoma

Software spends a significant portion of its life-cycle in the maintenance phase and over 20% of the maintenance effort is fixing defects. Formal methods, including… (more)

Subjects/Keywords: Software Verification; Formal Methods; Theorem Proving

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ralston, R. (2016). Translating Clojure to ACL2 for Verification. (Doctoral Dissertation). University of Oklahoma. Retrieved from http://hdl.handle.net/11244/42982

Chicago Manual of Style (16th Edition):

Ralston, Ryan. “Translating Clojure to ACL2 for Verification.” 2016. Doctoral Dissertation, University of Oklahoma. Accessed March 07, 2021. http://hdl.handle.net/11244/42982.

MLA Handbook (7th Edition):

Ralston, Ryan. “Translating Clojure to ACL2 for Verification.” 2016. Web. 07 Mar 2021.

Vancouver:

Ralston R. Translating Clojure to ACL2 for Verification. [Internet] [Doctoral dissertation]. University of Oklahoma; 2016. [cited 2021 Mar 07]. Available from: http://hdl.handle.net/11244/42982.

Council of Science Editors:

Ralston R. Translating Clojure to ACL2 for Verification. [Doctoral Dissertation]. University of Oklahoma; 2016. Available from: http://hdl.handle.net/11244/42982


The Ohio State University

23. Zaccai, Diego Sebastian. A Balanced Verification Effort for the Java Language.

Degree: PhD, Computer Science and Engineering, 2016, The Ohio State University

 Current tools used to verify software in languages with reference semantics, such as Java, are hampered by the possibility of aliases. Existing approaches to addressing… (more)

Subjects/Keywords: Computer Science; Formal Methods; Software Verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zaccai, D. S. (2016). A Balanced Verification Effort for the Java Language. (Doctoral Dissertation). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1461243619

Chicago Manual of Style (16th Edition):

Zaccai, Diego Sebastian. “A Balanced Verification Effort for the Java Language.” 2016. Doctoral Dissertation, The Ohio State University. Accessed March 07, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=osu1461243619.

MLA Handbook (7th Edition):

Zaccai, Diego Sebastian. “A Balanced Verification Effort for the Java Language.” 2016. Web. 07 Mar 2021.

Vancouver:

Zaccai DS. A Balanced Verification Effort for the Java Language. [Internet] [Doctoral dissertation]. The Ohio State University; 2016. [cited 2021 Mar 07]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1461243619.

Council of Science Editors:

Zaccai DS. A Balanced Verification Effort for the Java Language. [Doctoral Dissertation]. The Ohio State University; 2016. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1461243619

24. Famelis, Michail. Managing Design-Time Uncertainty in Software Models.

Degree: PhD, 2016, University of Toronto

 The concern for handling uncertainty in software pervades contemporary software engineering. A particular form of uncertainty is that which can exist at multiple stages of… (more)

Subjects/Keywords: Model Transformation; Partial Models; Software Engineering; Software Modelling; Software Processes; Software Verification; 0984

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Famelis, M. (2016). Managing Design-Time Uncertainty in Software Models. (Doctoral Dissertation). University of Toronto. Retrieved from http://hdl.handle.net/1807/72997

Chicago Manual of Style (16th Edition):

Famelis, Michail. “Managing Design-Time Uncertainty in Software Models.” 2016. Doctoral Dissertation, University of Toronto. Accessed March 07, 2021. http://hdl.handle.net/1807/72997.

MLA Handbook (7th Edition):

Famelis, Michail. “Managing Design-Time Uncertainty in Software Models.” 2016. Web. 07 Mar 2021.

Vancouver:

Famelis M. Managing Design-Time Uncertainty in Software Models. [Internet] [Doctoral dissertation]. University of Toronto; 2016. [cited 2021 Mar 07]. Available from: http://hdl.handle.net/1807/72997.

Council of Science Editors:

Famelis M. Managing Design-Time Uncertainty in Software Models. [Doctoral Dissertation]. University of Toronto; 2016. Available from: http://hdl.handle.net/1807/72997


University of Oxford

25. Kesseli, Pascal. Semantic refactorings.

Degree: PhD, 2017, University of Oxford

 Refactorings are structured changes to existing software that leave its externally observable behaviour unchanged. The intent is to improve readability, performance or other non-behavioural properties… (more)

Subjects/Keywords: 005.3; Computer science; software synthesis; software verification; refactoring

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kesseli, P. (2017). Semantic refactorings. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:0c74954e-dc83-463f-bcd4-519d98c3dcca ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.748687

Chicago Manual of Style (16th Edition):

Kesseli, Pascal. “Semantic refactorings.” 2017. Doctoral Dissertation, University of Oxford. Accessed March 07, 2021. http://ora.ox.ac.uk/objects/uuid:0c74954e-dc83-463f-bcd4-519d98c3dcca ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.748687.

MLA Handbook (7th Edition):

Kesseli, Pascal. “Semantic refactorings.” 2017. Web. 07 Mar 2021.

Vancouver:

Kesseli P. Semantic refactorings. [Internet] [Doctoral dissertation]. University of Oxford; 2017. [cited 2021 Mar 07]. Available from: http://ora.ox.ac.uk/objects/uuid:0c74954e-dc83-463f-bcd4-519d98c3dcca ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.748687.

Council of Science Editors:

Kesseli P. Semantic refactorings. [Doctoral Dissertation]. University of Oxford; 2017. Available from: http://ora.ox.ac.uk/objects/uuid:0c74954e-dc83-463f-bcd4-519d98c3dcca ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.748687

26. Chunduri, Annapurna. An Effective Verification Strategy for Testing Distributed Automotive Embedded Software Functions: A Case Study.

Degree: 2016, , Department of Software Engineering

  Context. The share and importance of software within automotive vehicles is growing steadily. Most functionalities in modern vehicles, especially safety related functions like advanced… (more)

Subjects/Keywords: Verification Strategy; Automotive Embedded Software; Test Coverage; Software Engineering; Programvaruteknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chunduri, A. (2016). An Effective Verification Strategy for Testing Distributed Automotive Embedded Software Functions: A Case Study. (Thesis). , Department of Software Engineering. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12805

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chunduri, Annapurna. “An Effective Verification Strategy for Testing Distributed Automotive Embedded Software Functions: A Case Study.” 2016. Thesis, , Department of Software Engineering. Accessed March 07, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12805.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chunduri, Annapurna. “An Effective Verification Strategy for Testing Distributed Automotive Embedded Software Functions: A Case Study.” 2016. Web. 07 Mar 2021.

Vancouver:

Chunduri A. An Effective Verification Strategy for Testing Distributed Automotive Embedded Software Functions: A Case Study. [Internet] [Thesis]. , Department of Software Engineering; 2016. [cited 2021 Mar 07]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12805.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chunduri A. An Effective Verification Strategy for Testing Distributed Automotive Embedded Software Functions: A Case Study. [Thesis]. , Department of Software Engineering; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12805

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

27. Ibrar, Fahad. Strip-Miner: Automatic Bug Detection in Large Software Code with Low False Positive Rate.

Degree: MS, Computer Science and Applications, 2020, Virginia Tech

 Every software code has bugs in it that can change its expected behavior. There have been a lot of efforts to automate the process of… (more)

Subjects/Keywords: Software Engineering; Software/Program Verification; Automatic Bug Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ibrar, F. (2020). Strip-Miner: Automatic Bug Detection in Large Software Code with Low False Positive Rate. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/97934

Chicago Manual of Style (16th Edition):

Ibrar, Fahad. “Strip-Miner: Automatic Bug Detection in Large Software Code with Low False Positive Rate.” 2020. Masters Thesis, Virginia Tech. Accessed March 07, 2021. http://hdl.handle.net/10919/97934.

MLA Handbook (7th Edition):

Ibrar, Fahad. “Strip-Miner: Automatic Bug Detection in Large Software Code with Low False Positive Rate.” 2020. Web. 07 Mar 2021.

Vancouver:

Ibrar F. Strip-Miner: Automatic Bug Detection in Large Software Code with Low False Positive Rate. [Internet] [Masters thesis]. Virginia Tech; 2020. [cited 2021 Mar 07]. Available from: http://hdl.handle.net/10919/97934.

Council of Science Editors:

Ibrar F. Strip-Miner: Automatic Bug Detection in Large Software Code with Low False Positive Rate. [Masters Thesis]. Virginia Tech; 2020. Available from: http://hdl.handle.net/10919/97934


UCLA

28. Gao, Min. Applications of Formal And Semi-formal Verification on Software Testing, High-level Synthesis And Energy Internet.

Degree: Electrical Engineering, 2018, UCLA

 With the increasing power of computers and advances in constraint solving technologies, formal and semi-formal verification have received great attentions on many applications. Formal verification(more)

Subjects/Keywords: Electrical engineering; Energy internet; Formal verification; Functional verification; High-level Synthesis; Software testing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gao, M. (2018). Applications of Formal And Semi-formal Verification on Software Testing, High-level Synthesis And Energy Internet. (Thesis). UCLA. Retrieved from http://www.escholarship.org/uc/item/6jj2b6jn

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gao, Min. “Applications of Formal And Semi-formal Verification on Software Testing, High-level Synthesis And Energy Internet.” 2018. Thesis, UCLA. Accessed March 07, 2021. http://www.escholarship.org/uc/item/6jj2b6jn.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gao, Min. “Applications of Formal And Semi-formal Verification on Software Testing, High-level Synthesis And Energy Internet.” 2018. Web. 07 Mar 2021.

Vancouver:

Gao M. Applications of Formal And Semi-formal Verification on Software Testing, High-level Synthesis And Energy Internet. [Internet] [Thesis]. UCLA; 2018. [cited 2021 Mar 07]. Available from: http://www.escholarship.org/uc/item/6jj2b6jn.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gao M. Applications of Formal And Semi-formal Verification on Software Testing, High-level Synthesis And Energy Internet. [Thesis]. UCLA; 2018. Available from: http://www.escholarship.org/uc/item/6jj2b6jn

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Chicago

29. Bernasconi, Anna. Building Deductive Proofs of LTL Properties for Iteratively Refined Systems.

Degree: 2016, University of Illinois – Chicago

 Modern software development processes are evolving from sequential to increasingly agile and incremental paradigms. Verification, unavoidable step of a correct software production, cannot get left… (more)

Subjects/Keywords: formal software verification; model checking; deductive verification; requirements; incremental; deductive proof; deductive system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bernasconi, A. (2016). Building Deductive Proofs of LTL Properties for Iteratively Refined Systems. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/20884

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bernasconi, Anna. “Building Deductive Proofs of LTL Properties for Iteratively Refined Systems.” 2016. Thesis, University of Illinois – Chicago. Accessed March 07, 2021. http://hdl.handle.net/10027/20884.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bernasconi, Anna. “Building Deductive Proofs of LTL Properties for Iteratively Refined Systems.” 2016. Web. 07 Mar 2021.

Vancouver:

Bernasconi A. Building Deductive Proofs of LTL Properties for Iteratively Refined Systems. [Internet] [Thesis]. University of Illinois – Chicago; 2016. [cited 2021 Mar 07]. Available from: http://hdl.handle.net/10027/20884.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bernasconi A. Building Deductive Proofs of LTL Properties for Iteratively Refined Systems. [Thesis]. University of Illinois – Chicago; 2016. Available from: http://hdl.handle.net/10027/20884

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Delaware

30. Zirkel, Timothy K. Formally verifying the accuracy of numerical approximations in scientific software.

Degree: PhD, University of Delaware, Department of Computer and Information Sciences, 2014, University of Delaware

 Numerical computation has broad application to a variety of fields. Typically a numerical method yields an approximation to an exact mathematical value, since programs cannot… (more)

Subjects/Keywords: Numerical calculations  – Verification.; Computer software  – Verification.; C (Computer program language); Formal methods (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zirkel, T. K. (2014). Formally verifying the accuracy of numerical approximations in scientific software. (Doctoral Dissertation). University of Delaware. Retrieved from http://udspace.udel.edu/handle/19716/13434

Chicago Manual of Style (16th Edition):

Zirkel, Timothy K. “Formally verifying the accuracy of numerical approximations in scientific software.” 2014. Doctoral Dissertation, University of Delaware. Accessed March 07, 2021. http://udspace.udel.edu/handle/19716/13434.

MLA Handbook (7th Edition):

Zirkel, Timothy K. “Formally verifying the accuracy of numerical approximations in scientific software.” 2014. Web. 07 Mar 2021.

Vancouver:

Zirkel TK. Formally verifying the accuracy of numerical approximations in scientific software. [Internet] [Doctoral dissertation]. University of Delaware; 2014. [cited 2021 Mar 07]. Available from: http://udspace.udel.edu/handle/19716/13434.

Council of Science Editors:

Zirkel TK. Formally verifying the accuracy of numerical approximations in scientific software. [Doctoral Dissertation]. University of Delaware; 2014. Available from: http://udspace.udel.edu/handle/19716/13434

[1] [2] [3] [4] [5] … [11]

.