Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,377,361 papers from all fields of science
Search
Sign In
Create Free Account
Defensive programming
Known as:
Defensive coding
, Robust programming
, Secure coding practice
Defensive programming is a form of defensive design intended to ensure the continuing function of a piece of software under unforeseen circumstances…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
37 relations
Application programming interface
Buffer overflow
Business process
Code audit
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Researches on the reaction of a pedestrian stepping into the road from the right side from behind and an obstacle realized on the track
T. Stańczyk
,
L. Jurecki
,
M. Jaśkiewicz
,
S. Walczak
,
R. Janczur
2011
Corpus ID: 45338635
The paper presents the results of the behaviour of drivers in emergency/risk situations caused by a pedestrian entering the…
Expand
2009
2009
Approximate robust optimization of time-periodic stationary states with application to biochemical processes
B. Houska
,
F. Logist
,
J. Impe
,
M. Diehl
IEEE Conference on Decision and Control
2009
Corpus ID: 8141915
In this paper we present techniques to optimize periodic stationary states of processes that depend on uncertain parameters. We…
Expand
2008
2008
Progressive Hedging Innovations for a Class of Stochastic Resource Allocation Problems
J. Watson
,
D. L. Woodruff
,
D. Strip
2008
Corpus ID: 17037708
Progressive hedging (PH) is a scenario-based decomposition technique for solving stochastic programs. While PH has been…
Expand
2006
2006
Comparison of approximations in stochastic and robust optimization programs
Michal Houda
2006
Corpus ID: 157060612
The paper deals with two wide areas of optimization theory: stochastic and robust programming. We specialize to different…
Expand
2005
2005
INDUCTION AND REDUCTION OF ANTI‐HERBIVORE DEFENSES IN BROWN AND RED MACROALGAE OFF THE KENYAN COAST 1
Janja Ceh
,
M. Molis
,
T. Dzeha
,
M. Wahl
2005
Corpus ID: 55359907
Herbivory is particularly intense in tropical benthic communities, suggesting preference of constitutive, rather than inducible…
Expand
2002
2002
Defending against an Internet-based attack on the physical world
S. Byers
,
A. Rubin
,
David P. Kormann
TOIT
2002
Corpus ID: 7311580
We discuss the dangers that scalable Internet functionality may present to the real world, focusing upon an attack that is simple…
Expand
2002
2002
Pollen Foraging Response to Brood Pheromone by Africanized and European Honey Bees (Apis mellifera L.)
T. Pankiw
,
W. Rubink
2002
Corpus ID: 23329206
Abstract We examined the pollen foraging responses of Africanized and European honey bee colonies to hexane extractable compounds…
Expand
Highly Cited
2000
Highly Cited
2000
LIFE HISTORY AND MULTIPLE ANTIPREDATOR DEFENSES OF AN INVERTEBRATE PELAGIC PREDATOR, BYTHOTREPHES LONGIMANUS
D. Straile
,
Astrid Hälbich
2000
Corpus ID: 17346504
Multiple antipredator defense strategies and their interactions were examined in a field study of the predatory planktonic…
Expand
1980
1980
Encounters between bombardier beetles and two species of toads (Bufo americanus, B. marinus): Speed of prey-capture does not determine success
J. Dean
Journal of Comparative Physiology
1980
Corpus ID: 36888545
SummaryThe contribution of prey-capture speed to toads' ability to ingest chemically protected prey is evaluated: first, by…
Expand
1968
1968
The New Idealism — Cause and Meaning in the Social Sciences
E. Gellner
1968
Corpus ID: 116985673
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE