VALUED

作品数:444被引量:503H指数:10
导出分析报告
相关领域:理学更多>>
相关作者:陈之兵张广济张成邹开其吴群励更多>>
相关机构:深圳大学南京航空航天大学大连大学北京协和医院更多>>
相关期刊:更多>>
相关基金:国家自然科学基金中国博士后科学基金国家重点基础研究发展计划广东省自然科学基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 基金=国家重点基础研究发展计划(973Program)x
条 记 录,以下是1-4
视图:
排序:
Monotonicity and nonmonotonicity in L3-valued propositional logic
《Frontiers of Computer Science》2022年第4期33-43,共11页Wei Li Yuefei Sui 
supported by the Open Fund of the State KeyLaboratory of Sofware Development Environment(SKLSDE-2010KF-06);Beijing University of Aeronautics and Astronautics,and by the National Basic Research Program of China(973 Program)(2005CB321901).
A sequent is a pair (Γ, Δ), which is true under an assignment if either some formula in Γ is false, or some formula in Δ is true. In L_(3)-valued propositional logic, a multisequent is a triple Δ∣Θ∣Γ, which i...
关键词:sequent mulisequent gentzen deduction system MONOTONICITY nonmonotonicity 
Variant quantifiers in L_(3)-valued first-order logic
《Frontiers of Computer Science》2021年第5期151-159,共9页Wei LI Yuefei SUI 
the Open Fund of the State Key Laboratory of Software Development Environment(SKLSDE-2010KF-06);Beijing University of Aeronautics and Astronautics,and by the National Basic Research Program of China(973 Program)(2005CB321901).
Traditional first-order logic has four definitions for quantifiers,which are defined by universal and existential quantifiers.In L_(3)-valued(three-valued)first-order logic,there are eight kinds of definitions for qua...
关键词:L_(3)-valued(three-valued)first-order logic sequent QUANTIFIER soundness theorem completeness theorem 
Information Security Protocol Based System Identification with Binary-Valued Observations被引量:2
《Journal of Systems Science & Complexity》2018年第4期946-963,共18页XU Changbao ZHAO Yanlong ZHANG Ji-Feng 
supported by the National Key Basic Research Program of China(973 Program)under Grant No.2014CB845301;the National Natural Science Foundation of China under Grant No.61227902
Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input info...
关键词:CRYPTOGRAPHY identification algorithm information security passive attacks security protocol time complexity 
Iterative parameter estimate with batched binary-valued observations被引量:6
《Science China(Information Sciences)》2016年第5期154-171,共18页Yanlong ZHAO Wenjian BI Ting WANG 
supported by National Natural Science Foundation of China (Grant Nos. 61174042, 11171333);National Basic Research Program of China (973 Program) (Grant No. 2014CB845301)
In this paper, we consider linear system identification with batched binary-valued observations. We constructed an iterative parameter estimate algorithm to achieve the maximum likelihood (ML) estimate. The first in...
关键词:Binary-valued observation maximum likelihood estimate strongly convex system identification exponential rate 
检索报告 对象比较 聚类工具 使用帮助 返回顶部