Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,241,416 papers from all fields of science
Search
Sign In
Create Free Account
Bounds checking
Known as:
Bounds check
, Index checking
, Range check
In computer programming, bounds checking is any method of detecting whether a variable is within some bounds before it is used. It is usually used to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
42 relations
ACM Turing Award
ALGOL 60
Ada
Array data structure
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
LLBMC: Improved Bounded Model Checking of C Programs Using LLVM - (Competition Contribution)
Stephan Falke
,
Florian Merz
,
C. Sinz
International Conference on Tools and Algorithms…
2013
Corpus ID: 5552873
LLBMC is a tool for detecting bugs and runtime errors in C and C++ programs. It is based on bounded model checking using an SMT…
Expand
2013
2013
On Model-Based RIP-1 Matrices
P. Indyk
,
Ilya P. Razenshteyn
International Colloquium on Automata, Languages…
2013
Corpus ID: 14456757
The Restricted Isometry Property (RIP) is a fundamental property of a matrix enabling sparse recovery [5]. Informally, an m ×n…
Expand
2011
2011
Adaptive Path Planning for Randomly Deployed Wireless Sensor Networks
Kyunghwi Kim
,
Byunghyuk Jung
,
Wonjun Lee
,
D. Du
Journal of information science and engineering
2011
Corpus ID: 17593865
In this paper, we propose an adaptive path planning scheme considering the length of movement path and number of beacon messages…
Expand
2010
2010
A Unified View of Regularized Dual Averaging and Mirror Descent with Implicit Updates
H. B. McMahan
2010
Corpus ID: 16588435
We study three families of online convex optimization algorithms: follow-the-proximally-regularized-leader (FTRL-Proximal…
Expand
Review
2008
Review
2008
Human risk factors in avalanche incidents
A. Solé
,
C. Emery
2008
Corpus ID: 15109942
An average of 12 people die in avalanches each year in Western Canada. The risk factors for the avalanche phenomenon have been…
Expand
2007
2007
Characterization of probability distributions by variance bounds and its applications
S. Kattumannil
2007
Corpus ID: 122728772
2005
2005
A greedy strategy for detecting negative cost cycles in networks
K. Subramani
,
L. Kovalchick
Future generations computer systems
2005
Corpus ID: 13085492
2004
2004
Unified approach to Cramer-Rao bounds in direction estimation with known signal structures
Yang-Ho Choi
Signal Processing
2004
Corpus ID: 28525536
1985
1985
Coding for the binary symmetric broadcast channel with two receivers
T. Kasami
,
Shu Lin
,
V. Wei
,
Saburo Yamamura
IEEE Transactions on Information Theory
1985
Corpus ID: 35727317
Block coding for the binary symmetric broadcast channel with two receivers is investigated. A graph-theoretic approach to the…
Expand
1975
1975
Time Bounds on the Parallel Evaluation of Arithmetic Expressions
D. Kuck
,
K. Maruyama
SIAM journal on computing (Print)
1975
Corpus ID: 29432697
This paper presents a number of bounds on the parallel processor evaluation of arithmetic expressions. Several previous papers…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE