The Caving Mechanical Analysis on Block Top Coal Cut By Multiset Fissures and its Application 多组裂隙切割时块体顶煤的冒落失稳力学分析及应用
This paper discusses basic theory, methods, application of the Multiset attack. 本文讨论了Multiset攻击的基本原理、方法以及它们在分组密码中的应用。
Theory 、 Method and Application of Multiset Attack Multiset攻击的原理、方法及应用
The model uses strongly typed multiset rewriting over firs order atomic formulas to express protocol actions and relies on a form of existential quantification to symbolically model the generation of fresh data. MSR用基于一阶原子公式的类型化的多重集重写规则描述协议动作,用存在量词模拟新鲜数的产生,是一种精确、灵活的密码协议形式化模型。
However, the workflow mining algorithm proposed in this paper, i.e., λ-algorithm, is not based on event trace, but event multiset which is called the mining algorithm based on event multiset. 然而,本文所提出的工作流挖掘算法不是基于事件轨迹的,而是基于事件多重集,称之为基于事件多重集的工作流挖掘算法(简称为λ-算法)。
In addition, the log scale growth of event multiset trends to a constant value, but the log scale growth based on event trace is linear. Hence, the former log scale is much smaller than the latter which further enhance the efficiency of A-algorithm. 除此之外,基于事件多重集的日志规模增长会趋于常量值,而基于事件轨迹的日志规模呈线性增长的,前者的日志规模远小于后者,这也进一步提高了λ-算法的挖掘效率。
The log format of this is the mul ( event multiset log). 该工具输入的日志格式是mul(事件多重集日志)。