中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [6]
计算技术研究所 [3]
数学与系统科学研究院 [3]
金属研究所 [1]
长春光学精密机械与物... [1]
中国科学院大学 [1]
更多
采集方式
OAI收割 [14]
iSwitch采集 [1]
内容类型
期刊论文 [12]
会议论文 [3]
发表日期
2018 [1]
2016 [2]
2014 [1]
2013 [1]
2010 [1]
2009 [2]
更多
学科主题
Computer S... [1]
筛选
浏览/检索结果:
共15条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
Matching biomedical ontologies based on formal concept analysis
期刊论文
OAI收割
JOURNAL OF BIOMEDICAL SEMANTICS, 2018, 卷号: 9, 页码: 27
作者:
Zhao, Mengyi
;
Zhang, Songmao
;
Li, Weizhuo
;
Chen, Guowei
  |  
收藏
  |  
浏览/下载:43/0
  |  
提交时间:2018/07/30
Ontology matching
Formal concept analysis
Concept lattice
Convergence analysis of the formal energies of symplectic methods for Hamiltonian systems
期刊论文
OAI收割
SCIENCE CHINA-MATHEMATICS, 2016, 卷号: 59, 期号: 2, 页码: 379-396
作者:
Zhang RuiLi
;
Tang YiFa
;
Zhu BeiBei
;
Tu XiongBiao
;
Zhao Yue
  |  
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2018/07/30
convergence analysis
formal energy
symplectic method
Hamiltonian system
bushy tree
Abstraction-Guided Simulation Using Markov Analysis for Functional Verification
期刊论文
OAI收割
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 卷号: 35, 期号: 2, 页码: 285-297
作者:
Wang, Jian
;
Li, Huawei
;
Lv, Tao
;
Wang, Tiancheng
;
Li, Xiaowei
  |  
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/13
Abstraction-guided simulation
Markov analysis
semi-formal verification
Formal analysis of TPM2.0 key management APIs
期刊论文
OAI收割
CHINESE SCIENCE BULLETIN, 2014, 卷号: 59, 期号: 32, 页码: 4210-4224
Zhang, Qianying
;
Zhao, Shijun
;
Qin, Yu
;
Feng, Dengguo
  |  
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2014/12/16
Trusted computing
TPM2.0
Security APIs
Key management
Secrecy
Formal analysis
FCA-CIA: An approach of using FCA to support cross-level change impact analysis for object oriented Java programs
期刊论文
OAI收割
INFORMATION AND SOFTWARE TECHNOLOGY, 2013, 卷号: 55, 期号: 8, 页码: 1437-1449
Li, Bixin
;
Sun, Xiaobing
;
Keung, Jacky
  |  
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2014/12/16
Formal concept analysis
Change impact analysis
Lattice of class and method dependence
Impact factor
quantitative analysis of requirements evolution across multiple versions of an industrial software product
会议论文
OAI收割
17th Asia Pacific Software Engineering Conference: Software for Improving Quality of Life, APSEC 2010, Sydney, NSW, 40850
Hailong Wang
;
Juan Li
;
Qing Wang
;
Ye Yang
  |  
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2011/03/31
defect estimation
industrial software product
quantitative analysis
requirements evolution
software engineering
software organization
formal specification
formal verification
software houses
software metrics
systems analysis
Normalized-scale relations and their concept lattices in relational databases
期刊论文
iSwitch采集
Fundamenta informaticae, 2009, 卷号: 93, 期号: 4, 页码: 393-409
作者:
Lei, Yuxia
;
Sui, Yuefei
;
Cao, Cungen
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2019/05/10
Relational databases
Formal concept analysis
Concept lattices
Plain scaling
Derived relations
Normalized-scale relations
Normalized-scale Relations and Their Concept Lattices in Relational Databases
期刊论文
OAI收割
FUNDAMENTA INFORMATICAE, 2009, 卷号: 93, 期号: 4, 页码: 393-409
作者:
  |  
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2019/12/16
Relational databases
formal concept analysis
concept lattices
plain scaling
derived relations
normalized-scale relations
A new authentication protocol for wireless communication network based on IEEE802.16 (EI CONFERENCE)
会议论文
OAI收割
2008 International Symposium on Parallel and Distributed Processing with Applications, ISPA 2008, December 10, 2008 - December 12, 2008, Sydney, NSW, Australia
Li R.
;
Fang Z.
;
Cao W.
;
Yin Y.
;
Xu P.
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2013/03/25
After analyzing the specific security requirements of the wireless communication network based on IEEE802.16
a series of key issues about security methods and techniques were researched. A new authentication protocol for wireless mobile environment was proposed and designed. Then
its security was analyzed from the angle of technical realization and formal analysis to verify whether the original safety goals were achieved. Especially
formal analysis was mostly done. Finally
system testing was also carried out and the results were analyzed to verify function and performance of the new protocol. 2008 IEEE.
Formal Concept Analysis in relational database and rough relational database
期刊论文
OAI收割
FUNDAMENTA INFORMATICAE, 2007, 卷号: 80, 期号: 4, 页码: 435-451
作者:
Jiang, Feng
;
Sui, Yuefei
;
Cao, Cungen
  |  
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/16
Formal Concept Analysis
relational database model
rough relational database model
rough sets