Search results for " verification"
showing 10 items of 91 documents
Evaluation Framework for Analyzing the Applicability of Criteria Lists for the Selection of Requirements Management Tools Supporting Distributed Coll…
2016
Effective requirements management and enabling tools are critical for successfully developing and maintaining services and products. The identification and selection of an appropriate requirements management tool can be a costly, time-consuming, and error-prone undertaking especially in the context of software product line requirements management, requiring the tools to support both product and platform development activities that often involve geographically distributed, collaborating, and competing stakeholders. Criteria lists have been developed to facilitate the selection. This research (1) creates an evaluation framework to review the applicability of the lists for the selection of req…
Measles in Italy: Viral strains and crossing borders
2019
In 2017, Italy experienced one of the largest outbreaks of measles in recent years, with 5404 notified cases and 4347 confirmed cases. A further 2029 cases were notified during the first 6 months of 2018, and 1516 of them were laboratory-confirmed. The B3 and D8 genotypes were identified as those responsible for the outbreak. Possible transmission routes can be established by monitoring the circulating measles virus strains in support of the national health authorities to warn people and travellers. Keywords: Outbreak, Measles, Genotype identification, Surveillance
Progress Checking for Dummies
2018
Verification of progress properties is both conceptually and technically significantly more difficult than verification of safety and deadlock properties. In this study we focus on the conceptual side. We make a simple modification to a well-known model to demonstrate that it passes progress verification although the resulting model is intuitively badly incorrect. Then we point out that the error can be caught easily by adding a termination branch to the system. We compare the use of termination branches to the established method of addressing the same need, that is, weak fairness. Then we discuss another problem that may cause failure of catching progress errors even with weak fairness. Fi…
Determinación de la edad de un extranjero indocumentado : A propósito de la sentencia de la audiencia provincial de barcelona, de 24 de enero de 2020
2021
In recent years, immigration of minors has increased, which means that administrations establish a differentiated treatment for this sector of immigration due to the fact that they are minors; There are many aspects to take into account in these cases, including verifying the minority age, a fact that is more complicated when it comes to adolescents. This is what is analyzed by the Judgment of the Provincial Court of Barcelona, of January 24, 2020, which confirms the Resolution of the General Directorate of Attention to Children and Adolescents, which agreed to the closure of the homelessness file and the admission of the plaintiff in a Protection Center until the verification of their pers…
Reference Standards for Software Evaluation
1990
AbstractThe field of automated ECG analysis was one of the earliest topics in Medical Informatics and may be regarded as a model both for computer-assisted medical diagnosis and for evaluating medical diagnostic programs. The CSE project has set reference standards of two kinds: In a broad sense, a standard how to perform a comprehensive evaluation study, in a narrow sense, standards as specific references for evaluating computer ECG programs. The evaluation methodology used within the CSE project is described as a basis for presentation of results which are published elsewhere in this issue.
Improving Interpolants for Linear Arithmetic
2015
Craig interpolation for satisfiability modulo theory formulas have come more into focus for applications of formal verification. In this paper we, introduce a method to reduce the size of linear constraints used in the description of already computed interpolant in the theory of linear arithmetic with respect to the number of linear constraints. We successfully improve interpolants by combining satisfiability modulo theory and linear programming in a local search heuristic. Our experimental results suggest a lower running time and a larger reduction compared to other methods from the literature.
SAL—A Novel Quality Measure for the Verification of Quantitative Precipitation Forecasts
2008
Abstract A novel object-based quality measure, which contains three distinct components that consider aspects of the structure (S), amplitude (A), and location (L) of the precipitation field in a prespecified domain (e.g., a river catchment) is introduced for the verification of quantitative precipitation forecasts (QPF). This quality measure is referred to as SAL. The amplitude component A measures the relative deviation of the domain-averaged QPF from observations. Positive values of A indicate an overestimation of total precipitation; negative values indicate an underestimation. For the components S and L, coherent precipitation objects are separately identified in the forecast and obser…
Spatial Forecast Verification Methods Intercomparison Project: Application of the SAL Technique
2009
Abstract In this study, a recently introduced feature-based quality measure called SAL, which provides information about the structure, amplitude, and location of a quantitative precipitation forecast (QPF) in a prespecified domain, is applied to different sets of synthetic and realistic QPFs in the United States. The focus is on a detailed discussion of selected cases and on the comparison of the verification results obtained with SAL and some classical gridpoint-based error measures. For simple geometric precipitation objects it is shown that SAL adequately captures errors in the size and location of the objects, however, not in their orientation. The artificially modified (so-called fake…
Fingerprint Quality Evaluation in a Novel Embedded Authentication System for Mobile Users
2015
The way people access resources, data and services, is radically changing using modern mobile technologies. In this scenario, biometry is a good solution for security issues even if its performance is influenced by the acquired data quality. In this paper, a novel embedded automatic fingerprint authentication system (AFAS) for mobile users is described. The goal of the proposed system is to improve the performance of a standard embedded AFAS in order to enable its employment in mobile devices architectures. The system is focused on the quality evaluation of the raw acquired fingerprint, identifying areas of poor quality. Using this approach, no image enhancement process is needed after the …
Asynchronous Runtime Verification of Business Processes
2015
The authors propose a runtime verification mechanism for business processes. This mechanism allows verifying the correctness of business process execution and it runs in parallel with the base processes affecting them insignificantly. The authors have identified the case where the use of business process runtime verification is helpful and applicable. The verification mechanism monitors the business process execution and verifies compliance with the base process description. The verification mechanism prototype was developed and tested in real business processes, as well as limits of runtime verification overhead were evaluated.