Results 81 to 90 of about 1,423 (254)
Deductive Verification of the Sliding Window Protocol
We consider the well-known Sliding Window Protocol which provides reliable and efficient transmission of data over unreliable channels. A formal proof of correctness for this protocol faces substantial difficulties caused by a high degree of parallelism ...
D. A. Chkliaev, V. A. Nepomniaschy
doaj +1 more source
Enhancing generalized spectral clustering with embedding Laplacian graph regularization
Abstract An enhanced generalised spectral clustering framework that addresses the limitations of existing methods by incorporating the Laplacian graph and group effect into a regularisation term is presented. By doing so, the framework significantly enhances discrimination power and proves highly effective in handling noisy data.
Hengmin Zhang +5 more
wiley +1 more source
Automated Reasoning in Higher-Order Logic using the TPTP THF Infrastructure
The Thousands of Problems for Theorem Provers (TPTP) problem library is the basis of a well known and well established infrastructure that supports research, development, and deployment of Automated Theorem Proving (ATP) systems.
Christoph Benzmueller, Geoff Sutcliffe
doaj
Mathematical Text Processing in EA-style: a Sequent Aspect
The paper is devoted to the study of one of the aspects of the so-called Evidence Algorithm programme advanced by Academician V.M.~Glushkov and connected with the problem of automated theorem-proving search in the signature of first-order theories that ...
Alexander Lyaletski
doaj +1 more source
DT-Solver: Automated Theorem Proving with Dynamic-Tree Sampling Guided by Proof-level Value Function [PDF]
Haiming Wang +12 more
openalex +1 more source
Complexity and related enhancements for automated theorem-proving programs
AbstractIn this paper some enhancements for automated theorem-proving programs, techniques which can be combined with the various well known inference rules which are employed in such programs, are given. Proofs of some of the more difficult problems previously sought by use of automated theorem proving were obtained by a program utilizing these ...
L. Wos, J. McCharen, Ross A. Overbeek
openaire +2 more sources
ABSTRACT The evaluation and assessment of network security is a decision‐making (DM) problem that occurs in an environment with multiple criteria, which have uncertainty, bipolarity, and extra‐related information. The traditional approaches fail to address the need to acquire a wide range of information for the assessment, especially in situations ...
Walid Emam +3 more
wiley +1 more source
Automated Theorem-Proving for Theories with Simplifiers Commutativity, and Associativity [PDF]
James R. Slagle
openalex +1 more source
Mesh‐Based Charge Simulation Method and Its Applications to Electrostatic Electric Field Computation
ABSTRACT The charge simulation method (CSM) is a well‐established numerical technique employed in electrostatic field calculations, primarily due to its simplicity and computational efficiency. However, conventional CSM face challenges when applied to complex geometries, as they necessitate meticulous manual placement of simulation charges and matching
Tahan Wang +5 more
wiley +1 more source
Just the facts, Jack: truths and myths of automated theorem provers [PDF]
Roderick Moten
openalex +1 more source

