共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
Walter Kr?mer 《Computing》2012,94(2-4):229-241
As a new feature, C-XSC provides so-called wrapper classes to some external arbitrary precision real and interval packages. Operator and function name overloading is used to give the user easy access to the arithmetic operations and mathematical functions provided by the underlying Ansi C packages. We will discuss briefly so-called staggered precision arithmetics based on exact scalar products. Such an arithmetic is available in C-XSC e.g. for multiple precision complex intervals. We also discuss the usage of the arbitrary precision arithmetic packages MPFR and MPFI, which are now accessible conveniently from within C-XSC via class interfaces. As a typical application, we will present an arbitrary precision interval Newton method to find the root(s) of a continuously differentiable function in a prescribed domain. The user only has to supply the expression for the function in the usual mathematical notation. The derivative needed in the interval Newton operator is computed using automatic differentiation based on the arbitrary precision interval operations. To demonstrate the power of the package we compute an enclosure of the zero of a model problem with guaranteed accuracy of more than 10 million decimal digits. 相似文献
4.
5.
It is known that interval computations are NP-hard. In other words, the solution of many important problems can be reduced to interval computations. The immediate conclusion is negative: in the general case, one cannot expect an algorithm to do all the interval computations in less than exponential running time. We show that this result also has a bright side: since there are many heuristics, for interval computations, we can solve other problems by reducing them to interval computations and applying these heuristics. 相似文献
6.
One of the main sources of destruction during earthquake is resonance. Therefore, the following idea has been proposed. We design special control linkages between floors that are normally unattached to the building but can be attached if necessary. They are so designed that adding them changes the building's characteristic frequency. We continuously monitor displacements within the structure, and when they exceed specified limits, the linkages are engaged in a way to control structural motion. This idea can also be applied to avoid vibrational destruction of large aerospace structures. 相似文献
7.
Nguyen H.T. Kreinovich V. Nesterov V. Nakamura M. 《Fuzzy Systems, IEEE Transactions on》1997,5(1):108-127
This paper presents a rationale for providing hardware supported functions of more than two variables for processing incomplete knowledge and fuzzy knowledge. The result is in contrast to Kolmogorov's (1957) theorem in the numerical (nonfuzzy) case 相似文献
8.
Nicoletta De Francesco Giuseppe Lettieri 《Software Testing, Verification and Reliability》2003,13(3):181-196
A method is proposed for checking security properties in programs written in high‐level languages. The method is based on the model checking technique. The SMV tool is used. The representation of the program is a Kripke structure modelling the control flow graph enriched with security information. The properties considered are secure information flow and the absence of covert channels caused by program termination. The formulae expressing these security properties are given using the logic CTL. Copyright © 2003 John Wiley & Sons, Ltd. 相似文献
9.
赵建华 《计算机科学技术学报》2000,15(5):0-0
It is proved in this paper that checking a timed automaton M with respect to a linear duration property D can be done by investigating only the integral timed states of M,An equivalence relation is introduced in this paper to divide the infinite number of integral timed states into finite number of equivalence classes.Based on this,a method is proposed for checking whether M satisfies D.In some cases,the number of equivalence classes is too large for a computer to mainpulate,A technique for reducing the search-space for checking linear duration propoerty is also described.This technique is more suitable for the case in this paper than those in the literature because most of those techniques are designed for reachablility analysis. 相似文献
10.
11.
Guy Edward Gallasch Jonathan Billington Somsak Vanit-Anunchai Lars Michael Kristensen 《International Journal on Software Tools for Technology Transfer (STTT)》2007,9(3-4):371-391
The sweep-line state space method allows states to be deleted from memory during state exploration, thus alleviating the state
explosion problem. Properties of the system (such as the absence of deadlocks) can then be verified on-the-fly. This paper
presents an extension to the sweep-line method that allows on-the-fly checking of safety properties expressed as sequences
of actions of the modelled system. This has been implemented in a prototype sweep-line library for Coloured Petri nets. We
evaluate the prototype by applying it to the connection management procedures of the Datagram Congestion Control Protocol,
a new Internet transport protocol.
This paper was supported by Australian Research Council Discovery Grants DP0210524 and DP0559927.
L. M. Kristensen was supported by the Carlsberg Foundation and the Danish Research Council for Technology and Production. 相似文献
12.
13.
利用经典图和模糊图定义和性质,给出了区间值模糊关系、模糊变换以及区间值强模糊图的定义,相应地定义了区间值强模糊图弱直积、半直积运算,并且证明了其弱直积、半直积运算封闭的性质。 相似文献
14.
V. S. Mikhalevich I. V. Sergienko V. K. Zadiraka M. D. Babich 《Cybernetics and Systems Analysis》1994,30(2):213-235
Translated from Kibernetika i Sistemnyi Analiz, No. 2, pp. 65–94, March–April, 1994. 相似文献
15.
Zhao Chen 《The Journal of supercomputing》2009,48(2):152-162
Let Z be a set of integers and Z
n×n
be a ring for any integer n. We define
as a latter point. Hom(Z
n
,Z
m
) denotes as a homomorphism of Z
n
into Z
m
. For any element
in Z
n
, we define S+T:Z
n
→Z
m
as
. As a result, S+T become a homomorphism of Z
n
into Z
m
. We also define kU:Z
n
→Z
m
as
. Consequently, kU become a homomorphism of Z
n
into Z
m
. Moreover, Hom (Z
n
,Z
m
) is isomorphic to Z
n×m
. A novel class of the structured matrices which is a set of elements of Hom (Z
n
,Z
n
) over a ring of integers with a displacement structure, referred to as a C-Cauchy-like matrix, will be formulated and presented.
Using the displacement approach, which was originally discovered by Kailath, Kung, and Morf (J. Math. Anal. Appl. 68:395–407,
1979), a new superfast algorithm for the multiplication of a C-Cauchy-like matrix of the size n×n over a field with a vector will be designed. The memory space for storing a C-Cauchy-like matrix of the size n×n over a field is O(n) versus O(n
2) for a general matrix of the size n×n over a field. The arithmetic operations of a product of a C-Cauchy-like matrix and a vector is reduced dramatically to O(n) from O(n
2), which can be used to transform a latter point
to another latter point
such that
.
Moreover, the displacement structure can also be extended to a Kronecker matrix W
⊗
Z. A new class of the Kronecker-like matrices with the displacement rank r, r<n will be also discovered. The memory space for storing a Kronecker-like matrix of the size (n×1)⊗(1×n) over a field is decreased to O(rn). The arithmetic operations for a product of a Kronecker-like matrix with the displacement rank r and a vector is also accelerated to O(rn). 相似文献
16.
17.
We exhibit fast computational methods for the evaluation of the determinant and the characteristic polynomial of a (2k+1)-diagonal Toeplitz matrix with elements in the complex field, either for sequential or for parallel computations. A fast
algorithm, to achieve one step of Newton's method, is shown to be suitable to compute the eigenvalues of such a matrix. Bounds
to the eigenvalues and necessary and sufficient conditions for positive definiteness, which are easy to check, are given either
for matrices with scalar elements or for matrices with blocks. In the case in which the blocks are themselves band Toeplitz
matrices such conditions assume a very simple form.
Dedicated to Prof. Aldo Ghizzetti on his 75 th birthday 相似文献
18.
Dr. S. Białas 《Computing》1983,30(2):149-155
Consider the stable interval polynomialsF n (z)=z n +a 1 z n?1 +...+a n?1 z+a n wherea i are real numbers, satisfying the inequalities α i ≤a i ≤β i ,i=1,2, ...,n. In this paper we prove that mind n (a) is the same foraεD andaεD 1, whereD=[α1, β1]×[α2, β2]×...×[α n , β n ],D={(γ1, γ2,...γ n )∈D:γ1=α1∨γ1=β1,... γ n =α n ∨γ n =β n }d n (a)=detH, aεD, H—Hurwitz matrix for the polynomialF n (z). 相似文献
19.
Armin Biere Cyrille Artho Viktor Schuppan 《Electronic Notes in Theoretical Computer Science》2002,66(2)
Temporal logic is widely used for specifying hardware and software systems. Typically two types of properties are distinguished, safety and liveness properties. While safety can easily be checked by reachability analysis, and many efficient checkers for safety properties exist, more sophisticated algorithms have always been considered to be necessary for checking liveness. In this paper we describe an efficient translation of liveness checking problems into safety checking problems. A counter example is detected by saving a previously visited state in an additional state recording component and checking a loop closing condition. The approach handles fairness and thus extends to full LTL. 相似文献
20.