逻辑度量空间中的仿射变换和几类特殊公式的性态研究及其应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
计量逻辑学从基本概念的程度化入手,系统地引入了公式的真度理论和公式间的相似度理论,定义了公式间的伪距离,最终建立起了逻辑度量空间(Logic Metric Space,简称LMS)理论.由于有了度量工具,在LMS中就可以研究给定的逻辑理论r的发散度和相容度问题,可以研究各种类型的近似推理问题,等等.当前LMS理论已从经典的二值命题逻辑推广到了多种n值命题逻辑之中(n>2).
     值得注意的是,作为度量空间,LMS自身结构的研究似尚未展开.最近已见到从反射变换入手探讨经典LMS结构的研究,虽然只是起步性的研究,但却是一个新的开端.本文将上述研究进行推广,进一步研究经典LMS中的仿射变换问题,得到了包括真度不变性和相似度不变性在内的较为系统的研究成果.同时,本文还将经典LMS中的反射变换理论推广到了(?)*-Lindenbaum代数之中.
     另一方面,由于布尔函数理论既是经典LMS中真度理论的基础,又是密码学中常用的基本工具,可见计量逻辑学与密码学之间存在着紧密的联系.基于这种思想,本文在LMS中先后引入了线性逻辑公式、对称逻辑公式和雪崩逻辑公式的概念,并从它们在整个空间中的分布得出了各类公式稀疏程度的描述,这又可反馈到密码学中,使得从事密码学研究的学者对是否使用相应的函数传送密码有更全面的掌握.
     此外,本文还将布尔函数的Shannon展开式的巧妙思想应用到了Lukasiewicz n值逻辑系统Ln中,给出了MaNaughton函数的表示方法,解决了m元n值MaN-aughton函数的计数问题.
     全文共分五章.
     第一章介绍了有关计量逻辑学与密码学中布尔函数的基本知识,这些知识是阅读后续内容所必须的,是概述性的.
     第二章首先将反射变换的概念引入到连续值逻辑系统£*之中,研究了£*逻辑度量空间中反射变换的性质.然后将仿射变换的概念引入到经典逻辑系统之中,定义了公式集F(S)到F(S)上的仿射变换φ,证明了该仿射变换φ:F(S)→F(S)是F(S)上的自同构变换.而且公式的真度,公式间的相似度与伪距离在仿射变换下保持不变.在经典逻辑系统中,反射变换是仿射变换的特殊情形,即,仿射变换是公式集F(S)到F(S)上的一类更广泛的变换.
     第三章基于线性布尔函数的概念,在经典逻辑度量空间中提出了线性逻辑公式的概念,并给出了n元线性逻辑公式的构造方法.研究了反射变换下线性逻辑公式的性质,证明了所有线性逻辑公式的真度等于1/2,而全体n元逻辑公式的真度共有2n+1种之多,这表明线性逻辑公式在全体逻辑公式之中的分布很稀疏.这就从计量学的角度验证了线性布尔函数的结构比较简单.而且,我们可以通过线性布尔函数作乘积得到一类代数次数等于k的布尔函数,这类布尔函数所对应的逻辑公式的真度为1/2k,这表明这类代数次数等于k的非线性布尔函数所对应的逻辑公式在全体逻辑公式之中的分布也很稀疏,可在密码设计中使用该类布尔函数.
     第四章将符号化计算树逻辑中的Shannon展开式做了推广,在n值Lukasiewicz逻辑系统L。中,研究了由逻辑公式导出的n值McNaughton函数的展开式,给出了m元n值McNaughton函数的准析取范式和准合取范式.在此基础上,给出了m元n值McNaughton函数的计数问题.并在n值Lukasiewicz逻辑系统Ln中,给出了m元逻辑公式的构造方法及其逻辑等价类的计数问题.
     在弄清楚了多值McNaughton函数的构造方法和结构之后,我们将对称布尔函数的概念引入到多值McNaughton函数之中,提出了对称三值McNaughton函数的概念.在此基础上,在三值Lukasiewicz逻辑系统L3中,提出了对称逻辑公式和准对称逻辑公式的定义.研究了在逻辑等价意义下对称逻辑公式的性质,比较了L3和经典逻辑系统L中对称逻辑公式之间的关系及其计数问题,证明了n元对称逻辑公式占全体n元逻辑公式的比例随n的增大而趋向于零,而且全体对称逻辑公式的真度之集在[0,1]中稠密.但是,全体对称逻辑公式之集又是逻辑度量空间中的无处稠密集.最后,给出了L3中对称逻辑公式的构造方法.
     第五章将密码学中满足严格雪崩准则的布尔函数的概念引入到计量逻辑学之中,提出了雪崩逻辑公式的概念,并研究了雪崩逻辑公式的真度及其性质.证明了雪崩逻辑公式A的真度T(A)满足条件1/4≤τ(A)≤3/4特别是证明了至少含有三个原子公式的雪崩逻辑公式的真度之集为H1={k/2n-1|2n-3≤k≤3×2n-3;n-3,4,…},或者用密码学的术语来说,n(n≥3)元雪崩布尔函数的汉明重量之集为w(n)={ω(f(x))|2n…2≤ω(f(x))≤3×2n-2且ω(F(x))为偶数},这就排除了不满足此条件的n元布尔函数的个数计算,从而在一定程度上简化了雪崩布尔函数的计数问题.然后,我们通过引入函数ξ建立了n(n≥3)元雪崩布尔函数个数的表达式,并给出了不同真度的雪崩逻辑公式的构造方法.研究了k阶雪崩逻辑公式与反射变换下k阶雪崩逻辑公式的性质.最后,研究了满足严格雪崩准则的布尔函数的计数问题,得到了满足严格雪崩准则的n元布尔函数个数的上界和下界.
In Quantitative Logic, truth degree of formulas and similarity degree between formulas are systematically introduced through establishing graded versions of basic logical notions. Meanwhile the pseudo-distance between formulas is constructed and theory of the logic metric space (LMS for short) is established correspondingly. Based on these, one can further discuss the divergency degree and consistency degree of a logical theory Γ and several types of approximate reasoning can be studied in LMS. Up to the present, the theory of LMS has been generalized from classical two-valued propositional logic to many kinds of n-valued propositional logics (n>2).
     It is worth noting that the theory of the structure of LMS, as a metric space, has not been thoroughly developed. However, some discussion about reflexive trans-formations in classical LMS has been found recently and seems to be a new beginning of research on the structure of LMS although not mature. To furtherly develop this idea, the present paper studies the affine transformations and obtains that the con-cepts of truth degree as well as similarity degree keep unchanged under the affine transformations. Meanwhile, the theory of reflexive transformations is generalized into (?)*-Lindenbaum algebra.
     On the other hand, since the theory of Boolean functions sets a foundation for the concept of truth degree in classical LMS and also plays an important part in cryptog-raphy, one can see that the relationship between Quantitative Logic and cryptography seems very close in the sense. Based on this thought, the concepts of linear logic formu-las, symmetric logic formulas as well as avalanche logic formulas of LMS are proposed in this paper one after another, and the sparse degree of these formulas is obtained through their distribution in the whole space. More importantly, these results can be fed back to cryptography and offer useful informations for cryptographists during code transferring.
     Furthermore, the Shannon expansion of Boolean functions is applied to n-valued Lukasiewicz logic system Ln. The methods of expressing McNaughton functions are given and counting problem of m-ary n-valued McNaughton functions is solved.
     The present paper is divided into5chapters.
     The first chapter overviews some basic knowledge about Quantitative Logic and Boolean function in cryptography, which are preparatory for the latter chapters.
     Chapter2firstly gives a reflexive transformation in logic system (?)*. And the properties of reflexive transformation are studied in (?)*logic metric space. Then the concept of affine transformation is introduced into the classical logic system. The definition of affine transformation Φ on F(S) is proposed, which is proved to be an automorphism of F(S). It is obtained that the concepts of truth degree, similarity degree as well as pseudo-distance keep unchanged under the affine transformation Φ. In the classical logic system, the affine transformation is a new transformation with reflexive transformation being its special case.
     Based on the concept of linear Boolean functions in cryptology, Chapter3gives the concept of linear logic formulas in classical logic metric space. And methods of construction of n-ary linear logic formulas are given. In classical logic metric space, the properties of linear logic formulas under reflexive transformation are studied. It is proved that the truth degrees of all linear logic formulae are equal to1/2. However there are2n+1kinds of truth degrees to all Boolean functions which contain n variables. This shows that the distribution of linear logic formulas in all logic formulas is sparse. This also verifies from the theory of Quantitative Logic that the structure of linear Boolean function is relatively simple. Then a kind of Boolean functions of degree equaling to k can be obtained by multiplying k linear Boolean functions. It is also proved that the truth degree of logic formulas corresponding to this kind of Boolean functions is equal to1/2k. This shows that the distribution of logic formulas corresponding to this kind of Boolean functions of degree equaling to k in all logic formulas is sparse. Hence this kind of Boolean functions can be used in cryptography.
     Chapter4generalizes Shannon expansion in symbolic computation tree logic. In n-valued Lukasiewicz logic system, the expansion of n-valued McNaughton func-tions which are induced by logical formulas are studied. The quasi disjunctive normal form and quasi conjunctive normal form of m-ary n-valued McNaughton functions are given. Then the counting problems of m-ary n-valued McNaughton functions are solved. In n-valued Lukasiewicz logic system, the construction of formulas and counting problems of their logic equivalence class are solved.
     As the method of construction of many-valued McNaughton functions is given, we propose the concept of symmetric three-valued McNaughton functions. Then the concepts of symmetric logic formulas and pseudo-symmetric logic formulas are given in three valued Lukasiewicz logic system L3. The properties of symmetric logic formulas under logically equivalence are studied. The relationship of symmetric logic formulas in L3and classical logical system L, and the number of them are given. It is proved that the ratio of the number of symmetric formulas with n atoms over the number of all formulas with n atoms converges to zero when n tends to infinite. It is also proved that the set of truth degrees of symmetric logic formulas is dense in [0,1]. On the other hand, the set consisting of all symmetric logic formulas is a nowhere-dense set in the logic metric space. Finally, the construction of symmetric logic formulas in L3is given.
     Chapter5introduces the concept of Boolean functions satisfying strict avalanche criterion in cryptology into Quantitative Logic. The concept of avalanche logic formu-las is proposed. The truth degree of avalanche logic formulas and its properties are studied. It is proved that the truth degree τ(A) of avalanche logic formula A satisfies following equation1/4≤τ(A)≤3/4. In particularly, it is proved that the set of truth degrees of avalanche logic formulas which contain at least three atom formulas is H1={k/2n-1|2n-3≤k≤3×2n-3;n-3,4,…}, Using cryptography terms, the set of Hamming weight of n-ary (n≥3) Boolean functions satisfying strict avalanche criterion is w(n)={ω(f(x))|2n…2≤ω(f(x))≤3×2n-2, and ω(f(x)) is even number.}
     It can simplify the counting problem of avalanche Boolean functions through excluding the number of Boolean functions which do not satisfy this condition. Then, a formula for calculating the total number of n-ary (n≥3) avalanche Boolean functions is established by means of a newly introduced function ζ, and a method of construction of avalanche logic formulas are given. Finally, the properties of avalanche logic formulas of order k under reflexive transformation are studied. The upper and lower bounds of the number of Boolean functions satisfying strict avalanche criterion are obtained.
引文
[1]王国俊.数理逻辑引论与归结原理(第二版)[M].北京:科学出版社,2006.
    [2]Hamilton A G. Logic for mathematicians [M]. London:Cambridge University Press, 1978.
    [3]王元元.计算机科学中的逻辑学[M].北京:科学出版社,1989.
    [4]胡世华,陆钟万.数理逻辑基础[M].北京:科学出版社,1983.
    [5]陆汝钤.人工智能[M].北京:科学出版社,1988.
    [6]石纯一,黄昌宁,王家钦.人工智能原理[M].北京:清华大学出版社,1993.
    [7]王永庆.人工智能M].西安:西安交通大学出版社,1994.
    [8]陆钟万.面向计算机科学的数理逻辑[M].北京:科学出版社,1998.
    [9]刘徐华.基于归结方法的自动推理[M].北京:科学出版社,1994.
    [10]Zadeh L A. Fuzzy sets [J]. Information and Control,1965,8(3):338-353.
    [11]Zadeh L A. Outline of a new approach to the analysis and decision processes [J]. IEEE Transactions on Systems, Man, and Cybernetics,1973, SMC-3(1):28-44.
    [12]王国俊.模糊推理的全蕴涵三Ⅰ算法[J].中国科学,E辑,1999,29(1):43-53.
    [13]Shi H X, Wang G J. Lattice-valued Modal Propositional Logic and Its Complete-ness[J]. Science in China Ser.F,2010,53(11):2230-2239.
    [14]王国俊.模糊推理的一个新方法[J].模糊系统与数学,1999,13(3):1-10.
    [15]王庆平.模糊推理中的三Ⅰ算法研究[D].聊城:聊城大学.
    [16]王国俊,宋庆燕.一种新型的三Ⅰ算法及其逻辑基础[J].自然科学进展,2003,13(6):575-581.
    [17]Liu H W, Wang G J. Unified forms of fully implication restriction methods for fuzzy reasoning [J]. Information Sciences,2007,177(3):956-966.
    [18]Liu H W, Wang G J. A note on implicators based on binary aggregation operators in interval-valued fuzzy set theory [J]. Fuzzy Sets and Systems,2006,157(24):3231-3236.
    [19]宋士吉,吴澄.模糊推理的反向三Ⅰ算法[J].中国科学,E辑,2002,32(2):230-246.
    [20]Liu H W, Wang G J. A note on the unified forms of triple I method [J]. Computer and Mathematics with Applications,2006,52(10-11):1609-1613.
    [21]Liu H W, Wang G J. Multi-criteria decision-making methods based on intuitionistic fuzzy sets [J]. European Journal of Operational Research,2007,179(1):220-233.
    [22]Liu H W, Wang G J. Triple I method based on pointwise sustaining degree [J]. Computer and Mathematics with Applications,2008,55(11):2680-2686.
    [23]Liu H W, Wang G J. Continuity of triple I methods based on several implications [J]. Computer and Mathematics with Applications,2008,56(8):2079-2087.
    [24]裴道武,傅丽.模糊推理三Ⅰ算法的逻辑基础[J].模糊系统与数学,2004,18(3):1-10.
    [25]裴道武.模糊推理的全蕴涵算法及其还原性[J].数学研究与评论,2004,24(2):359-368.
    [26]裴道武.FMT问题的两种三Ⅰ算法及其还原性[J].模糊系统与数学,2001,15(4):1-7.
    [27]Pei D W. Unified full implication algorithms of fuzzy reasoning [J]. Information Sciences,2008,178(2):520-530.
    [28]Liu H W, Wang G J. Several classes of implications based on binary aggregation operators on L* [J]模糊系统与数学,2007,21(3):45-53..
    [29]刘华文.基于全蕴涵思想的近似推理算法理论[D].西安:陕西师范大学,2008.
    [30]宋士吉,吴澄.模糊推理的反向三Ⅰ约束算法[J].自然科学进展,2002,12(1):95-100.
    [31]彭家寅.基于某些常见蕴涵算子的模糊推理全蕴涵三Ⅰ约束算法[J].自然科学进展,2005,15(5):539-546.
    [32]王国俊Fuzzy命题演算的一种形式演绎系统[J].科学通报,1997,42(10):1041-1045.
    [33]王国俊.非经典数里逻辑与近似推理(第二版)[M].北京:科学出版社,2008.
    [34]裴道武,王国俊.形式系统£*的扩张£n*及其完备性[J].中国科学,E辑,2003,33(4):350-356.
    [35]裴道武,王三民.形式系统£n*的完备性[J].高校应用数学学报,A辑,2001,16(3):253-262.
    [36]Hajek P. Metamathematics of Fuzzy Logic [M]. Lodon:Kluwer Academic,1998.
    [37]张兴芳,孟广武,张安英.蕴涵算子族及其应用[J].计算机学报,2007,30(3):448-453.
    [38]王国俊,兰蓉.系统中的广义重言式理论[J].陕西师范大学学报(自然科学版),2003,31(2):1-11.
    [39]王国俊.一类代数上的逻辑学(Ⅰ)[J].陕西师范大学学报(自然科学版),1997,25(1):1-8.
    [40]王国俊.一类代数上的逻辑学(Ⅱ)[J].陕西师范大学学报(自然科学版),1997,25(3):1-8.
    [41]王国俊.蕴涵格与Stone表现定理的推广[J].科学通报,1998,43(10):1033-1036.
    [42]王国俊,李璧镜Lukasiewicz n-值命题逻辑中公式的真度理论和极限定理[J].中国科学,E辑,2005,35(6):561-569.
    [43]Wang G J, Leung Y. Integrated semantics and logic metric spaces [J]. Fuzzy Sets and Systems,2003,136(1):71-91.
    [44]王国俊,王伟.逻辑度量空间[J].数学学报,2001,44(1):159-168.
    [45]Wang G J, She Y H. A topological characterization of consistency of logic theories in propositional logic [J]. Mathematical Logic Quarterly,2006,52(5):470-477.
    [46]王国俊,折延宏.二值命题逻辑中理论的发散性、相容性及其拓扑刻画[J].数学学报,2007,50(4):1-10.
    [47]李骏,黎锁平,夏亚峰.n-值Lukasiewicz逻辑中命题的真度理论[J].数学学报,2004,47(4):769-780.
    [48]李骏,王国俊.逻辑系统Ln*中命题的真度理论[J].中国科学,E辑,2006,36(6):631-643.
    [49]李骏,王国俊Godel n-值命题逻辑中命题的α-真度理论[J].软件学报,2007,18(1):33-39.
    [50]王国俊.适用于多种蕴涵算了的赋值空间上的测度与积分理论[J].中国科学,E辑,2001,31(1):42-50.
    [51]王国俊,宋庆燕,宋玉靖.布尔代数上的度量结构及其在命题逻辑中的应用[J].数学学报,2004,47(2):318-326.
    [52]王国俊.计量逻辑学(Ⅰ)[J].工程数学学报,2006,23(2):191-215.
    [53]Wang G J, Zhou H J. Introduction to Mathematical Logic and Resolution Principle [M]. Co-published by Oxford:Alpha Science International Limited and Beijing: Science Press,2009.
    [54]Wang G J, Zhou H J. Quantitative logic [J]. Information Sciences,2009,179(3): 226-247.
    [55]Wang G J, Zhang W X. Consistency degrees of finite theories in Lukasiewicz propositional logic [J]. Fuzzy Sets and Systems,2005,149(2):275-284.
    [56]Zhou X N, Wang G J. Consistency degrees of theories in some systems of proposi-tional fuzzy logic [J]. Fuzzy Sets and Systems,2005,152(3):321-331.
    [57]王庆平.n值标准逻辑系统中的随机化研究[J].计算机工程与应用,2010,46(30):16-19.
    [58]Zhou H J, Wang G J. A new theory consistency index based on deduction theorems in several logic systems [J]. Fuzzy Sets and Systems,2006,157(3):427-443.
    [59]Zhou H J, Wang G J. Generalized consistency degrees of theories w. r. t. formulas in several standard complete logic systems[J]. Fuzzy Sets and Systems,2006,157(15): 2058-2073.
    [60]Zhou H J, Wang G J. Consistency degrees of theories and methods of graded reasoning in n-valued R0-logic (NM-logic) [J]. International Journal of Approximate Reasoning,2006,43(2):117-132.
    [61]Zhou H J, Wang G J. Characterizations of maximal consistent theories in the formal deductive system (?)* (NM-logic) and Cantor Space [J]. Fuzzy Sets and Systems,2007, 158(23):2591-2604.
    [62]周红军Lukasiewicz模糊命题逻辑中极大相容理论的结构和拓扑刻画[J].陕西师范大学学报(自然科学版),2011,39(1):1-4.
    [63]王国俊,周红军.MV-代数的的度量化研究及其在Lukasiewicz命题逻辑中的应用[J].数学学报,2009,52(3):501-514.
    [64]韩邦合,王国俊.二值命题中命题的条件真度理论[J].模糊系统与数学,2007,21(4):9-15.
    [65]李立峰,王国俊Lukasiewicz命题集的积分真度、发散度与相容度的分布[J].陕西师范大学学报(自然科学版),2006,34(2):5-8.
    [66]王国俊,段巧林.模态逻辑中的(n)真度理论与和谐定理[J].中国科学,E辑,2009,39(2):234-245.
    [67]高菲菲,王国俊.多值命题逻辑中逻辑理论的拓扑刻画[J].模糊系统与数学,2008,22(2):24-30.
    [68]惠小静,王国俊.经典推理模式的随机化研究及其应用[J].中国科学,E辑,2007,37(6):801-812.
    [69]惠小静.三值R0命题逻辑系统的随机化[J].应用数学学报,2009,32(1):19-27.
    [70]惠小静,刘兴祥.三值Godel命题逻辑系统的随机化[J].模糊系统与数学,2009,23(4):1-7.
    [71]周红军.概率计量逻辑学[D].西安:陕西师范大学,2009.
    [72]折延宏.计量逻辑学与粗糙逻辑的计量化研究[D].西安:陕西师范大学,2010.
    [73]李璧镜.模态逻辑中若干问题的研究[D].西安:陕西师范大学,2010.
    [74]胡明娣.逻辑度量空间的内蕴结构的研究[D].西安:陕西师范大学,2011.
    [75]马丽娜.模糊推理方法及知识推理的计量化研究[D].西安:陕西师范大学,2011.
    [76]邹尚田.模糊模态逻辑系统的计量化研究[D].西安:陕西师范大学,2010.
    [77]马海斌.模态R0代数与逻辑系统Ln中若干性质的研究[D].西安:陕西师范大学,2010.
    [78]高香妮.命题逻辑系统中理论的真度概念及其应用[D].西安:陕西师范大学,2010.
    [79]惠小静.计量逻辑学及其随机化研究[D].西安:陕西师范大学,2008.
    [80]胡明娣,王国俊.模糊模态逻辑中的永真式与准永真式[J].电子学报,2009,37(11):2484-2488.
    [81]马丽娜,王国俊Lukasiewicz三值逻辑中命题的真度值之集在[0,1]上的分布[J].山东大学学报(理学版),2009,44(10):54-59.
    [82]王国俊,高香妮.命题逻辑系统中理论的真度概念及其应用[J].陕西师范大学学报(自然科学版),2009,37(5):1-6.
    [83]王国俊,时慧娴.n值逻辑系统Ln*中广义重言式的计量化研究[J].陕西师范大学学报(自然科学版),2009,37(2):1-12.
    [84]胡明娣,王国俊.经典逻辑度量空间上的反射变换[J].陕西师范大学学报(自然科学版),2009,37(6):1-4.
    [85]王国俊,时慧娴.格值模态命题逻辑及其完备性[J].中国科学信息科学,2011,41(1):66-76.
    [86]温巧燕,钮心忻,杨义先.现代密码学中的布尔函数[M].北京:科学出版社,2000.
    [87]Stanica P, Maitra S. Rotation Symmetric Boolean Functions-Count and Crypto-graphic Properties [J]. Discrete Applied Mathematics,2008,156(10):1567-1580.
    [88]Webster A F, Tavares S E. On the design of S-boxes [C]. CRYPTO'85, Lecture Notes in Computer Science,1986,218(Springer, Berlin):523-534.
    [89]Forre R. The strict avalanche criterion:Spectral properties of Boolean functions and an extended definition [C]. Advances in Cryptology, CRYPTO'88, Lecture Notes in Computer Science,1990,403(Springer, Berlin):450-468.
    [90]Cusick T W. Bounds on the number of functions satisfying the Strict Avalanche Criterion [J]. Information Processing Letters,1996,57:261-263.
    [91]Cusick T W. Boolean functions satisfying a higher order strict avalance criterion [C]. Eurocrypt'93, Lecture Notes in Computer Science,1994,765(Springer, Berlin) 102-117.
    [92]Lloyd S. Counting functions satisfying a higher order strict avalance criterion [C]. Advances in Cryptology, Eurocrypt'89, Lecture Notes in Computer Science,1990, 434(Springer, Berlin) 63-74.
    [93]Lloyd S. Characterising and counting functions satisfying the strict avalance crite-rion of order (n-3) [C]. Cryptography and Coding Ⅱ,1992(Clarendon Press, Oxford) 165-172.
    [94]Lloyd S. Counting binary functions with certain cryptographic properties [J]. J. Cryptology,1992,5:107-131.
    [95]O'Connor L. An upper bound on the number of functions satisfying the Strict Avalance Criterion [J]. Information Processing Letters,1994,52:325-327.
    [96]Castro J C H, Sierra J M, Seznec A, Izquierdo A, Ribagorda A. The strict avalance criterion randomness test [J]. Information Processing Letters,2005,68:1-7.
    [97]冯登国,肖国镇.布尔函数的线性结构的特征[J].电子科学学刊,1995,17(3):324-327.
    [98]吴文玲,肖国镇.关于布尔函数的线性结构[J].电子学报,1998,26(4):126-128.
    [99]冯登国,肖国镇.关于高度非线性平衡布尔函数的构造[J].电子学报,1996,24(4):95-97.
    [100]陈鲁生,徐汉良,符方伟.多输出布尔函数的相关免疫性[J].电子学报,2001,29(4):543-547.
    [101]孟庆树,张焕国.布尔函数线性等价的分析与应用[J].计算机学报,2004,27(11):1528-1532.
    [102]张文英,武传坤,于静之.密码学中布尔函数的零化子[J].电子学报,2006,34(1):51-54.
    [103]常祖领,柯品惠.高非线性度多输出布尔函数的构造[J].电子学报,2008,36(1):141-145.
    [104]王庆平,王国俊.计量逻辑学中的线性逻辑公式[J].陕西师范大学学报(自然科学版),2012,40(2):1-5.
    [105]马凤昌.斯特林公式的一种简易证法及其高精度误差估计公式[J].大学数学,2003,19(3):102-105.
    [106]Christel B, Joost-Pieter K. Principles of Model Checking[M]. London:The MIT Press Cambridge, Massachusetts,2008.
    [107]Pallab D, P.P. C, Jatindra K D, Sriram S. Min-max computation tree logic[J]. Artificial Intelligence,2001,127(1):137-162.
    [108]Franjo I, Zijiang Y, Malay K.G, Aarti G, Pranav A. Efficient SAT-based bounded model checking for software verification[J]. Theoretical Computer Science,2008, 404(3):256-274.
    [109]Stylianos B, Panagiotis K, Andrew P. An intruder model with message inspection for model checking security protocols[J]. Computer & Security,2010,29(1):16-34.
    [110]Olaf B, Bernhard S. Model checking the full modal mu-calculus for infinite sequential processes[J]. Theoretical Computer Science,1999,221(1-2):251-270.
    [111]Alessio L, Wojciech P, Bozena W. Bounded model checking for knowledge and real time[J]. Artificial Intelligence,2007,171(16-17):1011-1038.
    [112]Franco R, Alessio L. Automatic verification of multi-agent systems by model check-ing via ordered binary decision diagrams[J]. Journal of Applied Logic,2007,5(2): 235-251.
    [113]Pablo M-G, Ruben F-F, Jose-Luis S-R, Baltasar F-M. Model-checking for adventure video games[J]. Information and Software Technology,2009,51(3):564-580.
    [114]Luciano B, Vahid R, Adel T.R, Paola S. An efficient solution for model checking graph transformation systems [J]. Electronic Notes in Theoretical Computer Science, 2008,213(1):3-21.
    [115]Engelking R. General Topology[M]. Berlin:Heldmann Verlag,1978.
    [116]王庆平,王国俊.对称逻辑公式在L3*逻辑度量空间中的分布[J].计算机学报,2011,34(1):105-114.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700