نتایج جستجو برای: valued semi
تعداد نتایج: 180528 فیلتر نتایج به سال:
Modular programs are built as a combination of separate modules, which may be developed and veriied separately. Therefore, in order to reason over such programs, compositionality plays a crucial role: the semantics of the whole program must be obtainable as a simple function from the semantics of its individual modules. In the eld of logic programming, the need for a compositional semantics has...
We investigate axiomatizations of Kripke’s [18] theory of truth based on the Strong Kleene evaluation scheme for treating sentences lacking a truth value. Feferman’s axiomatization KF formulated in classical logic is an indirect approach, because it is not sound with respect to Kripke’s semantics in the straightforward sense; only the sentences provably true in KF are valid in Kripke’s partial ...
We propose a combination of Bochvar’s strict three-valued logic, McCarthy’s sequential three-valued logic, and process algebra via the conditional guard construct. This combination entails the introduction of a new constant meaningless in process algebra. We present an operational semantics in SOS-style, and a completeness result for ACP with conditional guard construct and the proposed logic.
We study the international standard XACML 3.0 for describing security access control policy in a compositional way. Our main contribution is to derive a logic that precisely captures the idea behind the standard and to formally define the semantics of the policy combining algorithms of XACML. To guard against modelling artifacts we provide an alternative way of characterizing the policy combini...
Path-sensitive data flow analysis pairs classical data flow analysis with an analysis of feasibility of paths to improve precision. In this paper we propose a framework for path-sensitive backward data flow analysis that is enhanced with an abstraction of the predicate domain. The abstraction is based on a three-valued logic. It follows the strategy that path predicates are simplified if possib...
We study the international standard XACML 3.0 for describing security access control policy in a compositional way. Our main contribution is to derive a logic that precisely captures the idea behind the standard and to formally define the semantics of the policy combining algorithms of XACML. To guard against modelling artefacts we provide an alternative way of characterizing the policy combini...
A critical view of the alleged significance of Belnap four-valued logic for reasoning under inconsistent and incomplete information is provided. The difficulty lies in the confusion between truth-values and information states, when reasoning about Boolean propositions. So our critique is along the lines of previous debates on the relevance of many-valued logics and especially of the extension o...
Let p be a prime, and let f (x) be an integer-valued polynomial. By a combinatorial approach, we obtain a nontrivial lower bound of the p-adic order of the sum k≡r (mod p β) n k (−1) k f k − r p α , where α β 0, n p α−1 and r ∈ Z. This polynomial extension of Fleck's congruence has various backgrounds and several consequences such as k≡r (mod p α) n k a k ≡ 0 mod p n−p α−1 ϕ(p α) provided that ...
We prove the existence of PPF dependent coincidence points for a pair of single-valued and multi-valued mappings satisfying generalized contractive conditions in Banach spaces. Furthermore, the PPF dependent fixed point and PPF dependent common fixed point theorems for multi-valued mappings are proved.
In this paper, we introduce the notions of interval-valued and $(in,ivq)$-interval-valued fuzzy ($p$-,$q$- and $a$-) ideals of BCI algebras and investigate some of their properties. We then derive characterization theorems for these generalized interval-valued fuzzy ideals and discuss their relationship.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید