نتایج جستجو برای: ansi

تعداد نتایج: 3751  

Journal: :Computer Standards & Interfaces 2010
Wesam Darwish Konstantin Beznosov

In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier's archiving and manuscript policies are encouraged to visit: a b s t r a c t a r t i c l e i n f o We analyze access control mechanisms of the COM+ architecture and define a configurati...

1991
Kenneth A. Barclay

Object-oriented programming with ANSI-C requires a fair amount ... concentrate on the creative aspects of problem solving with better techniques. ooc.

Journal: :International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems 2020

2003
Edmund Clarke Daniel Kroening

We describe a tool that formally verifies ANSI-C programs. The tool implements a technique called Bounded Model Checking (BMC). In BMC, the transition relation for a complex state machine and its specification are jointly unwound to obtain a Boolean formula, which is then checked for satisfiability by using a SAT procedure. The tool supports all ANSI-C integer operators and all pointer construc...

Journal: :The Journal of the Acoustical Society of America 1989

Journal: :Journal of Applied Geophysics 2021

Despite the unrivalled spatial resolution and depth penetration of active-source seismic methods used for mineral exploration in hardrock environment, economic environmental restrictions (e.g., source permitting) may preclude its full-scale application. In such a case, 2D passive reflection seismics can be considered cost-effective way to perform reconnaissance-type survey provide body-wave str...

1998
Laurie Law Alfred Menezes Minghua Qu Jerry Solinas

This paper proposes a new and e cient two-pass protocol for authenticated key agreement in the asymmetric (public-key) setting. The protocol is based on Di e-Hellman key agreement and can be modi ed to work in an arbitrary nite group and, in particular, elliptic curve groups. Two modi cations of this protocol are also presented: a one-pass authenticated key agreement protocol suitable for envir...

2000
Atul Adya Barbara Liskov Patrick E. O'Neil

Commercial databases support different isolation levels to allow programmers to trade off consistency for a potential gain in performance. The isolation levels are defined in the current ANSI standard, but the definitions are ambiguous and revised definitions proposed to correct the problem are too constrained since they allow only pessimistic (locking) implementations. This paper presents new ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید