Academic literature on the topic 'Veriflex'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Veriflex.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Veriflex"
Yaşa, Dilek, and Alper Ağca. "Verisyse versus Veriflex Phakic Intraocular Lenses: Refractive Outcomes and Endothelial Cell Density 5 Years after Surgery." Journal of Ophthalmology 2018 (September 30, 2018): 1–8. http://dx.doi.org/10.1155/2018/4210460.
Full textMcClung, Amber J. W., Gyaneshwar P. Tandon, and Jeffery W. Baur. "Deformation rate-, hold time-, and cycle-dependent shape-memory performance of Veriflex-E resin." Mechanics of Time-Dependent Materials 17, no. 1 (November 19, 2011): 39–52. http://dx.doi.org/10.1007/s11043-011-9157-6.
Full textPjano, Melisa, Alma Biscevic, Senad Grisevic, Ajla Pidro, Mirko Ratkovic, Maja Bohac, Amila Husovic, and Refet Gojak. "One Year Follow-Up After Veriflex Phakic Intraocular Lenses Implantation for Correction of Myopia." Acta Informatica Medica 24, no. 3 (2016): 178. http://dx.doi.org/10.5455/aim.2016.24.178-181.
Full textAwadein, Ahmed, and Ahmed E. Habib. "ICL Versus Veriflex Phakic IOL for Treatment of Moderately High Myopia: Randomized Paired-Eye Comparison." Journal of Refractive Surgery 29, no. 7 (July 1, 2013): 445–52. http://dx.doi.org/10.3928/1081597x-20130617-02.
Full textButaud, P., V. Placet, J. Klesa, M. Ouisse, E. Foltête, and X. Gabrion. "Investigations on the frequency and temperature effects on mechanical properties of a shape memory polymer (Veriflex)." Mechanics of Materials 87 (August 2015): 50–60. http://dx.doi.org/10.1016/j.mechmat.2015.04.002.
Full textChowdhury, A. M. Sarwaruddin, Christina Schmidt, Klaus Neuking, and Gunther Eggeler. "Comparative studies on the accumulation of strain and recovery ratio of Veriflex®, a shape-memory polymer." High Performance Polymers 25, no. 8 (May 30, 2013): 886–93. http://dx.doi.org/10.1177/0954008313487929.
Full textMcClung, Amber J. W., Gyaneshwar P. Tandon, and Jeffery W. Baur. "Strain rate- and temperature-dependent tensile properties of an epoxy-based, thermosetting, shape memory polymer (Veriflex-E)." Mechanics of Time-Dependent Materials 16, no. 2 (August 6, 2011): 205–21. http://dx.doi.org/10.1007/s11043-011-9148-7.
Full textBohac, Maja, Marija Anticic, Natasa Draca, Bojan Kozomara, Iva Dekaris, Nikica Gabric, and Sudi Patel. "Comparison of Verisyse and Veriflex Phakic Intraocular Lenses for Treatment of Moderate to High Myopia 36 Months after Surgery." Seminars in Ophthalmology 32, no. 6 (August 3, 2016): 725–33. http://dx.doi.org/10.3109/08820538.2016.1170163.
Full textChowdhury, A. M. Sarwaruddin, Christina Schmidt, Klaus Neuking, and Gunther Eggeler. "Comparative Studies on Thermomechanical Behavior of Veriflex®, a Shape Memory Polymer, for a Low Strain (ϵm= 70%): Laser Experiments." Journal of Macromolecular Science, Part A 48, no. 9 (September 2011): 707–12. http://dx.doi.org/10.1080/10601325.2011.596049.
Full textKondratyev, D. A., and A. V. Promsky. "Towards the ’Verified Verifier’. Theory and Practice." Modeling and Analysis of Information Systems 21, no. 6 (January 1, 2014): 71–82. http://dx.doi.org/10.18255/1818-1015-2014-6-71-82.
Full textDissertations / Theses on the topic "Veriflex"
Wildmoser, Martin. "Verified proof carrying code." [S.l.] : [s.n.], 2006. http://deposit.ddb.de/cgi-bin/dokserv?idn=980401208.
Full textKlein, Gerwin. "Verified Java bytecode verification." [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=967128749.
Full textBujila, Razvan, and Johan Kuru. "OMSI Test Suite verifier development." Thesis, Linköpings universitet, Institutionen för teknik och naturvetenskap, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96266.
Full textSpiwack, Arnaud. "Verified computing in homological algebra." Palaiseau, Ecole polytechnique, 2011. http://pastel.archives-ouvertes.fr/docs/00/60/58/36/PDF/thesis.spiwack.pdf.
Full textThe object of this thesis is the study of the ability of the Coq system to mix proofs and programs in practice. Our approach consists in implementing part of the program Kenzo, a computer algebra tool for homological algebra under some constraint. We want to be able to read the program as a proof with a computational content, these proofs much compute efficiently, and we try to avoid duplication of proofs or part thereof. We show, first, how the requirement of efficiency leads to revise some aspects of traditional mathematics. We propose a suitable categorical abstraction, both for clarity and to avoid duplications. This abstraction, though different from what is customary in mathematics, allow to formulate the constructs of homological algebra in a style much like that of Kenzo. We propose, then, modifications to the Coq programm. A first one to make proofs more convenient, by allowing the use of more fine grain tactics which are often necessary when dependent types are common. The second modification to leverage the arithmetical abilities of the processor to compute more efficiently on integers. Finally, we propose some leads to improve both sharing and clarity of the proofs. Unfortunately, they push the system beyond its limits. Hence, we show that Coq is not always up to its promises and that theoretical works will be necessary to understand how these limits can be relaxed
Boehm, Peter. "Incremental modelling for verified communication architectures." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ec6c9e06-7395-4af4-b961-b2ed837fda89.
Full textKatz, Theodore(Theodore Robert). "Verified compilation of abstract network policies." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/123032.
Full textThesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 67-68).
Configuring large networks can be very complex. A network administrator typically has a set of high-level policies in mind when creating a network configuration, but implementing the configuration onto existing hardware often requires specifying many low-level details. As a result, configuring a network is currently a very error-prone process, and misconfigurations resulting in network outages and security vulnerabilities occur frequently in practice. We present a formally verified compiler from high-level network policies to low-level executable routing rules, to simplify the process of correctly conguring networks and enforcing network policies.
by Theodore Katz.
M. Eng.
M.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Adcock, Bruce M. "Working Towards the Verified Software Process." The Ohio State University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=osu1293463269.
Full textPerna, Juan Ignacio. "A verified compiler for Handel-C." Thesis, University of York, 2010. http://etheses.whiterose.ac.uk/585/.
Full textOwny, Hassan Badry Mohamed el. "Verified solution of parametric interval linear systems." [S.l.] : [s.n.], 2007. http://deposit.ddb.de/cgi-bin/dokserv?idn=985111623.
Full textThaler, Justin R. "Practical Verified Computation with Streaming Interactive Proofs." Thesis, Harvard University, 2013. http://dissertations.umi.com/gsas.harvard:11086.
Full textEngineering and Applied Sciences
Books on the topic "Veriflex"
Hunt, Warren A., ed. FM8501: A Verified Microprocessor. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-57960-5.
Full textMeyer, Bertrand, and Jim Woodcock, eds. Verified Software: Theories, Tools, Experiments. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-69149-5.
Full textShankar, Natarajan, and Jim Woodcock, eds. Verified Software: Theories, Tools, Experiments. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-87873-5.
Full textLeavens, Gary T., Peter O’Hearn, and Sriram K. Rajamani, eds. Verified Software: Theories, Tools, Experiments. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15057-9.
Full textCohen, Ernie, and Andrey Rybalchenko, eds. Verified Software: Theories, Tools, Experiments. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54108-7.
Full textJoshi, Rajeev, Peter Müller, and Andreas Podelski, eds. Verified Software: Theories, Tools, Experiments. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27705-4.
Full textKulisch, Ulrich, Rolf Hammer, Matthias Hocks, and Dietmar Ratz. C++ Toolbox for Verified Computing I. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/978-3-642-79651-7.
Full textGiannakopoulou, Dimitra, and Daniel Kroening, eds. Verified Software: Theories, Tools and Experiments. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12154-3.
Full textBook chapters on the topic "Veriflex"
Lee, Juneyoung, Chung-Kil Hur, and Nuno P. Lopes. "AliveInLean: A Verified LLVM Peephole Optimization Verifier." In Computer Aided Verification, 445–55. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25543-5_25.
Full textWeik, Martin H. "verifier." In Computer Science and Communications Dictionary, 1886. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_20722.
Full textSubedi, D. B. "Verified." In Combatants to Civilians, 129–62. London: Palgrave Macmillan UK, 2018. http://dx.doi.org/10.1057/978-1-137-58672-8_6.
Full textQuiring, Benjamin, and Panagiotis Manolios. "GACAL: Conjecture-Based Verification." In Tools and Algorithms for the Construction and Analysis of Systems, 388–92. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45237-7_26.
Full textJoyce, Jeffrey J. "Totally verified systems: Linking verified software to verified hardware." In Hardware Specification, Verification and Synthesis: Mathematical Aspects, 177–201. New York, NY: Springer New York, 1990. http://dx.doi.org/10.1007/0-387-97226-9_29.
Full textBeyer, Dirk, and Marie-Christine Jakobs. "FRed: Conditional Model Checking via Reducers and Folders." In Software Engineering and Formal Methods, 113–32. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58768-0_7.
Full textPlatzer, André. "Verified Models & Verified Runtime Validation." In Logical Foundations of Cyber-Physical Systems, 557–75. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-63588-0_19.
Full textHavelund, Klaus, and Rahul Kumar. "Verified Change." In Transactions on Foundations for Mastering Change I, 71–89. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46508-1_5.
Full textLeino, K. Rustan M., and Nadia Polikarpova. "Verified Calculations." In Verified Software: Theories, Tools, Experiments, 170–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54108-7_9.
Full textKlein, Gerwin. "From a Verified Kernel towards Verified Systems." In Programming Languages and Systems, 21–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17164-2_3.
Full textConference papers on the topic "Veriflex"
McClung, Amber J. W., Joseph A. Shumaker, and Jeffery W. Baur. "Novel Bismaleimide-Based Shape Memory Polymers: Comparison to Commercial Shape Memory Polymers." In ASME 2011 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. ASMEDC, 2011. http://dx.doi.org/10.1115/smasis2011-5044.
Full textMcClung, A. J. W., G. P. Tandon, and J. W. Baur. "The Strain Rate- and Temperature-Dependent Mechanical Behavior of Veriflex-E in Tension." In ASME 2010 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. ASMEDC, 2010. http://dx.doi.org/10.1115/smasis2010-3674.
Full textKlesa, J., V. Placet, E. Foltête, and M. Collet. "Experimental Evaluation of the Rheological Properties of Veriflex®Shape Memory Polymer." In ESOMAT 2009 - 8th European Symposium on Martensitic Transformations. Les Ulis, France: EDP Sciences, 2009. http://dx.doi.org/10.1051/esomat/200904006.
Full textBeblo, Richard, and Lisa Mauck Weiland. "Polymer Chain Alignment in Shape Memory Polymer." In ASME 2006 International Mechanical Engineering Congress and Exposition. ASMEDC, 2006. http://dx.doi.org/10.1115/imece2006-13703.
Full textGross, Korey, and Lisa Weiland. "Flexural Testing of Shape Memory Polymers for Morphing Aircraft Applications." In ASME 2007 International Mechanical Engineering Congress and Exposition. ASMEDC, 2007. http://dx.doi.org/10.1115/imece2007-43219.
Full textKhurshid, Ahmed, Wenxuan Zhou, Matthew Caesar, and P. Brighten Godfrey. "VeriFlow." In the first workshop. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2342441.2342452.
Full textLööw, Andreas, Ramana Kumar, Yong Kiam Tan, Magnus O. Myreen, Michael Norrish, Oskar Abrahamsson, and Anthony Fox. "Verified compilation on a verified processor." In PLDI '19: 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3314221.3314622.
Full textXie, Fei, and James C. Browne. "Verified systems by composition from verified components." In the 9th European software engineering conference held jointly with 10th ACM SIGSOFT international symposium. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/940071.940109.
Full textKiniry, Joseph R., and Daniel M. Zimmerman. "Verified gaming." In Proceeding of the 1st international workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1984674.1984681.
Full textLeroy, Xavier. "Verified squared." In the 38th annual ACM SIGPLAN-SIGACT symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1926385.1926387.
Full textReports on the topic "Veriflex"
Manna, Zohar, and Amir Pnueli. Tools and Rules for the Practicing Verifier. Fort Belvoir, VA: Defense Technical Information Center, July 1990. http://dx.doi.org/10.21236/ada227320.
Full textCheung, Alvin. Using Verified Lifting to Optimize Legacy Stencil Codes. Office of Scientific and Technical Information (OSTI), February 2021. http://dx.doi.org/10.2172/1765083.
Full textRushby, John. Formally Verified Hardware Encapsulation Mechanism for Security, Integrity, and Safety. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada403303.
Full textUhrich, Richard, and James Walton. Supervisory Control of Untethered Undersea Systems: A New Paradigm Verified. Fort Belvoir, VA: Defense Technical Information Center, September 1995. http://dx.doi.org/10.21236/ada422529.
Full textMoreno, Silvana, Alvaro Tasistro, Diego Vallespir, and William Nichols. PSPVDC: An Adaptation of the PSP that Incorporates Verified Design by Contract. Fort Belvoir, VA: Defense Technical Information Center, May 2013. http://dx.doi.org/10.21236/ada610477.
Full textXiang, Guang, Bryan A. Pendleton, and Jason Hong. Modeling Content from Human-Verified Blacklists for Accurate Zero-Hour Phish Detection. Fort Belvoir, VA: Defense Technical Information Center, January 2009. http://dx.doi.org/10.21236/ada530899.
Full textRamsey, Norman. Penelope: An Ada Verification Environment, Developing Formally Verified Ada Programs. Volume 1. Fort Belvoir, VA: Defense Technical Information Center, November 1991. http://dx.doi.org/10.21236/ada249417.
Full textEldred, Michael Scott, Samuel Ramirez Subia, David Neckels, Matthew Morgan Hopkins, Patrick K. Notz, Brian M. Adams, Brian Carnes, Jonathan W. Wittwer, Barron J. Bichon, and Kevin D. Copps. Solution-verified reliability analysis and design of bistable MEMS using error estimation and adaptivity. Office of Scientific and Technical Information (OSTI), October 2006. http://dx.doi.org/10.2172/896282.
Full textChevassut, Olivier, Joseph Milner, and David Pointcheval. Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman. Office of Scientific and Technical Information (OSTI), April 2008. http://dx.doi.org/10.2172/948495.
Full textSrinivasan, Grama R., and David P. Gluch. A Study of Practice Issues in Model-Based Verification Using the Symbolic Model Verifier (SMV). Fort Belvoir, VA: Defense Technical Information Center, November 1998. http://dx.doi.org/10.21236/ada358751.
Full text