We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Continuous lattices in formal concept analysis

    We introduce the notions of augmented formal contexts and generalized approximable concepts and show that all the generalized approximable concepts...

    Lingjuan Yao, Shengwen Wang, ... Mingjie Cai in Soft Computing
    Article 13 December 2023
  2. Online rule fusion model based on formal concept analysis

    A rule is an effective representation of knowledge in formal concept analysis (FCA), which can express the relations between concepts. One of the...

    **aohe Zhang, Degang Chen, Jusheng Mi in International Journal of Machine Learning and Cybernetics
    Article 11 March 2023
  3. Concept reduction in formal concept analysis based on representative concept matrix

    Reduction theory is an important topic in formal concept analysis, and the research of reduction theory generally focuses on attribute reduction....

    Siyu Zhao, Jianjun Qi, ... Ling Wei in International Journal of Machine Learning and Cybernetics
    Article 10 November 2022
  4. Formal Analysis of 5G EAP-TLS 1.3

    As the fifth-generation mobile network communication technology, 5G supports a wider range of application scenarios with faster speed and lower...
    Naiguang Zhu, Jie Xu, Baojiang Cui in Advances in Internet, Data & Web Technologies
    Conference paper 2024
  5. Revisiting data reduction for boolean matrix factorization algorithms based on formal concept analysis

    Boolean Matrix Factorization (BMF) helps unveil hidden patterns in boolean datasets and is a powerful tool in machine learning. However, when dealing...

    Lanzhen Yang, Eric C. C. Tsang, ... Jiaming Wu in International Journal of Machine Learning and Cybernetics
    Article 11 June 2024
  6. Formal Verification of a Dependable State Machine-Based Hardware Architecture for Safety-Critical Cyber-Physical Systems: Analysis, Design, and Implementation

    With the increasing interest in embedding digital devices in safety-critical cyber-physical systems (CPSs), such as industrial automation, aerospace,...

    Shawkat Sabah Khairullah in Journal of Electronic Testing
    Article 05 July 2024
  7. A representation of L-domain by formal concept analysis

    In this paper, we represent L-domains by means of formal concept analysis. Based on the attributive continuous formal contexts, we propose the...

    Shengwen Wang, Qingguo Li in Soft Computing
    Article 14 July 2022
  8. A formal security analysis of the fast authentication procedure based on the security context in 5G networks

    The security context, generally stored in the universal subscriber identity module card or the baseband chip, is the critical information applied by...

    Zhiwei Cui, Baojiang Cui, ... Junsong Fu in Soft Computing
    Article 10 January 2024
  9. Decision Implication-Based Knowledge Representation and Reasoning Within Incomplete Fuzzy Formal Context

    Formal Concept Analysis (FCA) is an order theory-based methodology employed for concept analysis and construction. Incomplete fuzzy formal context is...

    Article 30 April 2024
  10. A Tale of Two Automotive Security Services: A Formal Analysis

    Automotive system faced in the past decade an abundance of security services proposed by the scientific literature to strengthen their system...
    Conference paper 2024
  11. Non-Invasive Hardware Trojans Modeling and Insertion: A Formal Verification Approach

    In modern chip designs, shared resources are used extensively. Arbiters usage is crucial to settle conflicts when multiple requests compete for these...

    Hala Ibrahim, Haytham Azmi, ... Mona Safar in Journal of Electronic Testing
    Article Open access 01 February 2024
  12. Crafting OWL Ontologies from MongoDB: A Formal Concept Analysis (FCA) Approach

    Utilizing ontologies enables the sharing and reuse of knowledge within specific domains. However, develo** an ontology from scratch is a...
    Conference paper 2024
  13. Formal and Non-formal Education of Ukraine: Analysis of the Current State and the Role of Digitalization

    The paper offers an analysis of formal and non-formal components of education in the context of digitalization processes, focusing on indicators in...
    Maryna Nehrey, Nataliia Klymenko, Inna Kostenko in Advances in Computer Science for Engineering and Education VI
    Conference paper 2023
  14. A Comparative Analysis of Formal Storytelling Representation Models

    This paper presents a comparative analysis of the various formal models that can be used to represent a story. The analysis focuses on two types of...
    Luigi Colucci Cante, Beniamino Di Martino, Mariangela Graziano in Complex, Intelligent and Software Intensive Systems
    Conference paper 2023
  15. Verifying Collision Risk Estimation using Autonomous Driving Scenarios Derived from a Formal Model

    Autonomous driving technology is safety-critical and thus requires thorough validation. In particular, the probabilistic algorithms employed in...

    Jean-Baptiste Horel, Philippe Ledent, ... Wendelin Serwe in Journal of Intelligent & Robotic Systems
    Article 21 April 2023
  16. Characterizing Clarify and Reduce Method by Means of Left-Sided Formal Concept Analysis

    Multi-adjoint formal concept analysis is one relevant tool to manage information in databases. Reduce the size of a database is an important issue in...
    Chapter 2024
  17. Formal Stability Analysis of Two-Dimensional Digital Image Processing Filters

    There are several image processing applications that require to partition frequency components of images. This requirement is usually fulfilled by...
    Conference paper 2023
  18. Generalized three-way formal concept lattices

    In this paper, a concept generalized three-way concept lattices with respect to double formal contexts is introduced to support the idea of three-way...

    Lei Zhao, Ling-**a Lu, Wei Yao in Soft Computing
    Article 20 June 2023
  19. Formal Analysis of SA-TEK 3-Way Handshake Protocols

    IEEE 802.16 is the standard for broadband wireless access. The security sublayer is provided within IEEE 802.16 MAC layer for privacy and access...

    Sen Xu, Shuo Yang, Kefei Zhang in Journal of Shanghai Jiaotong University (Science)
    Article 02 August 2021
  20. Formal Security Analysis of Generalized Ultralightweight Mutual Authentication Protocol

    IoT network enables the connection of low-cost computing devices, sensors, and actuators to the internet via embedded devices for seamless...
    Muhammad Najam-ul-Islam, Madiha Khalid, Umar Mujahid in Proceedings of the Future Technologies Conference (FTC) 2023, Volume 2
    Conference paper 2023
Did you find what you were looking for? Share feedback.