Showing 1 - 8 results of 8 for search '"computability theory"', query time: 0.06s Refine Results
  1. 1

    On the 75th birth anniversary of Marat Mirzaevich Arslanov by I.Sh. Kalimullin, V.L. Selivanov

    Published 2019-03-01
    “…The paper describes the biography and the main scientific achievements of Marat Mirzaevich Arslanov, the Head of the Department of Algebra and Mathematical Logic of Kazan Federal University, Professor, who is the founder of the Kazan School of Mathematical Logic and Computability Theory. The main scientific finding of M.M. …”
    Get full text
    Article
  2. 2

    Tradeoffs in automated financial regulation of decentralized finance due to limits on mutable turing machines by Ben Charoenwong, Robert M. Kirby, Jonathan Reiter

    Published 2025-01-01
    “…Our analysis demonstrates that the fundamental constraints of computation theory have direct implications for financial regulation. …”
    Get full text
    Article
  3. 3

    TCCL:secure and efficient development of desktop cloud structure by Bin WANG, Wei-min LI, Jin-fang SHENG, Si-nuo XIAO

    Published 2017-10-01
    “…A secure and efficient development of desktop cloud structure:TCCL (transparent computing-based cloud),which was designed under the guidance of transparent computing,was proposed.TCCL applied the method,separating calculation and storage,loading in a block streaming way which was proposed in the transparent computing theory,to the cloud desktop system,and deployed the defense module of security threats under the cloud VM (virtual machine).As a result,the TCCL could improve the security level on the cloud VMs’ system files and data files,and could optimize the cloud virtual machines' storage efficiency.…”
    Get full text
    Article
  4. 4

    Calculation Model and Decoupling Coefficient Sensitivity Study of Periphery Hole for Eccentric Decoupled Charge in Highway Tunnels by Yuanqing Wang, Junfeng Liu

    Published 2018-01-01
    “…On the basis of the eccentric decoupled charge form on site and borehole concentric decoupled computational theory, the calculation model of eccentric decoupling charge would be established in the present study. …”
    Get full text
    Article
  5. 5

    Survey of code-based digital signatures by Yongcheng SONG, Xinyi HUANG, Wei WU, Haixia CHEN

    Published 2021-08-01
    “…The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.Code-based hard problem is recognized as NP-complete problem, the complexity increases exponentially, and there is currently no threat of quantum computing to code-based cryptographic algorithm.Therefore, code-based algorithm can resist the quantum algorithm attack, which is one of the main directions of quantum-resistant cryptography.It is still an open problem to design secure and efficient code-based signatures.For many years, international researchers use classical and new methods to construct code-based signatures, but existing constructions are weak in security or poor in performance.Code-based signatures were comprehensively summarized and analyzed, and future research directions were indicated.…”
    Get full text
    Article
  6. 6

    Rough decision rules extraction and reduction based on granular computing by Hong-can YAN, Feng ZHANG, Bao-xiang LIU

    Published 2016-10-01
    “…Rule mining was an important research content of data mining,and it was also a hot research topic in the fields of decision support system,artificial intelligence,recommendation system,etc,where attribute reduction and minimal rule set extraction were the key links.Most importantly,the efficiency of extraction was determined by its application.The rough set model and granular computing theory were applied to the decision rule reduction.The decision table was granulated by granulation function,the grain of membership and the concept granular set construction algorithm gener-ated the initial concept granular set.Therefore,attribute reduction could be realized by the distinguish operator of concept granule,and decision rules extraction could be achieved by visualization of concept granule lattice.Experimental result shows that the method is easier to be applied to computer programming and it is more efficient and practical than the existing methods.…”
    Get full text
    Article
  7. 7

    The neuroscientific basis of flow: Learning progress guides task engagement and cognitive control by Hairong Lu, Dimitri Van der Linden, Arnold B. Bakker

    Published 2025-03-01
    “…The intrinsic factors driving such engagement and facilitating subjective feelings of flow remain unclear. Building on computational theories of intrinsic motivation, this study examines how learning progress predicts engagement and directs cognitive control. …”
    Get full text
    Article
  8. 8

    Review of privacy computing techniques for multi-party data fusion analysis by LIU Shenglong, HUANG Xiuli, JIANG Yiwen, JIANG Jiawei, TIAN Yuechi, ZHOU Zejun, NIU Ben

    Published 2024-12-01
    “…There were still limitations for anonymity, scrambling, or access control-based traditional privacy desensitization measures, cryptography-based measures, and federated learning-based measures, while privacy computing theory provided a computational and information system framework for full-lifecycle protection, which needed to be combined with different application scenarios to implement full-lifecycle privacy information protection.…”
    Get full text
    Article