01273nam 2200361Ia 450 991070078470332120110707120731.0(CKB)5470000002411157(OCoLC)739690581(EXLCZ)99547000000241115720110707d1994 ua 0engurbn|||||||||txtrdacontentcrdamediacrrdacarrierSnubber lubricant degradation in high-temperature environments[electronic resource]Washington, D.C. :U.S. Nuclear Regulatory Commission, Office of Nuclear Reactor Regulation,[1994]1 online resourceNRC information notice ;94-48Title from HTML title screen (viewed on July 7, 2011)."June 30, 1994."Lubrication and lubricantsDeteriorationShock absorbersLubrication and lubricantsDeterioration.Shock absorbers.U.S. Nuclear Regulatory Commission.Office of Nuclear Reactor Regulation.GPOGPOBOOK9910700784703321Snubber lubricant degradation in high-temperature environments3102106UNINA06178nam 22007215 450 991076819240332120250724054726.03-540-47813-210.1007/3-540-47813-2(CKB)1000000000211274(SSID)ssj0000320626(PQKBManifestationID)11254863(PQKBTitleCode)TC0000320626(PQKBWorkID)10249642(PQKB)10995631(DE-He213)978-3-540-47813-3(MiAaPQ)EBC3062468(MiAaPQ)EBC6408079(PPN)15518380X(BIP)7609412(EXLCZ)99100000000021127420121227d2002 u| 0engurnn#008mamaatxtccrVerification, Model Checking, and Abstract Interpretation Third International Workshop, VMCAI 2002, Venice, Italy, January 21-22, 2002, Revised Papers /edited by Agostino Cortesi1st ed. 2002.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2002.1 online resource (VIII, 331 p.)Lecture Notes in Computer Science,1611-3349 ;2294Bibliographic Level Mode of Issuance: Monograph3-540-43631-6 Includes bibliographical references and index.Security and Protocols -- Combining Abstract Interpretation and Model Checking for Analysing Security Properties of Java Bytecode -- Proofs Methods for Bisimulation Based Information Flow Security -- A Formal Correspondence between Offensive and Defensive JavaCard Virtual Machines -- Analyzing Cryptographic Protocols in a Reactive Framework -- Timed Systems and Games -- An Abstract Schema for Equivalence-Checking Games -- Synchronous Closing of Timed SDL Systems for Model Checking -- Automata-Theoretic Decision of Timed Games -- Static Analysis -- Compositional Termination Analysis of Symbolic Forward Analysis -- Combining Norms to Prove Termination -- Static Monotonicity Analysis for ?-definable Functions over Lattices -- A Refinement of the Escape Property -- Optimizations -- Storage Size Reduction by In-place Mapping of Arrays -- Verifying BDD Algorithms through Monadic Interpretation -- Improving the Encoding of LTL Model Checking into SAT -- Types and Verification -- Automatic Verification of Probabilistic Free Choice -- An Experiment in Type Inference and Verification by Abstract Interpretation -- Weak Muller Acceptance Conditions for Tree Automata -- A Fully Abstract Model for Higher-Order Mobile Ambients -- Temporal Logics and Systems -- A Simulation Preorder for Abstraction of Reactive Systems -- Approximating ATL* in ATL -- Model Checking Modal Transition Systems Using Kripke Structures -- Parameterized Verification of a Cache Coherence Protocol: Safety and Liveness.This volume contains the revised version of papers presented at VMCAI 2002, theThirdInternationalWorkshoponVeri'cation,ModelChecking,andAbstract Interpretation, Venice (Italy), January 21-22, 2002. Themaingoaloftheworkshopwastogiveanoverviewofthemaindirections decisive for the growth and cross-fertilization of major research activities in programanalysis and veri'cation. TheVMCAIserieswasstartedin1997withtheaimofgatheringresearchers interestedininvestigatingsimilaritiesanddi'erencesamongthesethreeresearch methodologies, that may be summarized as follows: - programveri'cationaimsatprovingthatprogramsmeettheirspeci'cations, i.e., that the actual programbehavior correspondsto the desired one. - model checking is a speci'c approach to the veri'cation of temporal pr- erties of reactive and concurrentsystems, which has been very successful in the area of ?nite-state programs. - abstract interpretation is a method for designing and comparing semantics ofprogram,expressingvarioustypes ofprogramproperties;in particular,it has been successfully usedto infer run-time programproperties that canbe valuable in optimizing programs. Theprogramcommitteeselected22papersoutof41submissionsonthebasis of at least 3 reviews. The principal selection criteria were relevance, quality, and clarity. The resulting volume o'ers the reader an interesting perspective of the current research trends in the area. In particular, the papers contribute to the following topics: Security and Protocols, Timed Systems and Games, Static Analysis, Optimizations, Types and Veri'cation, and Temporal Logics and Systems. The quality of the papers, the interesting discussions at the workshop, and the friendly atmosphere enjoyed by all participants in Venice, encouraged us in the projectofmakingVMCAI anannualprivilegedforumfor researchersin the area. Specialthanksareduetotheinstitutionsthatsponsoredtheevent:theC- puter Science Department of the University Ca' Foscari, the European Asso- ation for Programming Languages and Systems (EAPLS), the MIUR Project "InterpretazioneAstratta,TypeSystemseAnalisiControl-Flow"andtheMIUR Project"MetodiFormaliperlaSicurezza-MEFISTO".Weareespeciallygra- ful to C. Braghin for her helpful support in organizingthe workshop.Lecture Notes in Computer Science,1611-3349 ;2294Computer scienceSoftware engineeringCompilers (Computer programs)Theory of ComputationSoftware EngineeringComputer ScienceComputer Science Logic and Foundations of ProgrammingCompilers and InterpretersComputer science.Software engineering.Compilers (Computer programs)Theory of Computation.Software Engineering.Computer Science.Computer Science Logic and Foundations of Programming.Compilers and Interpreters.005.1/4Cortesi Agostino1963-MiAaPQMiAaPQMiAaPQBOOK9910768192403321Verification, Model Checking, and Abstract Interpretation2593983UNINA