Sciweavers

504 search results - page 94 / 101
» Explaining Verification Conditions
Sort
View
SIAMSC
2008
150views more  SIAMSC 2008»
14 years 11 months ago
Asymptotic Stability of a Jump-Diffusion Equation and Its Numerical Approximation
Asymptotic linear stability is studied for stochastic differential equations (SDEs) that incorporate Poisson-driven jumps and their numerical simulation using Eulertype discretisa...
Graeme D. Chalmers, Desmond J. Higham
96
Voted
CORR
2002
Springer
131views Education» more  CORR 2002»
14 years 11 months ago
Ownership Confinement Ensures Representation Independence for Object-Oriented Programs
for data abstraction and justifies reasoning by simulation. Representation independence has been shown for a variety of languages and constructs but not for shared references to mu...
Anindya Banerjee, David A. Naumann
MR
2010
120views Robotics» more  MR 2010»
14 years 10 months ago
Automated inspection and classification of flip-chip-contacts using scanning acoustic microscopy
Industrial applications often require failure analysis methods working non-destructively, enabling either a rapid quality control or fault isolation and defect localization prior ...
S. Brand, P. Czurratis, P. Hoffrogge, M. Petzold
WG
2010
Springer
14 years 10 months ago
max-cut and Containment Relations in Graphs
book Author Title 58 Bijo S Anand Atoms and clique separators in graph products 59 Asir T Domination in total graph of a commutative ring 60 Sharada B On the Neighbourhood Subdivi...
Marcin Kaminski
CORR
2010
Springer
174views Education» more  CORR 2010»
14 years 9 months ago
A Proof Carrying Code Framework for Inlined Reference Monitors in Java Bytecode
We propose a lightweight approach for certification of Java bytecode monitor inlining using proof-carrying code. The main purpose of such a framework is to enable development use ...
Mads Dam, Andreas Lundblad