نتایج جستجو برای: practical proof

تعداد نتایج: 334168  

2008
Alexander Hertel

Applications of Games to Propositional Proof Complexity Alexander Hertel Doctor of Philosophy Graduate Department of Computer Science University of Toronto 2008 In this thesis we explore a number of ways in which combinatorial games can be used to help prove results in the area of propositional proof complexity. The results in this thesis can be divided into two sets, the first being dedicated ...

Journal: :Archive of Formal Proofs 2017
Alexander Birch Jensen Anders Schlichtkrull Jørgen Villadsen

We present a certified declarative first-order prover with equality based on John Harrison’s Handbook of Practical Logic and Automated Reasoning, Cambridge University Press, 2009. ML code reflection is used such that the entire prover can be executed within Isabelle as a very simple interactive proof assistant. As examples we consider Pelletier’s problems 1-46.

Journal: :Perform. Eval. 2005
Jeremy T. Bradley Helen J. Wilson

Passage-time densities are important for the detailed performance analysis of distributed computer and communicating systems. We provide a proof and demonstration of a practical iterative algorithm for extracting complete passage-time densities from expressive semi-Markov systems. We end by showing its application to a distributed web-server cluster model of 15.9 million states.

2012
Vijay V. Vazirani

For all practical purposes, the Micali-Vazirani [MV80] general graph maximum matching algorithm is still the most efficient known algorithm for the problem. The purpose of this paper is to provide a complete proof of correctness of the algorithm in the simplest possible terms; graph-theoretic machinery developed for this purpose also helps simplify the algorithm.

2003
Roberto Tamassia

Authenticated data structures are a model of computation where untrusted responders answer queries on a data structure on behalf of a trusted source and provide a proof of the validity of the answer to the user. We present a survey of techniques for designing authenticated data structures and overview their computational efficiency. We also discuss implementation issues and practical applications.

1998
M. J. Lazarus

The present work in ̈estigates a way to produce circular polarization in the millimeter spectrum, using a Fresnel rhomb. It includes a theoretical de ̈elopment and its practical proof. Q 1999 John Wiley & Sons, Inc. Microwave Opt Technol Lett 20: 353]357, 1999.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده فنی مهندسی 1387

the outcome of this research is a practical framework for “idea generation phase of new product development process based on customer knowledge”. in continue, the mentioned framework implemented in a part of iran n.a.b market and result in segmenting and profiling this market. also, the critical new product attributes and bases of communication message and promotion campaigns extracted. we have...

2017
Thomas Genet

When rewriting a regular language with a left-linear term rewriting system, if the set of reachable terms is regular, we show that equational tree automata completion can compute it. This was known to be true for some known TRS classes preserving regularity, but was still an open question in the general case. The proof is not constructive: it assumes that the set of reachable terms is regular, ...

Journal: :Computer Languages, Systems & Structures 2017
Khalil Ghorbal Andrew Sogokon André Platzer

This paper studies sound proof rules for checking positive invariance of algebraic and semi-algebraic sets, that is, sets satisfying polynomial equalities and those satisfying finite boolean combinations of polynomial equalities and inequalities, under the flow of polynomial ordinary differential equations. Problems of this nature arise in formal verification of continuous and hybrid dynamical ...

Journal: :Des. Codes Cryptography 2010
Atefeh Mashatan Douglas R. Stinson

We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication protocols (NIMAPs) and interactive message authentication protocols (IMAPs). We provide a new proof of nonexistence of nontrivial unconditionally secure NIMAPs. This proof consists of a combinatorial counting argument ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید