نتایج جستجو برای: common xed points

تعداد نتایج: 930174  

Journal: :mathematics interdisciplinary research 0
rashwan ahmed rashwan department of mathematics, faculty of science, assuit university, assuit 71516, egypt hasanen abuelmagd hammad department of mathematics, faculty of science, sohag university, sohag 82524, egypt

the purpose of this paper is to study the convergence and the almost sure t-stability of the modi ed sp-type random iterative algorithm in a separable banach spaces. the bochner in-tegrability of andom xed points of this kind of random operators, the convergence and the almost sure t-stability for this kind of generalized asymptotically quasi-nonexpansive random mappings are obtained. our resu...

Journal: :journal of linear and topological algebra (jlta) 0
r jalal shahkoohi department of mathematics and statistics, aliabad katoul branch, islamic azad university, aliabad katoul, iran. s.a kazemipour department of mathematics and statistics, aliabad katoul branch, islamic azad university, aliabad katoul, iran. a rajabi eyvali department of mathematics and statistics, aliabad katoul branch, islamic azad university, aliabad katoul, iran.

in this paper, tripled coincidence points of mappings satisfying  -contractive conditions in the framework of partially ordered gb-metric spaces are obtained. our results extend the results of aydi et al. [h. aydi, e. karapnar and w. shatanawi, tripled xed point results in generalized metric space, j. applied math., volume 2012, article id 314279, 10 pages]. moreover, some examples of the mai...

1998
Xinxin Liu Scott A. Smolka

We present global and local algorithms for evaluating minimal xed points of dependency graphs, a general problem in xed-point computation and model checking. Our algorithms run in linear-time, matching the complexity of the best existing algorithms for similar problems, and are simple to understand. The main novelty of our global algorithm is that it does not use the counter and \reverse list" ...

Journal: :نظریه تقریب و کاربرد های آن 0
جواد مجردی افرا آر آی

in this paper, we prove some common fi xed point results for two self mappingsf and g on s-metric space such that f is a g.w.c.m with respect to g.

1998
M Izquierdo D Singerman

Macbeath gave a formula for the number of xed points for each non-identity element of a cyclic group of automorphisms of a compact Riemann surface in terms of the universal covering transformation group of the cyclic group. We observe that this formula generalizes to determine the xed-point set of each non-identity element of a cyclic group of automorphisms acting on a closed non-orientable sur...

2006
Judicaël Courant Jean-François Monin

We show how the proof-assistant Coq helped us formally verify security properties of an API. As far as we know, this is the rst mathematical proof of security properties of an API. The API we veried is a xed version of Bond's modelization of IBM's Common Cryptographic Architecture. We explain the methodology we followed, sketch our proof and explain the points the formal veri cation raised.

Journal: :Int. J. Found. Comput. Sci. 1995
Scott F. Smith

In this paper a hybrid type theory HTT is deened which combines the programming language notion of partial type with the logical notion of total type into a single theory. A new partial type constructor A is added to the type theory: objects in A may diverge, but if they converge, they must be members of A. A xed point typing rule is given to allow for typing of xed points. The underlying theor...

1995
John R. Stembridge

Let g be a complex semisimple Lie algebra. In this paper, we prove that the action of a certain involution on canonical bases for irreducible g-modules deened by Lusztig agrees with the action of a special element of the associated simply connected Lie group, up to a scalar of unit absolute value. This leads to formulas for the number of xed points of the involution by means of the Weyl charact...

1997
Kumiko Hattori Tetsuya Hattori

Diiusion processes on the Sierpinski gasket and the abc-gaskets are constructed as limits of random walks. In terms of the associated renor-malization group, the present method uses the inverse trajectories which converge to unstable xed points corresponding to the random walks on one-dimensional chains. In particular, non-degenerate xed points are unnecessary for the construction. A limit theo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید