期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Multivariate Vandermonde Determinants and General Birkhoff Interpolation 被引量:1
1
作者 朱平 《Northeastern Mathematical Journal》 CSCD 2005年第3期336-344,共9页
In this paper, we consider the Straight Line Type Node Configuration C (SLTNCC) in multivariate polynomial interpolation as the result of different kinds of transformations of lines (such as parallel translations, ... In this paper, we consider the Straight Line Type Node Configuration C (SLTNCC) in multivariate polynomial interpolation as the result of different kinds of transformations of lines (such as parallel translations, rotations). Corresponding to these transformations we define different kinds of interpolation problems for the SLTNCC. The expression of the confluent multivariate Vandermonde determinant of the coefficient matrix for each of these interpolation problems is obtained, and from this expression we conclude the related interpolation problem is unisolvent. Also, we give a kind of generalization of the SLTNCC in Section 5. As well, we obtain an expression of the interpolating polynomial for a kind of interpolation problem discussed in this paper. 展开更多
关键词 multivariate Vandermonde determinant multivariate polynomial interpolation Birkhoff interpolation
在线阅读 下载PDF
Formal Analysis on an Extended Security Model for Database Systems
2
作者 ZHU Hong ZHU Yi LI Chenyang SHI Jie FU Ge WANG Yuanzhen 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期519-522,共4页
In order to develop highly secure database systems to meet the requirements for class B2, the BLP (Bell-LaPudula) model is extended according to the features of database systems. A method for verifying security mode... In order to develop highly secure database systems to meet the requirements for class B2, the BLP (Bell-LaPudula) model is extended according to the features of database systems. A method for verifying security model for database systems is pro- posed. According to this method, an analysis by using Coq proof assistant to ensure the correctness and security of the extended model is introduced. Our formal security model has been verified secure. This work demonstrates that our verification method is effective and sufficient. 展开更多
关键词 Bell-LaPudula (BLP) model security model COQ integrity constraints
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部