全文获取类型
收费全文 | 168篇 |
免费 | 6篇 |
国内免费 | 4篇 |
专业分类
综合类 | 1篇 |
化学工业 | 1篇 |
建筑科学 | 2篇 |
轻工业 | 1篇 |
无线电 | 18篇 |
一般工业技术 | 5篇 |
自动化技术 | 150篇 |
出版年
2024年 | 1篇 |
2022年 | 1篇 |
2021年 | 1篇 |
2020年 | 1篇 |
2018年 | 3篇 |
2017年 | 2篇 |
2016年 | 2篇 |
2015年 | 4篇 |
2014年 | 3篇 |
2013年 | 1篇 |
2012年 | 6篇 |
2011年 | 17篇 |
2010年 | 4篇 |
2009年 | 13篇 |
2008年 | 5篇 |
2007年 | 10篇 |
2006年 | 10篇 |
2005年 | 12篇 |
2004年 | 6篇 |
2003年 | 2篇 |
2002年 | 6篇 |
2001年 | 10篇 |
2000年 | 2篇 |
1999年 | 7篇 |
1998年 | 6篇 |
1997年 | 5篇 |
1996年 | 9篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 2篇 |
排序方式: 共有178条查询结果,搜索用时 15 毫秒
91.
本文简要综述了现代密码学的基本思想,提出了密码学研究的一些新方向,介绍了Shannon的度量密码系统安全性的指标,给出了构造公钥密码的一般步骤,讨论了分组密码的新进展,对零知识证明也作了一些探讨。 相似文献
92.
O. V. German 《Cybernetics and Systems Analysis》2005,41(5):659-669
A new basis for making logical inference in inconsistent systems is considered. Main inference rules and the completeness
theorem (in narrow sense) of the calculus proposed are proved. The approach proposed can underlie the creation of systems
of substantiation of inconsistent and unreliable solutions obtained, for instance, in designing intelligent robots and expert
systems.
__________
Translated from Kibernetika i Sistemnyi Analiz, No. 5, pp. 29–41, September–October 2005. 相似文献
93.
Larry Wos 《Journal of Automated Reasoning》1995,15(3):279-315
When given a set of properties or conditions (say, three) that are claimed to be equivalent, the claim can be verified by supplying what we call acircle of proofs. In the case in point, one proves the second property or condition from the first, the third from the second, and the first from the third. If the proof that 1 implies 2 does not rely on 3, then we say that the proof is pure with respect to 3, or simply say theproof is pure. If one can renumber the three properties or conditions in such a way that one can find a circle of three pure proofs — technically, each proof pure with respect to the condition that is neither the hypothesis nor the conclusion — then we say that acircle of pure proofs has been found. Here we study the specific question of the existence of a circle of pure proofs for the thirteen shortest single axioms for equivalential calculus, subject to the requirement that condensed detachment be used as the rule of inference. For an indication of the difficulty of answering the question, we note that a single application of condensed detachment to the (shortest single) axiom known asP4 (also known asUM) with itself yields the (shortest single) axiomP5 (also known asXGF), and two applications of condensed detachment beginning withP5 as hypothesis yieldsP4. Therefore, except forP5, one cannot find a pure proof of any of the twelve shortest single axioms when usingP4 as hypothesis or axiom, for the first application of condensed detachment must focus on two copies ofP4, which results in the deduction ofP5, forcingP5 to be present in all proofs that useP4 as the only axiom. Further, the close proximity in the proof sense ofP4 when using as the only axiomP5 threatens to make impossible the discovery of a circle of pure proofs for the entire set of thirteen shortest single axioms. Perhaps more important than our study of pure proofs, and of a more general nature, we also present the methodology used to answer the cited specific question, a methodology that relies on various strategies and features offered by W. McCune's automated reasoning programOtter. The strategies and features ofOtter we discuss here offer researchers the needed power to answer deep questions and solve difficult problems. We close this article (in the last two sections) with some challenges and some topics for research and (in the Appendix) with a sample input file and some proofs for study.Author supported by the Mathematical, Information, and Computational Sciences Division, Subprogram of the Office of Computational and Technology Research, U.S. Department of Energy, under Contract W-31-109-Eng-38. 相似文献
94.
Dolph Ulrich 《Journal of Automated Reasoning》2001,27(2):97-122
Since the first presentation of classical sentential logic as an axiomatic system by Frege in 1879, the study of a variety of sentential calculi has flourished. One major area of investigation, initiated by ukasiewicz and his colleagues in the first half of the twentieth century and carried into the second half by Meredith, Thomas, Prior, et al., focuses on alternative axiom sets for such logics, and on formal proofs within them. This paper recalls a sampling of the results obtained heretofore, noting along the way how the papers in this special issue of the Journal of Automated Reasoning fit into that larger tradition of which they now form a part. It also suggests a number of further questions, open problems, and projects to which the methods developed in these papers seem ideally suited and might well be fruitfully applied. 相似文献
95.
Many problems in mathematics, logic, computer science, and engineering can be reduced to the problem of testing positiveness of polynomials (over real numbers). Although the problem is decidable (shown by Tarski in 1930), the general decision methods are not always practically applicable because of their high computational time requirements. Thus several partial methods were proposed in the field of term rewriting systems. In this paper, we exactly determine how partial these methods are, and we propose simpler and/or more efficient methods with the same power. 相似文献
96.
New zero-knowledge proofs are given for some number-theoretic problems. All of the problems are in NP, but the proofs given here are much more efficient than the previously known proofs. In addition, these proofs do not require the prover to be superpolynomial in power. A probabilistic polynomial-time prover with the appropriate trapdoor knowledge is sufficient. The proofs are perfect or statistical zero-knowledge in all cases except one.This research was supported in part by NSA Grant No. MDA904-88-H-2006.In this paper it will at times be convenient to think of the verifier as being named Vic, and the prover being named Peggy. Thus, he will refer to the verifier and she will refer to the prover. 相似文献
97.
Carl Pixley 《Distributed Computing》1988,3(1):41-50
An elementary correctness proof for Ben-Ari's algorithm (1984) for incremental garbage collection is given. We give a new algorithm for systems in which there are multiple mutators and a proof of its correctness, which is a minor modification of the previous proof. Finally, we remark upon a way to implement these algorithms that may increase their performance on certain architectures.
Carl Pixley holds B.S., M.S. and Ph.D. degrees in mathematics from the University of Omaha, Rutgers-The State University, and the State University of New York at Binghamton, respectively. His principal contributions are the Pixley-Roy construction of set-theoretic topology, a example in the selection theory of infinite-dimensional spaces, a decomposition theorem (with W. Eaton) in geometric topology, and the design and implementation of demanddriven arithmetic in a functional programming language. He is now a member of the technical staff of the VLSI Computer Aided Design Program of Microelectronics and Computer Technology Corporation (MCC) in Austin Texas, where he is investigating mathematical methods in the verification of hardware. 相似文献
98.
《Journal of Computer and System Sciences》2016,82(3):551-563
This paper describes a computer-assisted non-existence proof of 9-input sorting networks consisting of 24 comparators, hence showing that the 25-comparator sorting network found by Floyd in 1964 is optimal. As a corollary, the 29-comparator network found by Waksman in 1969 is optimal when sorting 10 inputs.This closes the two smallest open instances of the optimal-size sorting network problem, which have been open since the results of Floyd and Knuth from 1966 proving optimality for sorting networks of up to 8 inputs. 相似文献
99.
The advent of proof-carrying code has generated significant interest in reasoning about low-level languages. It is widely believed that low-level languages with jumps must be difficult to reason about because of being inherently non-modular. We argue that this is untrue. We take it seriously that, unlike statements of a high-level language, pieces of low-level code are multiple-entry and multiple-exit. And we define a piece of code as consisting of either a single labelled instruction or a finite union of pieces of code. Thus we obtain a compositional natural semantics and a matching Hoare logic for a basic low-level language with jumps. By their simplicity and intuitiveness, these are comparable to the standard natural semantics and Hoare logic of While. The Hoare logic is sound and complete wrt the semantics and allows for compilation of proofs of the Hoare logic of While. 相似文献
100.
In this paper, we introduce an extended ring signature scheme in which the actual signer has the ability to admit to having signed a document at his will. Generally speaking, this scheme can be considered as an extension and improvement of the ring signature suggested by Rivest et al. in 2001. The proposed scheme is called signer-admission ring signature which combines the idea of the designated confirmer signatures proposed by Chaum in 1994 and the designated verifier proofs proposed by Jakobsson et al. in 1996. This paper presents a scenario explaining why the signer-admission property is valuable in real-life applications. An actual signer may possibly want to expose himself if, in doing so, he will acquire an enormous benefit. Here, we propose a generic construction of the signer-admission ring signature as well as a demonstration modified from Rivest et al.’s scheme to achieve signer-admission. 相似文献