Checking Proportional Rates in the Two-Sample Transformation Model
نویسنده
چکیده
Jǐŕı Anděl, Sergej Čelikovský, Marie Demlová, Jan Flusser, Petr Hájek, Vladimı́r Havlena, Didier Henrion, Yiguang Hong, Zdeněk Hurák, Martin Janžura, Jan Ježek, George Klir, Ivan Kramosil, Tomáš Kroupa, Petr Lachout, Friedrich Liese, Jean-Jacques Loiseau, Frantǐsek Matúš, Radko Mesiar, Karol Mikula, Jǐŕı Outrata, Jan Seidler, Karel Sladký Jan Štecha, Olga Štěpánková, Frantǐsek Turnovec, Igor Vajda, Jǐrina, Vejnarová, Milan Vlach, Miloslav Vošvrda, Pavel Źıtek
منابع مشابه
A Hybrid Meta-heuristic Approach to Cope with State Space Explosion in Model Checking Technique for Deadlock Freeness
Model checking is an automatic technique for software verification through which all reachable states are generated from an initial state to finding errors and desirable patterns. In the model checking approach, the behavior and structure of system should be modeled. Graph transformation system is a graphical formal modeling language to specify and model the system. However, modeling of large s...
متن کاملTransformation in Smallholder Agriculture through Intensification in Ethiopia: Determinants and Implications
It is a challenge for a farmer with limited resources to decide on the production of commodities and investment in the farm. Transformation of smallholder subsistence agriculture, to market oriented value addition based agriculture is vital for poverty reduction in Ethiopia. This study was initiated to explore the factors which contribute for the adoption of improved wheat and pepper varieties ...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملReachability checking in complex and concurrent software systems using intelligent search methods
Software system verification is an efficient technique for ensuring the correctness of a software product, especially in safety-critical systems in which a small bug may have disastrous consequences. The goal of software verification is to ensure that the product fulfills the requirements. Studies show that the cost of finding and fixing errors in design time is less than finding and fixing the...
متن کاملDifferential transformation method for solving a neutral functional-differential equation with proportional delays
In this article differential transformation method (DTMs) has been used to solve neutral functional-differential equations with proportional delays. The method can simply be applied to many linear and nonlinear problems and is capable of reducing the size of computational work while still providing the series solution with fast convergence rate. Exact solutions can also be obtained from the kno...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Kybernetika
دوره 45 شماره
صفحات -
تاریخ انتشار 2009