Searched for: subject:"verification"
(1 - 20 of 47)

Pages

document
Liu, X. (author), Markine, V.L. (author)
This paper presents a correlation analysis of the structural dynamic responses and weather conditions of a railway crossing. Prior to that, the condition monitoring of the crossing as well as the indicators for crossing condition assessment are briefly introduced. In the correlation analysis, strong correlations are found between acceleration...
journal article 2019
document
Lin, Q. (author)
Automatic control is a technique about designing control devices for controlling ma- chinery processes without human intervention. However, devising controllers using conventional control theory requires first principle design on the basis of the full under- standing of the environment and the plant, which is infeasible for complex control tasks...
doctoral thesis 2019
document
Coppola, Mario (author), Guo, J. (author), Gill, E.K.A. (author), de Croon, G.C.H.E. (author)
In this paper we present a procedure to automatically design and verify the local behavior of robots with highly limited cognition. All robots are: anonymous, homogeneous, non-communicating, memoryless, reactive, do not know their global position, do not have global state information, and operate by a local clock. They only know: (1) the...
journal article 2019
document
Ma, Y. (author)
Nowadays, wheel-rail (W/R) interfaces are suffering from the practical problems (e.g. wear, rolling contact defects) with the increase of train speed and traffic density. For accurate prediction of wear and/or growth of rolling contact defects, rapid determination of detailed contact responses (i.e. contact stresses & strains) using...
doctoral thesis 2018
document
Duran, J.M. (author), Formanek, N. (author)
Several philosophical issues in connection with computer simulations rely on the assumption that results of simulations are trustworthy. Examples of these include the debate on the experimental role of computer simulations (Parker in Synthese 169(3):483–496, 2009; Morrison in Philos Stud 143(1):33–57, 2009), the nature of computer data ...
journal article 2018
document
Evers, L.G. (author), Assink, J. D. (author), Smets, P.S.M. (author)
Supersonic rockets generate low-frequency acoustic waves, that is, infrasound, during the launch and re-entry. Infrasound is routinely observed at infrasound arrays from the International Monitoring System, in place for the verification of the Comprehensive Nuclear-Test-Ban Treaty. Association and source identification are key elements of the...
journal article 2018
document
Roungas, B.V. (author), Meijer, Sebastiaan (author), Verbraeck, A. (author)
Thirty years of research on validation and verification have returned a plethora of methods and statistical techniques through methodological and case studies. It is, however, this abundance of methods and techniques that poses a major challenge. Due to time and budget constraints, it is impossible to apply all the available methods and...
journal article 2018
document
Weemstra, C. (author), Draganov, D.S. (author), Ruigrok, E.N. (author), Hunziker, J.W. (author), Gomez, Martin (author), Wapenaar, C.P.A. (author)
Obtaining new seismic responses from existing recordings is generally referred to as seismic interferometry (SI). Conventionally, the SI responses are retrieved by simple crosscorrelation of recordings made by separate receivers: one of the receivers acts as a ‘virtual source’ whose response is retrieved at the other receivers.When SI is applied...
journal article 2017
document
Roungas, B.V. (author), Meijer, S.A. (author), Verbraeck, A. (author)
Thirty years of research on validation and verification (V\&V) has returned a plethora of methods, statistical techniques, and reported case studies. It is that abundance of methods that poses a major challenge. Because of overlap between methods and time and budget constraints, it is impossible to apply all the available methods in a single...
conference paper 2017
document
Liebenwein, Lucas (author), Schwarting, Wilko (author), Vasile, Cristian-Ioan (author), DeCastro, Jonathan (author), Alonso Mora, J. (author), Karaman, Sertac (author), Rus, Daniela (author)
Recent advances in autonomous driving have raised the problem of safety<br/>to the forefront and incentivized research into establishing safety guarantees. In this paper, we propose a safety verification framework as a safety standard for driving controllers with full or shared autonomy based on compositional and contract-based principles. Our...
conference paper 2017
document
Assink, J. D. (author), Averbuch, G. (author), Smets, P.S.M. (author), Evers, L.G. (author)
The underground nuclear tests by the Democratic People's Republic of Korea (DPRK) generated atmospheric infrasound both in 2013 and 2016. Clear detections were made in the Russian Federation (I45RU) and Japan (I30JP) in 2013 at stations from the International Monitoring System. Both tropospheric and stratospheric refractions arrived at the...
journal article 2016
document
Heck, P.M. (author)
The goal of this thesis was to obtain a deeper understanding of the notion of quality for Just-in-Time (JIT) Requirements. JIT requirements are the opposite of up-front requirements. JIT requirements are not analyzed or defined until they are needed meaning that development is allowed to begin with incomplete requirements. We started our...
doctoral thesis 2016
document
Watanabe, Kohei (author), Pisano, F. (author), Jeremi, Boris (author)
Presented here is a numerical investigation that (re-)appraises standard rules for space/time discretization in seismic wave propagation analyses. Although the issue is almost off the table of research, situations are often encountered where (established) discretization criteria are not observed and inaccurate results possibly obtained. In...
journal article 2016
document
Lorenzen, Florian (author), Erdweg, S.T. (author)
Syntactic language extensions can introduce new facilities into a programming language while requiring little implementation effort and modest changes to the compiler. It is typical to desugar language extensions in a distinguished compiler phase after parsing or type checking, not affecting any of the later compiler phases. If desugaring...
journal article 2016
document
Esmaeil Zadeh Soudjani, S. (author)
Stochastic hybrid systems involve the coupling of discrete, continuous, and probabilistic phenomena, in which the composition of continuous and discrete variables captures the behavior of physical systems interacting with digital, computational devices. Because of their versatility and generality, methods for modeling, analysis, and verification...
doctoral thesis 2014
document
Heck, P. (author), Zaidman, A. (author)
Verification activities are necessary to ensure that the requirements are specified in a correct way. However, until now requirements verification research has focused on traditional up-front requirements. Agile or just-in-time requirements are by definition incomplete, not specific and might be ambiguous when initially specified, indicating a...
report 2014
document
Esmaeil Zadeh Soudjani, S. (author), Abate, A. (author)
This work is concerned with the generation of finite abstractions of general state-space processes to be employed in the formal verification of probabilistic properties by means of automatic techniques such as probabilistic model checkers. The work employs an abstraction procedure based on the partitioning of the state-space, which generates a...
journal article 2013
document
Bouwers, E. (author), Van Deursen, A. (author), Visser, J. (author)
In the evaluation of implemented software architectures, metrics can be used to provide an indication of the degree of encapsulation within a system and to serve as a basis for an informed discussion about how well-suited the system is for expected changes. Current literature shows that over 40 different architecture-level metrics are available...
report 2011
document
Hemel, Z. (author), Groenewegen, D.M. (author), Kats, L.C.L. (author), Visser, E. (author)
Modern web application development frameworks provide web application developers with highlevel abstractions to improve their productivity. However, their support for static verification of applications is limited. Inconsistencies in an application are often not detected statically, but appear as errors at run-time. The reports about these...
report 2010
document
Dechesne, F. (author), Wang, Y. (author)
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the agents. Since BAN-logic, there have been several initiatives and attempts to incorporate epistemics into the analysis of security protocols. In this paper, we give an overview of work in the field and present it in a unified perspective, with...
journal article 2010
Searched for: subject:"verification"
(1 - 20 of 47)

Pages