نتایج جستجو برای: safe theorem

تعداد نتایج: 268895  

2010
Laurent Hubert Thomas P. Jensen Vincent Monfort David Pichardie

Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not following this recommendation as high. The solution currently used to enforce object initialization is to implement a coding pattern proposed by Sun, which is not formally checked. We propose a modular type system to formally...

Journal: :Fundam. Inform. 2010
Joachim Wehler

Bipolar synchronization systems (BP-systems) constitute a class of coloured Petri nets, well suited for modelling the control flow of discrete dynamical systems. Every BP-system has an underlying ordinary Petri net, a T-system. It further has a second ordinary net attached, a free-choice system. We prove that a BP-system is safe and live if the T-system and the free-choice system are safe and l...

Journal: :نظریه تقریب و کاربرد های آن 0
آ عزیزی دانشگاه پیام نور تهران ج سعیدیان دانشگاه خوارزمی تهران ا بابلیان دانشگاه خوارزمی تهران

although homotopy-based methods, namely homotopy analysis method andhomotopy perturbation method, have largely been used to solve functionalequations, there are still serious questions on the convergence issue of thesemethods. some authors have tried to prove convergence of these methods, butthe researchers in this article indicate that some of those discussions are faulty.here, after criticizi...

Introduction: Tonsillectomy is one of the most common procedures performed by Ear, Nose, and Throat surgeon.  Usually, the procedure is carried out as an inpatient surgery. With the increasing need to reduce healthcare costs, spare precious hospital beds, and shorten elective surgery lists, there is currently a trend towards performing tonsillectomy on a daycare basis.  Materials and Methods: A...

2006
Lynette Kvasny

In the US, community technology centers (CTC) are a policy response to facilitate the diffusion of information and communication technologies (ICT) to citizens who might otherwise lack access to these resources. The implicit assumption guiding CTC initiatives is that access to ICT will improve the life chances of the individuals who become involved in these centers. It is, however, prudent to e...

Journal: :JTHTL 2010
Kelli Brensdal

INTRODUCTION ................................................................................... 523 I. BACKGROUND ........................................................................... 525 A. Common Law Research Exception ......................................... 525 B. The Statutory Safe Harbor Provision: 271(e)(1) .................... 528 II. CASE LAW: THE SAFE HARBOR STATUE PROTECTION ...

2004
Heribert Baldus Karin Klabunde G. Müsch

Wireless medical body sensor networks enable a new way of continuous patient monitoring, extending the reach of current healthcare solutions. They improve care giving by a flexible acquisition of relevant vital sign data, and by providing more convenience for patients. Applying the general concept of sensor networks to the medical domains requires development of reliable, distributed microsyste...

2000
John C. Crotts Dimitrios Buhalis Roger March

The development and management of alliances is a critical strategic skill in hospitality and tourism. Very little can happen in these sectors without multiple firms working collaboratively with one another to serve the consumer. All over the world companies are entering into alliances (see Table 1). However, research in this and other sectors suggest that most will fail leaving both partners sa...

Journal: :iranian journal of science and technology (sciences) 2012
kh. abd-rabou

in this paper, we prove a common fixed point theorem for six mappings (two set valued and four single valued mappings) without assuming compatibility and continuity of any mapping on non complete metric spaces. to prove the theorem, we use a non compatible condition, that is, weak commutativity of type (kb). we show that completeness of the whole space is not necessary for the existence and uni...

2007
Florian Kammüller Henry Sudhof

Abstract. In this paper we present an approach towards safe software composition based on aspect-orientation. Aspects enable the systematic addition of code into existing programs but often they also introduce errors. In order to provide safe aspects for software composition we address the verification of the aspect-oriented language paradigm. We construct a basic calculus for aspects with type...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید