نتایج جستجو برای: behavior algebra
تعداد نتایج: 686583 فیلتر نتایج به سال:
Let Q ⊃ p. Every student is aware that there exists an algebraic and countably bounded hull. We show that |tD,ψ| ≤ ‖j‖. Unfortunately, we cannot assume that χ is superuniversally Brahmagupta and free. A central problem in analytic category theory is the characterization of hyper-countably semi-Leibniz, algebraically right-reducible functions.
in this paper, we associate canonically a precyclic mod- ule to a regular multiplier hopf algebra endowed with a group-like projection and a modular pair in involution satisfying certain con- dition
Pathfinder/MonetDB is a collaborative effort of the University of Konstanz, the University of Twente, and the Centrum voor Wiskunde en Informatica (CWI) in Amsterdam to develop an XQuery compiler that targets an RDBMS back-end. The author of this abstract is student at the University of Konstanz and spent six months as an intern at the CWI, designing and implementing a translation of XQuery Cor...
The Behavior Tree notation is used as part of a framework for developing complex computer systems. The framework is designed to simplify the process of constructing a formal specification of a system from its informal functional requirements. To give a meaning to Behavior Trees, this paper describes a lower-level language called Behavior Tree Process Algebra (BTPA) and its operational semantics...
in recent years, there has been a growing interest among researchers to investigate the relationship betweenteacher self-efficacy and classroom behavior management, especially students misbehavior. therefore, this study aimed to comparatively investigate english and arabic teachers’ use of different behavior managementstrategies, their self-efficacy, and their success in an iranian context. th...
Designing a discrete event system converging to steady temporal patterns is an essential issue of with time window constraints. Until now, analyze asymptotic stability, we have modeled timed graph’s dynamic behavior, transformed it into the matrix form (max,+) algebra, and then constructed precedence graph. This article’s aim provide theoretical basis for analyzing stability cyclicity graphs wi...
We characterize the finiteness of the representation type of an artin algebra in terms of the behavior of the projective covers and the injective envelopes of the simple modules with respect to the infinite radical of the module category. In case the algebra is representation-finite, we show that the nilpotency of the radical of the module category is the maximal depth of the composites of thes...
This paper deals with the modeling of the time behavior of discrete-event systems in (max, +) algebra. The systems we consider are linearly modeled in this algebra. The proposed method is inspired by conventional linear system theory : from an ARMA form of the model and the system impulse response, the model parameters are computed by using a basic result of Residuation Theory in order to minim...
This paper one of the series of papers in which we lay down the foundations for design of trustworthy computing systems. We propose here a methodology to perform behavior-based intrusion detection on security protocols using fuzzy relational methods. Fuzzified Allen temporal algebra plays an important role in capturing the time dimension of concurrent activites of principals as well as of intru...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید