Sciweavers

504 search results - page 94 / 101
» Explaining Verification Conditions
Sort
View
SIAMSC
2008
150views more  SIAMSC 2008»
13 years 9 months ago
Asymptotic Stability of a Jump-Diffusion Equation and Its Numerical Approximation
Asymptotic linear stability is studied for stochastic differential equations (SDEs) that incorporate Poisson-driven jumps and their numerical simulation using Eulertype discretisa...
Graeme D. Chalmers, Desmond J. Higham
CORR
2002
Springer
131views Education» more  CORR 2002»
13 years 8 months ago
Ownership Confinement Ensures Representation Independence for Object-Oriented Programs
for data abstraction and justifies reasoning by simulation. Representation independence has been shown for a variety of languages and constructs but not for shared references to mu...
Anindya Banerjee, David A. Naumann
MR
2010
120views Robotics» more  MR 2010»
13 years 7 months ago
Automated inspection and classification of flip-chip-contacts using scanning acoustic microscopy
Industrial applications often require failure analysis methods working non-destructively, enabling either a rapid quality control or fault isolation and defect localization prior ...
S. Brand, P. Czurratis, P. Hoffrogge, M. Petzold
WG
2010
Springer
13 years 7 months ago
max-cut and Containment Relations in Graphs
book Author Title 58 Bijo S Anand Atoms and clique separators in graph products 59 Asir T Domination in total graph of a commutative ring 60 Sharada B On the Neighbourhood Subdivi...
Marcin Kaminski
CORR
2010
Springer
174views Education» more  CORR 2010»
13 years 6 months ago
A Proof Carrying Code Framework for Inlined Reference Monitors in Java Bytecode
We propose a lightweight approach for certification of Java bytecode monitor inlining using proof-carrying code. The main purpose of such a framework is to enable development use ...
Mads Dam, Andreas Lundblad