نتایج جستجو برای: secure sets
تعداد نتایج: 266654 فیلتر نتایج به سال:
Problems from the area of graph theory always served as fruitful benchmarks in order to explore the performance of Answer Set Programming (ASP) systems. A relatively new branch in graph theory is concerned with so-called secure sets. It is known that verifying whether a set is secure in a graph is already co-NP-hard. The problem of enumerating all secure sets thus is challenging for ASP and its...
Let G = (V, E) be a graph. Let D be a minimum secure total dominating set of G. If V – D contains a secure total dominating set D' of G, then D' is called an inverse secure total dominating set with respect to D. The inverse secure total domination number γst(G) of G is the minimum cardinality of an inverse secure total dominating set of G. The disjoint secure total domination number γstγst(G) ...
در این پایان نامه مجموعه -wحدی برای مجموعه های ژولیا دندریت نگاشت های درجه دوم توصیف می شود. با استفاده از نمایش نمادین بالدوین این فضاها، به عنوان فضای راه نامه غیرهاسدورف، نشان داده می شود که نگاشت های درجه دوم با مجموعه ژولیا دندریت دارای خاصیت تعقیب هستند و همچنین ثابت می شود که برای همه چنین نگاشت هایی، یک مجموعه بسته ی ناوردا، مجموعه -wحدی یک نقطه است اگر و تنها اگر به طور درون...
We present SAFE, an integrated system for managing trust using a logic-based declarative language. Logical trust systems authorize each request by constructing a proof from a context—a set of authenticated logic statements representing credentials and policies issued by various principals in a networked system. A key barrier to practical use of logical trust systems is the problem of managing p...
همراه با رشد روز افزون استفاده از کارت های اعتباری در تراکنش های اینترنتی و در حالت کلی تر تجارت الکترونیکی، نیاز به معماری های امنیتی دقیق تر و سیستم های پرداخت امن تر بیشتر احساس می شود. راه حل های بسیاری برای مقابله با دو مشکل عمده تراکنش های اینترنتی، phishing و حملات مرتبط با اطلاعات محرمانه ذخیره شده کارت های اعتباری، ارائه شده اند. استاندارد امنیت اطلاعات در صنعت کارت های پرداخت راه کاره...
In reply to Péter Majlender, the connection between the (maximum spread) equidifferent OWA operator weights and the analytical method for the minimum variance OWA operator problem [R. Fullér, P. Majlender, On obtaining minimal variability OWA operator weights, Fuzzy Sets and Systems 136 (2003) 203–215] is pointed out and the differences between them are clarified. 2006 Elsevier Inc. All rights ...
We reformulate Mesiar’s hypothesis [Possibility measures, integration and fuzzy possibility measures, Fuzzy Sets and Systems 92 (1997) 191196], which as such was shown to be untrue by Murofushi [Two-valued possibility measures induced by σ-finite σ-additive measures, Fuzzy Sets and Systems 126 (2002) 265268]. We prove that a two-valued σ-maxitive measure can be induced by a σ-additive measure u...
It is shown that, for any spatial frame L (i.e., L is a complete lattice generated by the set of all prime elements), both the specialization L-preorder of L-topological spaces introduced by Lai and Zhang [Fuzzy preorder and fuzzy topology, Fuzzy Sets and Systems 157 (2006) 1865–1885] and that of L-fuzzifying topological spaces introduced by Fang and Qiu [Fuzzy orders and fuzzifying topologies,...
In 2011, Mallozzi et al. [Fuzzy Sets and Systems 165(2011) 98105] introduced a core-like concept (called F-core) and a balanced-like condition for games in which the worth of any coalition is given by means of a fuzzy interval. They proved that a balanced-like condition is necessary but not sufficient enough to guarantee the F-core to be non-empty. In this paper, we study deeply on this problem...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید