نتایج جستجو برای: secure sets

تعداد نتایج: 266654  

2014
Michael Abseher Bernhard Bliem Günther Charwat Frederico Dusberger Stefan Woltran

Problems from the area of graph theory always served as fruitful benchmarks in order to explore the performance of Answer Set Programming (ASP) systems. A relatively new branch in graph theory is concerned with so-called secure sets. It is known that verifying whether a set is secure in a graph is already co-NP-hard. The problem of enumerating all secure sets thus is challenging for ASP and its...

2016
V. R. Kulli

Let G = (V, E) be a graph. Let D be a minimum secure total dominating set of G. If V – D contains a secure total dominating set D' of G, then D' is called an inverse secure total dominating set with respect to D. The inverse secure total domination number γst(G) of G is the minimum cardinality of an inverse secure total dominating set of G. The disjoint secure total domination number γstγst(G) ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه الزهراء - دانشکده علوم پایه 1393

در این پایان نامه مجموعه ‎-w‎حدی برای مجموعه های ژولیا دندریت‎ ‎‎نگاشت های درجه دوم توصیف می شود. ‏با استفاده از نمایش نمادین بالدوین این فضاها، به عنوان فضای راه نامه غیرهاسدورف‏، نشان داده می شود که نگاشت های درجه دوم با مجموعه ژولیا دندریت دارای خاصیت تعقیب هستند و همچنین ثابت می شود که برای همه چنین نگاشت هایی، یک مجموعه بسته‏ ی ناوردا‏، مجموعه ‎-w‎حدی یک نقطه است اگر و تنها اگر به طور درون...

Journal: :CoRR 2015
Vamsi Thummala Jeffrey S. Chase

We present SAFE, an integrated system for managing trust using a logic-based declarative language. Logical trust systems authorize each request by constructing a proof from a context—a set of authenticated logic statements representing credentials and policies issued by various principals in a networked system. A key barrier to practical use of logical trust systems is the problem of managing p...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده فنی و مهندسی 1390

همراه با رشد روز افزون استفاده از کارت های اعتباری در تراکنش های اینترنتی و در حالت کلی تر تجارت الکترونیکی، نیاز به معماری های امنیتی دقیق تر و سیستم های پرداخت امن تر بیشتر احساس می شود. راه حل های بسیاری برای مقابله با دو مشکل عمده تراکنش های اینترنتی، phishing و حملات مرتبط با اطلاعات محرمانه ذخیره شده کارت های اعتباری، ارائه شده اند. استاندارد امنیت اطلاعات در صنعت کارت های پرداخت راه کاره...

Journal: :Int. J. Approx. Reasoning 2006
Xinwang Liu

In reply to Péter Majlender, the connection between the (maximum spread) equidifferent OWA operator weights and the analytical method for the minimum variance OWA operator problem [R. Fullér, P. Majlender, On obtaining minimal variability OWA operator weights, Fuzzy Sets and Systems 136 (2003) 203–215] is pointed out and the differences between them are clarified. 2006 Elsevier Inc. All rights ...

Journal: :Fuzzy Sets and Systems 2007
Paul Poncet

We reformulate Mesiar’s hypothesis [Possibility measures, integration and fuzzy possibility measures, Fuzzy Sets and Systems 92 (1997) 191196], which as such was shown to be untrue by Murofushi [Two-valued possibility measures induced by σ-finite σ-additive measures, Fuzzy Sets and Systems 126 (2002) 265268]. We prove that a two-valued σ-maxitive measure can be induced by a σ-additive measure u...

Journal: :Fuzzy Sets and Systems 2008
Wei Yao Fu-Gui Shi

It is shown that, for any spatial frame L (i.e., L is a complete lattice generated by the set of all prime elements), both the specialization L-preorder of L-topological spaces introduced by Lai and Zhang [Fuzzy preorder and fuzzy topology, Fuzzy Sets and Systems 157 (2006) 1865–1885] and that of L-fuzzifying topological spaces introduced by Fang and Qiu [Fuzzy orders and fuzzifying topologies,...

2016
Dug Hun Hong

In 2011, Mallozzi et al. [Fuzzy Sets and Systems 165(2011) 98105] introduced a core-like concept (called F-core) and a balanced-like condition for games in which the worth of any coalition is given by means of a fuzzy interval. They proved that a balanced-like condition is necessary but not sufficient enough to guarantee the F-core to be non-empty. In this paper, we study deeply on this problem...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید