Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Exception chaining
Known as:
Chaining (disambiguation)
, Exception wrapping
Exception chaining, or exception wrapping, is an object-oriented programming technique of handling exceptions by re-throwing a caught exception after…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Comparison of C Sharp and Java
Error hiding
Exception handling
Java
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
A Chaining Authentication Scheme Using S / Key OTP Based on a Fast and Secure Hash Algorithm in Wireless Sensor Networks
Dong-Hoon Kim
,
Youn-Sik Hong
,
Ki-Young Lee
2013
Corpus ID: 15652980
Security is another important aspect and its development has enhanced widespread adoption of WSNs. In a typical situation, user…
Expand
2010
2010
Static and Dynamic Quality Assurance by Aspect Oriented Techniques
Christoph Knabe
arXiv.org
2010
Corpus ID: 9990728
The overall goal of the described research project was to create applicable quality assurance patterns for Java software systems…
Expand
2008
2008
P-chaining: a practical VoD service scheme autonomically handling interactive operations
Hyunjoo Kim
,
H. Yeom
Multimedia tools and applications
2008
Corpus ID: 8155533
Providing scalable VoD streaming services has recently become a hot issue, and many approaches have been proposed. Because video…
Expand
2005
2005
The pursuit of buffer tolerance
B. Roscoe
2005
Corpus ID: 10776529
A system is buffer tolerant when buffers (namely, queues that may be of arbitrary or varying length) may be introduced onto some…
Expand
2005
2005
An Authentication Protocol For Mobile Agents Using Bilinear Pairings
A. Saxena
,
B. Soh
2005
Corpus ID: 13182520
A mobile agent is a mobile program capable of maintaining its execution states as it migrates between different execution…
Expand
2001
2001
Hogup Chaining and Greenstrips
B. Tipps
,
R. Birnie
2001
Corpus ID: 127808718
1996
1996
Draft requirements to fell junipers.
H. T. Wiedemann
,
B. T. Cross
1996
Corpus ID: 55095914
An inexpensive method of tree felling is needed to precondition dense stands of mature junipers (Juniperus spp.) for the…
Expand
1992
1992
Controlling inference in plan recognition
J. Mayfield
User modeling and user-adapted interaction
1992
Corpus ID: 305928
An algorithm based on an assessment of the completeness of an explanation can be used to control inference in a plan recognition…
Expand
1991
1991
The reliability of reasoning with unreliable arguments
J. Kohlas
Annals of Operations Research
1991
Corpus ID: 8878623
Shafer's theory of evidence has found much interest as a means to represent and manage uncertainty in reasoning. It is shown that…
Expand
1987
1987
Juniper Chaining: A Vegetative and Soil Erosion Assessment of a Method of Rangeland Improvement on Fort Hood, Texas.
V. Diersing
,
B. Jones
,
S. Warren
,
Dennis M. Herbert
,
E. Novak
1987
Corpus ID: 129599801
Abstract : This report presents the results of an investigation conducted on Fort Hood, TX, during 1984-1985 to determine (1) the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE