全文获取类型
收费全文 | 164篇 |
免费 | 8篇 |
国内免费 | 4篇 |
专业分类
综合类 | 1篇 |
化学工业 | 1篇 |
建筑科学 | 2篇 |
轻工业 | 1篇 |
无线电 | 18篇 |
一般工业技术 | 5篇 |
自动化技术 | 148篇 |
出版年
2022年 | 1篇 |
2021年 | 1篇 |
2020年 | 1篇 |
2018年 | 3篇 |
2017年 | 2篇 |
2016年 | 2篇 |
2015年 | 4篇 |
2014年 | 3篇 |
2013年 | 1篇 |
2012年 | 5篇 |
2011年 | 17篇 |
2010年 | 4篇 |
2009年 | 13篇 |
2008年 | 5篇 |
2007年 | 10篇 |
2006年 | 10篇 |
2005年 | 12篇 |
2004年 | 6篇 |
2003年 | 2篇 |
2002年 | 6篇 |
2001年 | 10篇 |
2000年 | 2篇 |
1999年 | 7篇 |
1998年 | 6篇 |
1997年 | 5篇 |
1996年 | 9篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 2篇 |
排序方式: 共有176条查询结果,搜索用时 31 毫秒
151.
Barak and Lindell showed that there exist constant-round zero-knowledge arguments of knowledge with strict polynomial-time extractors.This leaves the open problem of whether it is possible to obtain an analogous result regarding constant-round zero-knowledge proofs of knowledge for NP.This paper focuses on this problem and gives a positive answer by presenting a construction of constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP. 相似文献
152.
153.
We define an equational relation as the union of some components of the least solution of a system of equations of tree transformations in a pair of algebras. We focus on equational tree transformations which are equational relations obtained by considering the least solutions of such systems in pairs of term algebras. We characterize equational tree transformations in terms of tree transformations defined by different bimorphisms. To demonstrate the robustness of equational tree transformations, we give equational definitions of some well-known tree transformation classes for which bimorphism characterizations also exist. These are the class of alphabetic tree transformations, the class of linear and nondeleting extended top-down tree transformations, and the class of bottom-up tree transformations and its linear and linear and nondeleting subclasses. Finally, we prove that a relation is equational if and only if it is the morphic image of an equational tree transformation. 相似文献
154.
Iddo Tzameret 《Information and Computation》2011,209(10):1269-1292
We study possible formulations of algebraic propositional proof systems operating with noncommutative formulas. We observe that a simple formulation gives rise to systems at least as strong as Frege, yielding a semantic way to define a Cook-Reckhow (i.e., polynomially verifiable) algebraic analog of Frege proofs, different from that given in Buss et al. (1997) and Grigoriev and Hirsch (2003). We then turn to an apparently weaker system, namely, polynomial calculus (PC) where polynomials are written as ordered formulas (PC over ordered formulas, for short). Given some fixed linear order on variables, an arithmetic formula is ordered if for each of its product gates the left subformula contains only variables that are less-than or equal, according to the linear order, than the variables in the right subformula of the gate. We show that PC over ordered formulas (when the base field is of zero characteristic) is strictly stronger than resolution, polynomial calculus and polynomial calculus with resolution (PCR), and admits polynomial-size refutations for the pigeonhole principle and Tseitin?s formulas. We conclude by proposing an approach for establishing lower bounds on PC over ordered formulas proofs, and related systems, based on properties of lower bounds on noncommutative formulas (Nisan, 1991).The motivation behind this work is developing techniques incorporating rank arguments (similar to those used in arithmetic circuit complexity) for establishing lower bounds on propositional proofs. 相似文献
155.
A deniable authentication protocol enables a receiver to identify the source of the given messages but unable to prove to a third party the identity of the sender. In recent years, several non-interactive deniable authentication schemes have been proposed in order to enhance efficiency. In this paper, we propose a security model for non-interactive deniable authentication schemes. Then a non-interactive deniable authentication scheme is presented based on designated verifier proofs. Furthermore, we prove the security of our scheme under the DDH assumption. 相似文献
156.
Jean-François Dufourd 《Journal of Automated Reasoning》2009,43(1):19-51
This paper presents a completely formalized proof of a discrete form of the Jordan Curve Theorem. It is based on a hypermap
model of planar subdivisions, formal specifications and proofs assisted by the Coq system. Fundamental properties are proven
by structural or noetherian induction: Genus Theorem, Euler Formula, constructive planarity criteria. A notion of ring of
faces is inductively defined and a Jordan Curve Theorem is stated and proven for any planar hypermap.
This research is supported by the “white” project GALAPAGOS, French ANR, 2007. 相似文献
157.
Unique Fixpoint Induction (UFI) is the chief inference rule to prove the equivalence of recursive processes in the Calculus
of Communicating Systems (CCS) (Milner 1989). It plays a major role in the equational approach to verification. Equational verification is of special interest as it
offers theoretical advantages in the analysis of systems that communicate values, have infinite state space or show parameterised
behaviour. We call these kinds of systems VIPSs. VIPSs is the acronym of Value-passing, Infinite-State and Parameterised Systems. Automating the application of UFI in the
context of VIPSs has been neglected. This is both because many VIPSs are given in terms of recursive function symbols, making
it necessary to carefully apply induction rules other than UFI, and because proving that one VIPS process constitutes a fixpoint
of another involves computing a process substitution, mapping states of one process to states of the other, that often is
not obvious. Hence, VIPS verification is usually turned into equation solving (Lin 1995a). Existing tools for this proof task, such as VPAM (Lin 1993), are highly interactive. We introduce a method that automates the use of UFI. The method uses middle-out reasoning (Bundy
et al. 1990a) and, so, is able to apply the rule even without elaborating the details of the application. The method introduces meta-variables
to represent those bits of the processes’ state space that, at application time, were not known, hence, changing from equation
verification to equation solving. Adding this method to the equation plan developed by Monroy et al. (Autom Softw Eng 7(3):263–304,
2000a), we have implemented an automatic verification planner. This planner increases the number of verification problems that
can be dealt with fully automatically, thus improving upon the current degree of automation in the field.
Partially supported by grants CONACyT-47557-Y and ITESM CCEM-0302-05.
Partially supported by EPSRC GR/L/11724. 相似文献
158.
159.
Peter Clote 《Annals of Mathematics and Artificial Intelligence》1992,6(1-3):57-106
Usingsequential, machine-independent characterization of theparallel complexity classesAC
k
andNC
k
, we establish the following conjecture of S.A. Cook. There is a free variable equational logicALV with the property thatif f, g are function symbols forALOGTIME computable functions for which f=g is provable inALV, then there are polynomial size Frege proofs for the infinite family {|f=g|
m
n
:n, m} of propositional tautologies. Here, the propositional formula |f=g|
m
n
expresses the equality off andg on inputs of length at mostn, provided that the function values are of length at mostm. We establish a related result with constant formula-depth polynomial size Frege proofs for a systemAV related to uniformAC
0 functions.Part of this research supported by NSF Grant # DCR-860615. Extended abstract of this paper appeared in theIEEE Proc. of Logic in Computer Science, Philadelphia (June 1990). 相似文献
160.
Michael Beeson 《Journal of Automated Reasoning》2006,36(4):311-344
Otter-lambda is Otter modified by adding code to implement an algorithm for lambda unification. Otter is a resolution-based,
clause-language first-order prover that accumulates deduced clauses and uses strategies to control the deduction and retention
of clauses. This is the first time that such a first-order prover has been combined in one program with a unification algorithm
capable of instantiating variables to lambda terms to assist in the deductions. The resulting prover has all the advantages
of the proof-search algorithm of Otter (speed, variety of inference rules, excellent handling of equality) and also the power
of lambda unification. We illustrate how these capabilities work well together by using Otter-lambda to find proofs by mathematical
induction. Lambda unification instantiates the induction schema to find a useful instance of induction, and then Otter's first-order
reasoning can be used to carry out the base case and induction step. If necessary, induction can be used for those, too. We
present and discuss a variety of examples of inductive proofs found by Otter-lambda: some in pure Peano arithmetic, some in
Peano arithmetic with defined predicates, some in theories combining algebra and the natural numbers, some involving algebraic
simplification (used in the induction step) by simplification code from MathXpert, and some involving list induction instead
of numerical induction. These examples demonstrate the feasibility and usefulness of adding lambda unification to a first-order
prover.
Research supported by NSF grant number CCR-0204362. 相似文献