نتایج جستجو برای: safe theorem
تعداد نتایج: 268895 فیلتر نتایج به سال:
Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not following this recommendation as high. The solution currently used to enforce object initialization is to implement a coding pattern proposed by Sun, which is not formally checked. We propose a modular type system to formally...
Bipolar synchronization systems (BP-systems) constitute a class of coloured Petri nets, well suited for modelling the control flow of discrete dynamical systems. Every BP-system has an underlying ordinary Petri net, a T-system. It further has a second ordinary net attached, a free-choice system. We prove that a BP-system is safe and live if the T-system and the free-choice system are safe and l...
although homotopy-based methods, namely homotopy analysis method andhomotopy perturbation method, have largely been used to solve functionalequations, there are still serious questions on the convergence issue of thesemethods. some authors have tried to prove convergence of these methods, butthe researchers in this article indicate that some of those discussions are faulty.here, after criticizi...
Introduction: Tonsillectomy is one of the most common procedures performed by Ear, Nose, and Throat surgeon. Usually, the procedure is carried out as an inpatient surgery. With the increasing need to reduce healthcare costs, spare precious hospital beds, and shorten elective surgery lists, there is currently a trend towards performing tonsillectomy on a daycare basis. Materials and Methods: A...
In the US, community technology centers (CTC) are a policy response to facilitate the diffusion of information and communication technologies (ICT) to citizens who might otherwise lack access to these resources. The implicit assumption guiding CTC initiatives is that access to ICT will improve the life chances of the individuals who become involved in these centers. It is, however, prudent to e...
INTRODUCTION ................................................................................... 523 I. BACKGROUND ........................................................................... 525 A. Common Law Research Exception ......................................... 525 B. The Statutory Safe Harbor Provision: 271(e)(1) .................... 528 II. CASE LAW: THE SAFE HARBOR STATUE PROTECTION ...
Wireless medical body sensor networks enable a new way of continuous patient monitoring, extending the reach of current healthcare solutions. They improve care giving by a flexible acquisition of relevant vital sign data, and by providing more convenience for patients. Applying the general concept of sensor networks to the medical domains requires development of reliable, distributed microsyste...
The development and management of alliances is a critical strategic skill in hospitality and tourism. Very little can happen in these sectors without multiple firms working collaboratively with one another to serve the consumer. All over the world companies are entering into alliances (see Table 1). However, research in this and other sectors suggest that most will fail leaving both partners sa...
in this paper, we prove a common fixed point theorem for six mappings (two set valued and four single valued mappings) without assuming compatibility and continuity of any mapping on non complete metric spaces. to prove the theorem, we use a non compatible condition, that is, weak commutativity of type (kb). we show that completeness of the whole space is not necessary for the existence and uni...
Abstract. In this paper we present an approach towards safe software composition based on aspect-orientation. Aspects enable the systematic addition of code into existing programs but often they also introduce errors. In order to provide safe aspects for software composition we address the verification of the aspect-oriented language paradigm. We construct a basic calculus for aspects with type...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید