| 1. | The single verification model based on the cookie bill and its implementation 票据的单一认证模型及实现 |
| 2. | Under the instructing of this method , it ’ s much easier to build verification model , and can make sure the design model and verification model is consistent 本文提出了一套系统方法,采用这种方法能够快速地建立验证模型,并且能够保证验证模型和设计模型之间的等价性。 |
| 3. | The difficulty of this method is that the workload is heavy , and it ’ s hard to ensure the consistency of design model and verification model . we raise a method to instruct these works 这种模型建立方法的主要难点在于验证模型与设计模型之间差异较大,需要做的修改工作过多,并且难于保证两种模型之间的等价性。 |
| 4. | The characteristic of mpeg - 4 accelerates the development of multimedia . the paper introduces the study background and necessity of mpeg - 4 for one thing . then its system standard is described and the key technique of video encoder in the verification models is analyzed 本文首先介绍了mpeg - 4的研究背景和研究的必要性,之后简单的概述了mpeg - 4的系统标准,详细分析了校验模型中的视频编码,对mpeg - 4的标准有了大概的了解。 |
| 5. | In this approach , a global strategy of bottleneck reasoning based on the hypothesis - verification model is adopted , in which reusable data representation with high efficiency in data synthesis and interactive guidance from users are applied to improve such reasoning 该方法采用了基于假设验证模型的瓶颈搜索全局策略、数据复用搜索加速方法以及用户交互式的搜索制导等技术, ?应用这种性能分析方法改进了一个已有的?行程序事后性能分析系统。 |
| 6. | According to the jpeg 2000 final committee verification model version 8 . 5 [ 11 ] , tow kinds of filter are authenticated . one is 5 / 3 filter , it is used in the lossless still picture compression , the other is 9 / 7 filter which is used in the lossy still picture compression 根据jpeg2000的声明模型( verificationmodel , vm )版本8 . 5 ,符合标准规定的两种滤波器,一种是5 3滤波器,它适用于无损压缩,另一种是9 7滤波器,它适用于有损压缩。 |
| 7. | The new method can be divided into two parts : the construction of verification model and the construction of verification platform . not like the semi - custom verification model is built from the design specification , the full - custom verification model is built from full - custom design data 对于验证模型的建立,在半定制设计验证方法中,一般是以系统描述为基础建立验证模型,而在我们的全定制设计验证方法中,验证模型主要以全定制设计数据为基础建立的。 |
| 8. | Furthermore , three expanded gny logic rules are given during above analysis based on gny , and at the end of this paper , security protocol formal verification based on attack logics is discussed and presented , a development framework of integrating such verification model into automated analysis tools such as spearii is shown finally 另外,本文在使用gny逻辑的分析过程中,提出三条实用的gny扩展规则,而在文章最后,对基于攻击逻辑的安全协议验证方法作了初步研究,提出了将该协议攻击验证技术融入协议自动分析工具的设计框架。 |