咨询与建议

限定检索结果

文献类型

  • 507 篇 期刊文献
  • 449 篇 会议
  • 17 篇 学位论文
  • 1 册 图书

馆藏范围

  • 974 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 899 篇 工学
    • 668 篇 计算机科学与技术...
    • 567 篇 软件工程
    • 211 篇 电气工程
    • 75 篇 控制科学与工程
    • 39 篇 信息与通信工程
    • 14 篇 机械工程
    • 11 篇 电子科学与技术(可...
    • 6 篇 航空宇航科学与技...
    • 6 篇 网络空间安全
    • 5 篇 仪器科学与技术
    • 4 篇 交通运输工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 材料科学与工程(可...
    • 1 篇 冶金工程
  • 126 篇 理学
    • 117 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 系统科学
    • 3 篇 生物学
    • 2 篇 科学技术史(分学科...
    • 1 篇 物理学
    • 1 篇 化学
  • 35 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 9 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 4 篇 哲学
    • 3 篇 哲学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 文学
    • 1 篇 中国语言文学
    • 1 篇 外国语言文学
    • 1 篇 新闻传播学
  • 2 篇 医学
  • 2 篇 艺术学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学

主题

  • 974 篇 program verifica...
  • 55 篇 model checking
  • 52 篇 verification
  • 50 篇 program testing
  • 45 篇 separation logic
  • 43 篇 formal specifica...
  • 38 篇 formal methods
  • 36 篇 theorem proving
  • 35 篇 abstract interpr...
  • 34 篇 static analysis
  • 29 篇 concurrency
  • 28 篇 embedded systems
  • 26 篇 termination
  • 26 篇 hoare logic
  • 25 篇 symbolic executi...
  • 24 篇 software enginee...
  • 23 篇 java
  • 22 篇 formal verificat...
  • 20 篇 reliability
  • 20 篇 program transfor...

机构

  • 18 篇 microsoft res re...
  • 13 篇 inria
  • 8 篇 microsoft res re...
  • 7 篇 tsinghua univ sc...
  • 7 篇 uppsala univ upp...
  • 7 篇 yale univ new ha...
  • 6 篇 univ illinois de...
  • 5 篇 princeton univ p...
  • 5 篇 swiss fed inst t...
  • 5 篇 cnr iasi rome
  • 5 篇 univ twente ensc...
  • 5 篇 univ tokyo
  • 5 篇 imdea software i...
  • 5 篇 univ maryland co...
  • 5 篇 mit comp sci & a...
  • 5 篇 univ roma tor ve...
  • 4 篇 peking univ sch ...
  • 4 篇 univ london impe...
  • 4 篇 beijing natl res...
  • 4 篇 moe key lab info...

作者

  • 13 篇 proietti maurizi...
  • 13 篇 pettorossi alber...
  • 11 篇 fioravanti fabio
  • 10 篇 pottier francois
  • 10 篇 he fei
  • 9 篇 de angelis emanu...
  • 8 篇 atig mohamed fao...
  • 8 篇 shao zhong
  • 8 篇 huisman marieke
  • 8 篇 bouajjani ahmed
  • 7 篇 zhan naijun
  • 7 篇 abdulla parosh a...
  • 7 篇 gu ronghui
  • 7 篇 rybalchenko andr...
  • 7 篇 leino k. rustan ...
  • 6 篇 xia bican
  • 6 篇 kovacs laura
  • 6 篇 pinto jorge sous...
  • 6 篇 birkedal lars
  • 5 篇 mueller peter

语言

  • 891 篇 英文
  • 63 篇 其他
  • 13 篇 德文
  • 6 篇 中文
  • 1 篇 西班牙文
检索条件"主题词=Program verification"
974 条 记 录,以下是1-10 订阅
排序:
Extract, model, refine: improved modelling of program verification tools through data enrichment
收藏 引用
SOFTWARE AND SYSTEMS MODELING 2025年 1-21页
作者: Lathouwers, Sophie Liu, Yujie Zaytsev, Vadim Univ Twente Formal Methods & Tools Enschede Netherlands
In software engineering, models are used for many different things. In this paper, we focus on program verification, where we use models to reason about the correctness of systems. There are many different types of pr... 详细信息
来源: 评论
Towards neural-network-guided program synthesis and verification
收藏 引用
FORMAL METHODS IN SYSTEM DESIGN 2025年 1-33页
作者: Kobayashi, Naoki Sekiyama, Taro Sato, Issei Unno, Hiroshi Univ Tokyo Tokyo Japan Natl Inst Informat SOKENDAI Tokyo Japan Tohoku Univ Sendai Japan
We propose a novel framework of program and invariant synthesis called neural network-guided synthesis (NeuGuS). We first show that, by suitably designing and training neural networks, we can extract logical formulas ... 详细信息
来源: 评论
program verification AND ADA
收藏 引用
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES 1982年 第2期129卷 55-62页
作者: MCGETTRICK, AD Department of Computer Science University of Strathclyde Glasgow UK
One of the design aims of Ada was to provide a language which would encourage the production of reliable programs: An important technique used to provide greater reliability is program verification. In this paper, we ... 详细信息
来源: 评论
program verification using symbolic game semantics
收藏 引用
THEORETICAL COMPUTER SCIENCE 2014年 第Part3期560卷 364-379页
作者: Dimovski, Aleksandar S. FON Univ Fac Informat Commun Tech Skopje 1000 North Macedonia
We introduce a new symbolic representation of algorithmic game semantics, and show how it can be applied for efficient verification of open (incomplete) programs. The focus is on an Algol-like programming language whi... 详细信息
来源: 评论
program verification using Constraint Handling Rules and Array Constraint Generalizations
收藏 引用
FUNDAMENTA INFORMATICAE 2017年 第1期150卷 73-117页
作者: De Angelis, Emanuele Pettorossi, Alberto Fioravanti, Fabio Proietti, Maurizio Univ G dAnnunzio Viale Pindaro 42 I-65127 Pescara Italy Univ Roma Tor Vergata Via Politecn 1 I-00133 Rome Italy CNR IASI Via Taurini 19 I-00185 Rome Italy
The transformation of constraint logic programs (CLP programs) has been shown to be an effective methodology for verifying properties of imperative programs. By following this methodology, we encode the negation of a ... 详细信息
来源: 评论
program verification and Functioning of Operative Computing Revisited: How about Mathematics Engineering?
收藏 引用
MINDS AND MACHINES 2011年 第2期21卷 337-359页
作者: Pincas, Uri Open Univ Israel Raanana Israel
The issue of proper functioning of operative computing and the utility of program verification, both in general and of specific methods, has been discussed a lot. In many of those discussions, attempts have been made ... 详细信息
来源: 评论
program verification by using DISCOVERER
收藏 引用
1st Working Conference on Verified Software - Theories, Tools and Experiments (VSTTE 2005)
作者: Yang, Lu Zhan, Naijun Xia, Bican Zhou, Chaochen East China Normal Univ Inst Software Engn Shanghai Peoples R China Acad Sinica Comp Sci Lab Inst Software Taipei Taiwan Peking Univ Sch Math Sci LMAM Beijing Peoples R China
Recent advances in program verification indicate that various verification problems can be reduced to semi-algebraic system (SAS for short) solving. An SAS consists of polynomial equations and polynomial inequalities.... 详细信息
来源: 评论
program verification by Reduction to Semi-algebraic Systems Solving
Program Verification by Reduction to Semi-algebraic Systems ...
收藏 引用
3rd International Symposium on Leveraging Applications of Formal Methods, verification and Validation
作者: Xia, Bican Yang, Lu Zhan, Naijun Peking Univ LMAM Sch Math Sci Beijing Peoples R China East China Normal Univ Shanghai Key Lab Trustworthy Comp Shanghai Peoples R China Chinese Acad Sci Inst Software Comp Sci Lab Beijing 100864 Peoples R China
The discovery of invariants and ranking functions plays a central role in program verification. In our previous work, we investigated invariant generation and non-linear ranking function discovering of polynomial prog... 详细信息
来源: 评论
program verification Under Weak Memory Consistency Using Separation Logic  29th
Program Verification Under Weak Memory Consistency Using Sep...
收藏 引用
29th International Conference on Computer-Aided verification (CAV)
作者: Vafeiadis, Viktor SWS MPI Saarbrucken Germany
The semantics of concurrent programs is now defined by a weak memory model, determined either by the programming language (e.g., in the case of C/C++11 or Java) or by the hardware architecture (e.g., for assembly and ... 详细信息
来源: 评论
program verification Enhanced Precise Analysis of Interrupt-Driven program Vulnerabilities  28
Program Verification Enhanced Precise Analysis of Interrupt-...
收藏 引用
28th Asia-Pacific Software Engineering Conference (APSEC)
作者: Du, Xiang Yin, Liangze Feng, Haining Dong, Wei Natl Univ Def Technol Lab Software Engn Complex Syst Changsha Peoples R China
Due to the non-deterministic occurring of interrupt service routines, vulnerabilities of interrupt-driven programs, such as data race and atomicity violation, are usually hard to discover. Static analysis is an effect... 详细信息
来源: 评论