全文获取类型
收费全文 | 168篇 |
免费 | 6篇 |
国内免费 | 4篇 |
专业分类
综合类 | 1篇 |
化学工业 | 1篇 |
建筑科学 | 2篇 |
轻工业 | 1篇 |
无线电 | 18篇 |
一般工业技术 | 5篇 |
自动化技术 | 150篇 |
出版年
2024年 | 1篇 |
2022年 | 1篇 |
2021年 | 1篇 |
2020年 | 1篇 |
2018年 | 3篇 |
2017年 | 2篇 |
2016年 | 2篇 |
2015年 | 4篇 |
2014年 | 3篇 |
2013年 | 1篇 |
2012年 | 6篇 |
2011年 | 17篇 |
2010年 | 4篇 |
2009年 | 13篇 |
2008年 | 5篇 |
2007年 | 10篇 |
2006年 | 10篇 |
2005年 | 12篇 |
2004年 | 6篇 |
2003年 | 2篇 |
2002年 | 6篇 |
2001年 | 10篇 |
2000年 | 2篇 |
1999年 | 7篇 |
1998年 | 6篇 |
1997年 | 5篇 |
1996年 | 9篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 2篇 |
排序方式: 共有178条查询结果,搜索用时 15 毫秒
151.
One of the key features of logic programming is the notion of goal-directed provability. In intuitionistic logic, the notion of uniform proof has been used as a proof-theoretic characterization of this property. Whilst the connections between intuitionistic logic and computation are well known, there is no reason per se why a similar notion cannot be given in classical logic. In this paper we show that there are two notions of goal-directed proof in classical logic, both of which are suitably weaker than that for intuitionistic logic. We show the completeness of this class of proofs for certain fragments, which thus form logic programming languages. As there are more possible variations on the notion of goal-directed provability in classical logic, there is a greater diversity of classical logic programming languages than intuitionistic ones. In particular, we show how logic programs may contain disjunctions in this setting. This provides a proof-theoretic basis for disjunctive logic programs, as well as characterising the “disjunctive” nature of answer substitutions for such programs in terms of the provability properties of the classical connectives Λ and Λ. 相似文献
152.
A deniable authentication protocol enables a receiver to identify the source of the given messages but unable to prove to a third party the identity of the sender. In recent years, several non-interactive deniable authentication schemes have been proposed in order to enhance efficiency. In this paper, we propose a security model for non-interactive deniable authentication schemes. Then a non-interactive deniable authentication scheme is presented based on designated verifier proofs. Furthermore, we prove the security of our scheme under the DDH assumption. 相似文献
153.
We define an equational relation as the union of some components of the least solution of a system of equations of tree transformations in a pair of algebras. We focus on equational tree transformations which are equational relations obtained by considering the least solutions of such systems in pairs of term algebras. We characterize equational tree transformations in terms of tree transformations defined by different bimorphisms. To demonstrate the robustness of equational tree transformations, we give equational definitions of some well-known tree transformation classes for which bimorphism characterizations also exist. These are the class of alphabetic tree transformations, the class of linear and nondeleting extended top-down tree transformations, and the class of bottom-up tree transformations and its linear and linear and nondeleting subclasses. Finally, we prove that a relation is equational if and only if it is the morphic image of an equational tree transformation. 相似文献
154.
We demonstrate program extraction by the Light Dialectica Interpretation (LDI) on a minimal logic proof of the classical existence of Fibonacci numbers. This semi-classical proof is available in MinLog's library of examples. The term of Gödel's T extracted by the LDI is, after strong normalization, exactly the usual recursive algorithm which defines the Fibonacci numbers (in pairs). This outcome of the Light Dialectica meta-algorithm is much better than the T-program extracted by means of the pure Gödel Dialectica Interpretation. It is also strictly less complex than the result obtained by means of the refined A-translation technique of Berger, Buchholz and Schwichtenberg on an artificially distorted variant of the input proof, but otherwise it is identical with the term yielded by Berger's Kripke-style refined A-translation. Although syntactically different, it also has the same computational complexity as the original program yielded by the refined A-translation from the undistorted input classical Fibonacci proof. 相似文献
155.
The past decade has given rise to a number of explicit substitution calculi. An important question of explicit substitution calculi is that of the termination of the underlying calculus of substitution. Proofs of termination of substitutions fall in two categories: those that are easy because a decreasing measure can be established and those that are difficult because such a decreasing measure is not easy to establish. This paper considers two styles of explicit substitution: and s, for which different termination proof methods apply. The termination of s is guaranteed by a decreasing weight, while a decreasing weight for showing the termination of has not yet been found. These termination methods for and s are formalized in the proof checker ALF. During our process of formally checking the termination of and s we comment on what is needed to make a proof formally checkable. 相似文献
156.
We propose an extension of the propositional proof logic languageby the second-order variables denoting the reference constructors(like the formula which is proven by x). The prooflogic in this weak second-order language is axiomatized viathe calculus ref, the (Functional)Logic of Proofs with References. It is supplied with the formalarithmetical semantics: we prove that ref is sound with respect to arithmetical interpretationsand is a conservative extension of propositional single-conclusionproof logic . Finally,we demonstrate how the language of ref can be used as a scheme language for arithmetic and providethe corresponding proof conversion method. 相似文献
157.
Alexandru Slcianu Konstantine Arkoudas 《Electronic Notes in Theoretical Computer Science》2005,141(2):53
This paper describes our experience using the interactive theorem prover Athena for proving the correctness of abstract interpretation-based dataflow analyses. For each analysis, our methodology requires the analysis designer to formally specify the property lattice, the transfer functions, and the desired modeling relation between the concrete program states and the results computed by the analysis. The goal of the correctness proof is to prove that the desired modeling relation holds. The proof allows the analysis clients to rely on the modeling relation for their own correctness. To reduce the complexity of the proofs, we separate the proof of each dataflow analysis into two parts: a generic part, proven once, independent of any specific analysis; and several analysis-specific conditions proven in Athena. 相似文献
158.
159.
Alasdair Urquhart 《Annals of Mathematics and Artificial Intelligence》2003,37(3):241-250
This paper discusses current techniques for proving lower bounds on the size of resolution proofs from sets of clauses expressing assertions about matchings in bipartite graphs (a class including the well-known pigeon-hole clauses). The techniques are illustrated by demonstrating an improved lower bound for some examples discussed by Kleine Büning. The final section discusses some problems where current techniques appear inadequate, and new ideas seem to be required. 相似文献
160.
Application of authentication protocol and key exchange scheme are major research issues in current internet, and entity identification (users or servers) accuracy and security are thereby safeguarded by various types of verification programs. Therefore, in the last 10 years, it was accompanied with productive discussions, but those discussions mainly focus on single issues, and because of the lack of security, there still existed improvements. The concept of zero‐knowledge proofs is well suited for the identification and signing within network system, which has been widely used since proposed in 1985. However, common identification methods are only fit for individual user. In an increasingly complex network environment of today, information is usually conveyed through many unidentified servers, as a result, we have to encrypt messages by adopting different kinds of session keys. As for the chaotic maps technology, it also serves as a new encryption technology, widely adopted in communication protocols and key agreements over the years. As a consequence, in this study, we are going to propose an authentication protocol with key exchange function by taking advantage of characters of zero‐knowledge proofs and chaotic maps, as well as adopt the BAN‐logic to prove the security of this protocol. This study also compares the results of the security analysis of our protocol and related works. As a result, our proposed protocol has more security than others. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献