منابع مشابه
Ildikó Sain TOTAL CORRECTNESS IN NONSTANDARD DYNAMIC
In this paper we investigate total correctness (termination and correctness simultaneously) in Nonstandard Dynamic Logic (NDL). Here we show that despite of the celebrated Kfoury-Park [5] result, termination is a first order notion if approached properly (e.g. via NDL). In Definition 1 below we recall the famous Manna-Cooper Q-method for proving total correctness. Then we do the same things to ...
متن کاملIldikó Sain COMPUTER SCIENCE TEMPORAL LOGICS
We use first-order temporal logic (FTL) with modalities ©, [F ], and U denoting “nexttime”, “always-in-the-future”, and “until” respectively. Given a first-order similarity type or language L, the usual predicate etc. symbols of L are considered to be rigid, i.e. their meanings do not change in time. Similarly, individual variables xi (i ∈ ω) are rigid. To this we add an infinity yi (i ∈ ω) of ...
متن کاملIldikó Sain COMPUTER SCIENCE TEMPORAL LOGICS NEED THEIR CLOCKS
We use first-order temporal logic (FTL) with modalities ©, [F ], and U denoting “nexttime”, “always-in-the-future”, and “until” respectively. Given a first-order similarity type or language L, the usual predicate etc. symbols of L are considered to be rigid, i.e. their meanings do not change in time. Similarly, individual variables xi (i ∈ ω) are rigid. To this we add an infinity yi (i ∈ ω) of ...
متن کاملILDIKÓ SZABÓ C 1 - Continuous Coons - type Blending of Triangular Patches
A Gordon–Coons-type surface construction starts from three differentiable triangular surface patches, which are defined on the same triangular parameter domain. If one boundary curve of each fits a curvilinear triangle, then the defined surface interpolates to these curves. The connection between the resulting surface and the constituents is C1 continuous along the common boundary curves with t...
متن کاملBiclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers
In this paper we present the first biclique cryptanalysis of MIBS block cipher and a new biclique cryptanalysis of PRESENT block cipher. These attacks are performed on full-round MIBS-80 and full-round PRESENT-80. Attack on MIBS80 uses matching without matrix method and has a data complexity upper bounded by 252 chosen plaintext where it reduced security of this cipher about 1 bit. Attack on PR...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Orvosi Hetilap
سال: 2019
ISSN: 0030-6002,1788-6120
DOI: 10.1556/650.2019.ho2640