Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Verification

Encyclopedia of Information Science and Technology, Second Edition
It is the activity of checking for the consistency of different parts of a model or different models among them. It should answer the question “Are we creating the model right?”
Published in Chapter:
Creating Software System Context Glossaries
Graciela D.S. Hadad (Universidad Nacional de La Matanza, Argentina & Universidad Nacional de La Plata, Argentina) and Jorge H. Doorn (INTIA, Universidad Nacional del Centro de la Provincia de Buenos Aires, Argentina and Universidad Nacional de La Matanza, Argentina)
DOI: 10.4018/978-1-60566-026-4.ch128
Abstract
Requirements engineering (RE) is the area of software engineering responsible for the elicitation and definition of the software system requirements. This task implies joining the knowledge of the services that a software system can and cannot provide with the knowledge of clients’ and users’ needs (Jackson, 1995; Katasonov & Sakkinen, 2005; Kotonya & Sommerville, 1998; Sommerville & Sawyer, 1997; Sutcliffe, Fickas, & Sohlberg, 2006; Uchitel, Chatley, Kramer, & Magee, 2006). Frequently, this activity is done by people with a software engineering bias. The underlying hypothesis of this choice is that users’ needs are easier to understand than the software’s possible behaviors. This is not always true; however, this is the metacontext in which most RE heuristics and methodologies have been developed. Understanding clients’ and users’ needs is far more complex than merely interviewing selected clients and user representatives, compiling all gathered information in one document. Defining how to put into service a complex software system within an organization requires envisioning how the business process of the organization will be in the future from both points of view: software organization and business organization. This is the key of the RE commitment: to imagine how the future business process will be. This RE commitment requires a good knowledge about how the business process actually is. Understanding the software system’s preexistent context basically means understanding the clients’ and users’ culture. In other words, this part of the RE is a learning process.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Biometrics in Cloud Computing
Verification is any means by which a person can be uniquely indentified by evaluating one or more distinguishing biological traits. The oldest form of biometrics verification is fingerprint analysis. Biometric verification has advanced considerably with the advent of computerized databases and the digitization of analog data, allowing almost instantaneous personal identification. Verification systems verifying that an individual is the person that they claim to be, based upon validating a sample collected biometric sample for the individual. Verification systems are generally described as a 1 to 1 matching systems, because the system tries to match the biometric presented by the individual against a specific biometric already on file.
Full Text Chapter Download: US $37.50 Add to Cart
Investigating Software Testing Practices in Software Development Organizations: Sri Lankan Experience
Verification is the process of evaluating a development stage of products to determine whether they comply with the requirements specified. Verification helps to ensure that the product being developed is in compliance with the standards and specifications of the model. Verification includes “reviews, meetings, and inspections.”
Full Text Chapter Download: US $37.50 Add to Cart
Digital Video Watermarking Using Diverse Watermarking Schemes
The watermark can be extracted from the media and compared with the original watermark to prove ownership.
Full Text Chapter Download: US $37.50 Add to Cart
Activity: IT Audit Follow-Up Course of Action
Determining whether a system, process, activity, or task conforms to requirements.
Full Text Chapter Download: US $37.50 Add to Cart
Completeness Concerns in Requirements Engineering
It is the activity of checking different parts of a model or different models among them. It should answer the question “Are we creating the model right?”
Full Text Chapter Download: US $37.50 Add to Cart
Applications of Keystroke Dynamics Biometrics in Online Learning Environments: A Selective Study
The biometric system authentication process which matches a captured biometric against the person's stored template (1:1).
Full Text Chapter Download: US $37.50 Add to Cart
The What, How, and When of Formal Methods
The process of determining whether a product fulfills a set of previously established requirements. In formal verification, this is the process of proving that a more concrete specification preserves the properties of a more abstract specification.
Full Text Chapter Download: US $37.50 Add to Cart
Formal Methods Overview
The process of determining whether or not the products of a specification phase fulfill a set of established requirements. Sometimes this is also used to indicate the process of proving that a more concrete specification preserved the properties of a more abstract specification.
Full Text Chapter Download: US $37.50 Add to Cart
Biometric Technologies in Healthcare Biometrics
Verification is the act of verifying an identity what he/she claims (1:1 matching).
Full Text Chapter Download: US $37.50 Add to Cart
EarLocalizer: A Deep-Learning-Based Ear Localization Model for Side Face Images in the Wild
A process of the biometrics-based authentication system, in which for a new query the unique features are extracted and matched against the database. If the match score is more than some threshold the user is authenticated as genuine otherwise an imposter.
Full Text Chapter Download: US $37.50 Add to Cart
A Road Map for the Validation, Verification and Testing of Discrete Event Simulation
Full Text Chapter Download: US $37.50 Add to Cart
A Simulation Model for Resource Balancing in Healthcare Systems
Verification pertains to the computer program prepared for the simulation model. Is the computer program performing properly? With complex models, it is difficult, if not impossible; to translate a model successfully in its entirety without a good deal of debugging; if the input parameters and logical structure of the model are correctly represented in the computer, verification has been completed.
Full Text Chapter Download: US $37.50 Add to Cart
Formalization Process in Software Development
The process of determining whether or not the products of a specification phase fulfill a set of established requirements. Sometimes this is also used to indicate the process of proving that a more concrete specification preserves the properties of a more abstract specification.
Full Text Chapter Download: US $37.50 Add to Cart
Dealing with Completeness in Requirements Engineering
The activity of checking different parts of a model or different models among them. It should answer the question: Are we creating the model right?
Full Text Chapter Download: US $37.50 Add to Cart
Uncovering Limitations of E01 Self-Verifying Files
The process by which an image file is verified before use. Involves comparing hash values computed when the image file was made and when it is loaded into computer forensic software. Any discrepancy between the hash values suggests tampering or corrupting of the data within the image file.
Full Text Chapter Download: US $37.50 Add to Cart
Application of Face Recognition Techniques in Video for Biometric Security: A Review of Basic Methods and Emerging Trends
It is the process of establishing the truth, accuracy, or validity of something. For person verification, biometrics are used to verify an individual besides using some traditional methods. Image based person verification is a system which is a one-to-one matching to verify one individual’s claim that who he is by comparing his image with the images already stored in the database.
Full Text Chapter Download: US $37.50 Add to Cart
Computer Assisted Problem Solving Environment (PSE)
How correctly a computer program solves the corresponding mathematical model equations.
Full Text Chapter Download: US $37.50 Add to Cart
Rules Verification and Validation
Process formally checking the well-defined properties of a rule-based system against its formal specification,
Full Text Chapter Download: US $37.50 Add to Cart
Trust and Privacy in Grid Resource Auctions
To check that some process has been correctly completed. Verification of an auction involves at the minimum checking that the auction protocol has been correctly executed, and that all bids have been counted.
Full Text Chapter Download: US $37.50 Add to Cart
Knowledge Transfer Between Senior and Novice Software Testers: A Qualitative Analysis in Sri Lankan Software Companies
Verification is the process of evaluating a development stage of products to determine whether they comply with the requirements specified. Verification helps to ensure that the product being developed is in compliance with the standards and specifications of the model. Verification includes “reviews, meetings, and inspections.”
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
An Algebraic Approach for the Specification and the Verification of Aspect-Oriented Systems
Software verification is a broader and more complex discipline of software engineering the goal of which is to assure that software fully satisfies all the expected requirements.
Full Text Chapter Download: US $37.50 Add to Cart
Unified Approach to Integrated Food Quality and Safety Management
Confirmation, through the provision of objective evidence, that specified requirements have been fulfilled.
Full Text Chapter Download: US $37.50 Add to Cart
Human Ear Recognition System
In verification also known as authentication mode, the user claims an identity and the system verifies whether the claim is genuine i.e. the system answer the question “Are you who you say you are?.”In this scenario, the query is compared only to the template corresponding to the claimed identity (a one- to -one matching).
Full Text Chapter Download: US $37.50 Add to Cart
Certifications for Medical Interpreters: A Comparative Analysis
act of examining evidential proof of accuracy or truth
Full Text Chapter Download: US $37.50 Add to Cart
Developing Sustainable Governance Systems at the Regional Level: The Case of Emissions Trading
Full Text Chapter Download: US $37.50 Add to Cart
Towards Quality Web Information Systems Through Precise Model-Driven Development
Verification tries to show that a system is being built correctly. Usually, it involves satisfying specific properties of the diagram metamodels or properties related to the system domain. This verification can be made using formal or informal methods. Checklists and algorithms, which analyze a model looking for errors or abnormal situations, are informal verification techniques. Theorem proving and model checking are formal verification techniques.
Full Text Chapter Download: US $37.50 Add to Cart
A Survey on the Applications of Swarm Intelligence to Software Verification
An activity that the developed software systems or their specifications are confirmed to be correct with respect to the stakeholders’ requirements.
Full Text Chapter Download: US $37.50 Add to Cart
Search Space Reduction in Biometric Databases: A Review
The process of recognizing a user by comparing the captured biometric data with his own biometric sample pre-stored in the system.
Full Text Chapter Download: US $37.50 Add to Cart
Agent-Based Modeling: A Historical Perspective and a Review of Validation and Verification Efforts
The act of reviewing, inspecting, testing, etc. to establish and document that a product, service, or system meets the regulatory, standard, or specification requirements.
Full Text Chapter Download: US $37.50 Add to Cart
Biometric Data in the EU (Reformed) Data Protection Framework and Border Management: A Step Forward or an Unsatisfactory Move?
Verification is the one-to-one process whereby a person claims an identity and the system compares the captured biometric template with the stored template corresponding to the claimed identity.
Full Text Chapter Download: US $37.50 Add to Cart
Newborn Recognition Using Multimodal Biometric
A person’s identity is known and therefore claimed a priority to search against. The pattern that is being verified is compared with the person’s individual template only. Similar to identification, it is checked whether the similarity between pattern and template is sufficient enough to provide access to the secured system or area.
Full Text Chapter Download: US $37.50 Add to Cart
Verification and Validation of Medical Cyber-Physical Systems
Stage of the software design process that aim to checking if the developer is building the product right.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR