• Nem Talált Eredményt

18 eredmény a kulcsszóra: 'formal verification of the pastry protocol'

Formal Verification of Programs

Either, the assertions used in the consequence rules cannot be captured by a complete proof system, or not every set of states can be represented by formulas

Protected

N/A

117
0
0
2022
SOME COMPANIONS OF AN OSTROWSKI TYPE INEQUALITY AND APPLICATIONS

The following result is useful in providing the best quadrature rule in the class for approximating the integral of a function f : [a, b] → R whose first derivative is

Protected

N/A

23
0
0
2022
In this paper, we provide some Feng Qi typeq-Integral Inequalities, by using ana- lytic and elementary methods in Quantum Calculus

In view of the interest in this type of inequality, much attention has been paid to the problem and many authors have extended the inequality to more general cases (see [1, 8])..

Protected

N/A

7
0
0
2022
ÀCRONYMORUM SELECTORUM

AEREA American Electric Railway Engineering Association / е / aero/п/ = A 22. AES Aircraft Electrical Society,

Protected

N/A

380
0
0
2022
We establish some companions of an Ostrowski type integral inequality for func- tions whose derivatives are absolutely continuous

The following result is useful in providing the best quadrature rule in the class for approxi- mating the integral of a function f : [a, b] → R whose first derivative is

Protected

N/A

12
0
0
2022
A significant part of the heating arrangement is a medium-frequency – so called length-field – heating inductor

In case of the inductor only the distance between the pole surfaces, signed by d and the number of turns, signed by N and in connection with it the width of the conductor m

Protected

N/A

10
0
0
2022
Formal Methods in Software Engineering

In computer science, formal methods refers to mathematically based techniques for the specification, development and verification of software and hardware systems!.

Protected

N/A

98
0
0
2022
On utilising an identity from [5], some weighted Ostrowski type inequalities are established

RASSIAS (Eds.), Ostrowski Type Inequalities and Applications in Numerical Integration, Kluwer Academic Publishers, Dordrecht, 2002..

Protected

N/A

10
0
0
2022
Evolution and Modern Approaches of the Power Transformer Cost Optimization Methods

"Performance Comparison of Multi Design Method and Meta-Heuristic Methods for Optimal Preliminary Design of Core-Form Power Transformers", Periodica Polytechnica

Protected

N/A

14
0
0
2022
Közoktatási vezető és pedagógus szakvizsga szakirányú továbbképzési szak képzési és kimeneti követelményei

(a közoktatás központi értékelési rendszere, a központi mérésekkel kapcsolatos intézményi szervezési, szakmai feladatok, a mérési eredmények beépítése a

Protected

N/A

5
0
0
2022
Element content of Fusarium-infected wheat genotypes Szeged – Timişoara axis for the safe food and feed SZETISA1 HURO/0901/147/2.2.2

Line 474 – earlier Fusarium resistant (alias 484), high Mn level in the ear 1/a – inoculated with Fusarium culmorum. 2/a – inoculated with

Protected

N/A

32
0
0
2023
CONSTRUCTION OF FORMAL MODELS AND VERIFYING PROPERTY SPECIFICATIONS THROUGH AN EXAMPLE OF RAILWAY INTERLOCKING SYSTEMS

In this section the result of transformation from functional specification into formal models (Petri net and UPPAAL automata) is summarized and some examples of

Protected

N/A

12
0
0
2022
FPGA implementation of a foveal image processing system for UAV applications

Based on the size and centroid of the objects suspicious locations are identified and fovea (region of interest, ROI) processing performs one after the other, by instructing the

Protected

N/A

2
0
0
2022
Formal Verification of Real-Time Systems with Data Processing

In Section 3, we introduce the formalism of Timed Control Flow Automata, an extension of Control Flow Automata with notions of Timed Automata, and describe how verifiers for

Protected

N/A

9
0
0
2022
Verification of Communication Protocols Based on Formal Methods Integration

The usual method for performing the system analysis in this case is the following: Firstly, the desired external behavior of the protocol is specified in the form of a process

Protected

N/A

12
0
0
2022
A Formal Analysis of Syverson’s Rational Exchange Protocol

Then, in Section 5, we construct the protocol game of the Syverson protocol and prove that it satisfies the definition of rational exchange assuming that the communication be- tween

Protected

N/A

13
0
0
2022
Integrating formal, soft and diagrammatic approaches in high-level synthesis and hardware-software co-design

In the present software-development practice it is still rather rare to use formal specification and verification methods, although the size and complexity of current soft- ware

Protected

N/A

6
0
0
2022
Uniform Test Selection Method

it can apply in more phases of the protocol "life-cycle" namely in the design of the formal spec- ifications (giving the testing information in the specification), in

Protected

N/A

1
0
0
2022

Töltsön fel további dokumentumokat, és töltse le azonnal az anyagtanulmányokat!