Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,240,615 papers from all fields of science
Search
Sign In
Create Free Account
Bounds checking
Known as:
Bounds check
, Index checking
, Range check
In computer programming, bounds checking is any method of detecting whether a variable is within some bounds before it is used. It is usually used to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
42 relations
ACM Turing Award
ALGOL 60
Ada
Array data structure
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Polynomial time estimates for #SAT
Bernd R. Schuh
arXiv.org
2017
Corpus ID: 12168317
Limits on the number of satisfying assignments for CNS instances with n variables and m clauses are derived from various…
Expand
2013
2013
LLBMC: Improved Bounded Model Checking of C Programs Using LLVM - (Competition Contribution)
Stephan Falke
,
Florian Merz
,
C. Sinz
International Conference on Tools and Algorithms…
2013
Corpus ID: 5552873
LLBMC is a tool for detecting bugs and runtime errors in C and C++ programs. It is based on bounded model checking using an SMT…
Expand
2011
2011
Suboptimality Bounds for Stochastic Shortest Path Problems
E. Hansen
Conference on Uncertainty in Artificial…
2011
Corpus ID: 8284117
We consider how to use the Bellman residual of the dynamic programming operator to compute suboptimality bounds for solutions to…
Expand
2011
2011
Equivalence Checking of Array-Intensive Programs
C. Karfa
,
K. Banerjee
,
D. Sarkar
,
C. Mandal
IEEE Computer Society Annual Symposium on VLSI
2011
Corpus ID: 12795526
An equivalence checking method for ensuring correctness of loop and arithmetic transformations in array intensive programs is…
Expand
2007
2007
Characterization of probability distributions by variance bounds and its applications
S. Kattumannil
2007
Corpus ID: 122728772
2005
2005
Inapproximability Bounds for Shortest-Path Network Interdiction Problems
E. Boros
,
Konrad Borys
,
Khaled M. Elbassioni
,
V. Gurvich
,
Gábor Rudolf
2005
Corpus ID: 6915554
We consider two network interdiction problems: one where a network user tries to traverse a network from a starting vertex s to a…
Expand
1998
1998
Methodologies Choice and Adoption : Using Diffusion of Innovations as the Theoretical Framework
J. Wynekoop
,
Nancy L. Russo
,
G. Huber
1998
Corpus ID: 15131561
This goal of this paper is to represent the method choice and adoption factors in two organizations over the 43 years period…
Expand
1997
1997
Robot localization - theory and practice
O. Karch
,
H. Noltemeier
Proceedings of the IEEE/RSJ International…
1997
Corpus ID: 17555033
We consider the first stage of the robot localization problem described as follows: a robot is at an unknown position in an…
Expand
1975
1975
Time Bounds on the Parallel Evaluation of Arithmetic Expressions
D. Kuck
,
K. Maruyama
SIAM journal on computing (Print)
1975
Corpus ID: 29432697
This paper presents a number of bounds on the parallel processor evaluation of arithmetic expressions. Several previous papers…
Expand
1975
1975
A unification of Cramér-Rao type bounds (Corresp.)
D. Rife
,
M. Goldstein
,
R. Boorstyn
IEEE Transactions on Information Theory
1975
Corpus ID: 38244798
This correspondence examines multiparameter generalizations of the Cramer-Rao (C-R) bound and related bounds from a new viewpoint…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE