Array Theory of Bounded Elements and its Applications View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2013-09-24

AUTHORS

Min Zhou, Fei He, Bow-Yaw Wang, Ming Gu, Jiaguang Sun

ABSTRACT

We investigate a first-order array theory of bounded elements. This theory has rich expressive power that allows free use of quantifiers. By reducing to weak second-order logic with one successor (WS1S), we show that the proposed array theory is decidable. Then two natural extensions to the new theory are shown to be undecidable. A translation-based decision procedure for this theory is implemented, and is shown applicable to program verification. More... »

PAGES

379-405

References to SciGraph publications

  • 1998. Mona & Fido: The logic-automaton connection in practice in COMPUTER SCIENCE LOGIC
  • 2010. On Array Theory of Bounded Elements in COMPUTER AIDED VERIFICATION
  • 2005. What’s Decidable About Arrays? in VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION
  • 2008. A Logic of Singly Indexed Arrays in LOGIC FOR PROGRAMMING, ARTIFICIAL INTELLIGENCE, AND REASONING
  • 2009. Complete Instantiation for Quantified Formulas in Satisfiabiliby Modulo Theories in COMPUTER AIDED VERIFICATION
  • 2007-01-01. Solving Quantified Verification Conditions Using Satisfiability Modulo Theories in AUTOMATED DEDUCTION – CADE-21
  • 2007. Efficient E-Matching for SMT Solvers in AUTOMATED DEDUCTION – CADE-21
  • 1998. Solving Bit-Vector Equations in FORMAL METHODS IN COMPUTER-AIDED DESIGN
  • 2010. What’s Decidable about Sequences? in AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS
  • 1995. Mona: Monadic second-order logic in practice in TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS
  • 2009. Automatic Verification of Integer Array Programs in COMPUTER AIDED VERIFICATION
  • 2009. Boolector: An Efficient SMT Solver for Bit-Vectors and Arrays in TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS
  • 2007-01-01. A Decision Procedure for Bit-Vectors and Arrays in COMPUTER AIDED VERIFICATION
  • 2007-07-27. Decision procedures for extensions of the theory of arrays in ANNALS OF MATHEMATICS AND ARTIFICIAL INTELLIGENCE
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s10817-013-9293-6

    DOI

    http://dx.doi.org/10.1007/s10817-013-9293-6

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1008522497


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Artificial Intelligence and Image Processing", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Key Laboratory for Information System Security, MOE, Beijing, China", 
              "id": "http://www.grid.ac/institutes/None", 
              "name": [
                "School of Software, Tsinghua University, 100084, Beijing, China", 
                "Tsinghua National Laboratory for Information Science and Technology, Beijing, China", 
                "Key Laboratory for Information System Security, MOE, Beijing, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Zhou", 
            "givenName": "Min", 
            "id": "sg:person.014422652355.26", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014422652355.26"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Key Laboratory for Information System Security, MOE, Beijing, China", 
              "id": "http://www.grid.ac/institutes/None", 
              "name": [
                "School of Software, Tsinghua University, 100084, Beijing, China", 
                "Tsinghua National Laboratory for Information Science and Technology, Beijing, China", 
                "Key Laboratory for Information System Security, MOE, Beijing, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "He", 
            "givenName": "Fei", 
            "id": "sg:person.012660400766.65", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012660400766.65"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Academia Sinica, Taipei, Taiwan", 
              "id": "http://www.grid.ac/institutes/grid.28665.3f", 
              "name": [
                "Academia Sinica, Taipei, Taiwan"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Wang", 
            "givenName": "Bow-Yaw", 
            "id": "sg:person.014612100753.88", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014612100753.88"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Key Laboratory for Information System Security, MOE, Beijing, China", 
              "id": "http://www.grid.ac/institutes/None", 
              "name": [
                "School of Software, Tsinghua University, 100084, Beijing, China", 
                "Tsinghua National Laboratory for Information Science and Technology, Beijing, China", 
                "Key Laboratory for Information System Security, MOE, Beijing, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Gu", 
            "givenName": "Ming", 
            "id": "sg:person.015646302766.82", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015646302766.82"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Key Laboratory for Information System Security, MOE, Beijing, China", 
              "id": "http://www.grid.ac/institutes/None", 
              "name": [
                "School of Software, Tsinghua University, 100084, Beijing, China", 
                "Tsinghua National Laboratory for Information Science and Technology, Beijing, China", 
                "Key Laboratory for Information System Security, MOE, Beijing, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Sun", 
            "givenName": "Jiaguang", 
            "id": "sg:person.011411464635.59", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011411464635.59"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-642-00768-2_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000693928", 
              "https://doi.org/10.1007/978-3-642-00768-2_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14295-6_50", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027510605", 
              "https://doi.org/10.1007/978-3-642-14295-6_50"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-89439-1_39", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003520690", 
              "https://doi.org/10.1007/978-3-540-89439-1_39"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-02658-4_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003026727", 
              "https://doi.org/10.1007/978-3-642-02658-4_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-73595-3_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010611510", 
              "https://doi.org/10.1007/978-3-540-73595-3_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-49519-3_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029813814", 
              "https://doi.org/10.1007/3-540-49519-3_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-15643-4_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015762979", 
              "https://doi.org/10.1007/978-3-642-15643-4_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-73595-3_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035232633", 
              "https://doi.org/10.1007/978-3-540-73595-3_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-02658-4_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1012889754", 
              "https://doi.org/10.1007/978-3-642-02658-4_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10472-007-9078-x", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014137598", 
              "https://doi.org/10.1007/s10472-007-9078-x"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-73368-3_52", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1019243302", 
              "https://doi.org/10.1007/978-3-540-73368-3_52"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-60630-0_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1049101012", 
              "https://doi.org/10.1007/3-540-60630-0_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0028022", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002164856", 
              "https://doi.org/10.1007/bfb0028022"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11609773_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052837922", 
              "https://doi.org/10.1007/11609773_28"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2013-09-24", 
        "datePublishedReg": "2013-09-24", 
        "description": "We investigate a first-order array theory of bounded elements. This theory has rich expressive power that allows free use of quantifiers. By reducing to weak second-order logic with one successor (WS1S), we show that the proposed array theory is decidable. Then two natural extensions to the new theory are shown to be undecidable. A translation-based decision procedure for this theory is implemented, and is shown applicable to program verification.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s10817-013-9293-6", 
        "inLanguage": "en", 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1136522", 
            "issn": [
              "0168-7433", 
              "1573-0670"
            ], 
            "name": "Journal of Automated Reasoning", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "4", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "52"
          }
        ], 
        "keywords": [
          "rich expressive power", 
          "expressive power", 
          "decision procedure", 
          "second-order logic", 
          "free use", 
          "natural extension", 
          "weak second-order logic", 
          "verification", 
          "logic", 
          "applications", 
          "quantifiers", 
          "extension", 
          "elements", 
          "array theory", 
          "power", 
          "theory", 
          "new theory", 
          "successor", 
          "use", 
          "procedure", 
          "first-order array theory", 
          "translation-based decision procedure", 
          "Bounded Elements"
        ], 
        "name": "Array Theory of Bounded Elements and its Applications", 
        "pagination": "379-405", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1008522497"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s10817-013-9293-6"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s10817-013-9293-6", 
          "https://app.dimensions.ai/details/publication/pub.1008522497"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-01-01T18:29", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/article/article_587.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s10817-013-9293-6"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s10817-013-9293-6'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s10817-013-9293-6'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s10817-013-9293-6'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s10817-013-9293-6'


     

    This table displays all metadata directly associated to this object as RDF triples.

    170 TRIPLES      22 PREDICATES      62 URIs      40 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s10817-013-9293-6 schema:about anzsrc-for:08
    2 anzsrc-for:0801
    3 schema:author N17aa1ac161b34da38a3270bf50e19861
    4 schema:citation sg:pub.10.1007/11609773_28
    5 sg:pub.10.1007/3-540-49519-3_4
    6 sg:pub.10.1007/3-540-60630-0_5
    7 sg:pub.10.1007/978-3-540-73368-3_52
    8 sg:pub.10.1007/978-3-540-73595-3_12
    9 sg:pub.10.1007/978-3-540-73595-3_13
    10 sg:pub.10.1007/978-3-540-89439-1_39
    11 sg:pub.10.1007/978-3-642-00768-2_16
    12 sg:pub.10.1007/978-3-642-02658-4_15
    13 sg:pub.10.1007/978-3-642-02658-4_25
    14 sg:pub.10.1007/978-3-642-14295-6_50
    15 sg:pub.10.1007/978-3-642-15643-4_11
    16 sg:pub.10.1007/bfb0028022
    17 sg:pub.10.1007/s10472-007-9078-x
    18 schema:datePublished 2013-09-24
    19 schema:datePublishedReg 2013-09-24
    20 schema:description We investigate a first-order array theory of bounded elements. This theory has rich expressive power that allows free use of quantifiers. By reducing to weak second-order logic with one successor (WS1S), we show that the proposed array theory is decidable. Then two natural extensions to the new theory are shown to be undecidable. A translation-based decision procedure for this theory is implemented, and is shown applicable to program verification.
    21 schema:genre article
    22 schema:inLanguage en
    23 schema:isAccessibleForFree false
    24 schema:isPartOf N775eee0a14c241df83c83068df320fb9
    25 Nd14821d33df84b2fa62beccca90b099b
    26 sg:journal.1136522
    27 schema:keywords Bounded Elements
    28 applications
    29 array theory
    30 decision procedure
    31 elements
    32 expressive power
    33 extension
    34 first-order array theory
    35 free use
    36 logic
    37 natural extension
    38 new theory
    39 power
    40 procedure
    41 quantifiers
    42 rich expressive power
    43 second-order logic
    44 successor
    45 theory
    46 translation-based decision procedure
    47 use
    48 verification
    49 weak second-order logic
    50 schema:name Array Theory of Bounded Elements and its Applications
    51 schema:pagination 379-405
    52 schema:productId N07936c268c0d44729f58603a3b4619f9
    53 Nf0f4c923b6684153888e46a4c36068fc
    54 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008522497
    55 https://doi.org/10.1007/s10817-013-9293-6
    56 schema:sdDatePublished 2022-01-01T18:29
    57 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    58 schema:sdPublisher N188375bb75294e7f8ac3821f6c23d33a
    59 schema:url https://doi.org/10.1007/s10817-013-9293-6
    60 sgo:license sg:explorer/license/
    61 sgo:sdDataset articles
    62 rdf:type schema:ScholarlyArticle
    63 N07936c268c0d44729f58603a3b4619f9 schema:name dimensions_id
    64 schema:value pub.1008522497
    65 rdf:type schema:PropertyValue
    66 N17aa1ac161b34da38a3270bf50e19861 rdf:first sg:person.014422652355.26
    67 rdf:rest N37818be19cd24bb1acd3d1ad0af6d52a
    68 N188375bb75294e7f8ac3821f6c23d33a schema:name Springer Nature - SN SciGraph project
    69 rdf:type schema:Organization
    70 N37818be19cd24bb1acd3d1ad0af6d52a rdf:first sg:person.012660400766.65
    71 rdf:rest Nfe7564f285394093965032878351ceda
    72 N775eee0a14c241df83c83068df320fb9 schema:issueNumber 4
    73 rdf:type schema:PublicationIssue
    74 N7fcba0f297b948168929a0a14d98f3bf rdf:first sg:person.015646302766.82
    75 rdf:rest Na27eb49ecdec43429c2942bc68841769
    76 Na27eb49ecdec43429c2942bc68841769 rdf:first sg:person.011411464635.59
    77 rdf:rest rdf:nil
    78 Nd14821d33df84b2fa62beccca90b099b schema:volumeNumber 52
    79 rdf:type schema:PublicationVolume
    80 Nf0f4c923b6684153888e46a4c36068fc schema:name doi
    81 schema:value 10.1007/s10817-013-9293-6
    82 rdf:type schema:PropertyValue
    83 Nfe7564f285394093965032878351ceda rdf:first sg:person.014612100753.88
    84 rdf:rest N7fcba0f297b948168929a0a14d98f3bf
    85 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    86 schema:name Information and Computing Sciences
    87 rdf:type schema:DefinedTerm
    88 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
    89 schema:name Artificial Intelligence and Image Processing
    90 rdf:type schema:DefinedTerm
    91 sg:journal.1136522 schema:issn 0168-7433
    92 1573-0670
    93 schema:name Journal of Automated Reasoning
    94 schema:publisher Springer Nature
    95 rdf:type schema:Periodical
    96 sg:person.011411464635.59 schema:affiliation grid-institutes:None
    97 schema:familyName Sun
    98 schema:givenName Jiaguang
    99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011411464635.59
    100 rdf:type schema:Person
    101 sg:person.012660400766.65 schema:affiliation grid-institutes:None
    102 schema:familyName He
    103 schema:givenName Fei
    104 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012660400766.65
    105 rdf:type schema:Person
    106 sg:person.014422652355.26 schema:affiliation grid-institutes:None
    107 schema:familyName Zhou
    108 schema:givenName Min
    109 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014422652355.26
    110 rdf:type schema:Person
    111 sg:person.014612100753.88 schema:affiliation grid-institutes:grid.28665.3f
    112 schema:familyName Wang
    113 schema:givenName Bow-Yaw
    114 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014612100753.88
    115 rdf:type schema:Person
    116 sg:person.015646302766.82 schema:affiliation grid-institutes:None
    117 schema:familyName Gu
    118 schema:givenName Ming
    119 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015646302766.82
    120 rdf:type schema:Person
    121 sg:pub.10.1007/11609773_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052837922
    122 https://doi.org/10.1007/11609773_28
    123 rdf:type schema:CreativeWork
    124 sg:pub.10.1007/3-540-49519-3_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029813814
    125 https://doi.org/10.1007/3-540-49519-3_4
    126 rdf:type schema:CreativeWork
    127 sg:pub.10.1007/3-540-60630-0_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049101012
    128 https://doi.org/10.1007/3-540-60630-0_5
    129 rdf:type schema:CreativeWork
    130 sg:pub.10.1007/978-3-540-73368-3_52 schema:sameAs https://app.dimensions.ai/details/publication/pub.1019243302
    131 https://doi.org/10.1007/978-3-540-73368-3_52
    132 rdf:type schema:CreativeWork
    133 sg:pub.10.1007/978-3-540-73595-3_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010611510
    134 https://doi.org/10.1007/978-3-540-73595-3_12
    135 rdf:type schema:CreativeWork
    136 sg:pub.10.1007/978-3-540-73595-3_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035232633
    137 https://doi.org/10.1007/978-3-540-73595-3_13
    138 rdf:type schema:CreativeWork
    139 sg:pub.10.1007/978-3-540-89439-1_39 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003520690
    140 https://doi.org/10.1007/978-3-540-89439-1_39
    141 rdf:type schema:CreativeWork
    142 sg:pub.10.1007/978-3-642-00768-2_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000693928
    143 https://doi.org/10.1007/978-3-642-00768-2_16
    144 rdf:type schema:CreativeWork
    145 sg:pub.10.1007/978-3-642-02658-4_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003026727
    146 https://doi.org/10.1007/978-3-642-02658-4_15
    147 rdf:type schema:CreativeWork
    148 sg:pub.10.1007/978-3-642-02658-4_25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012889754
    149 https://doi.org/10.1007/978-3-642-02658-4_25
    150 rdf:type schema:CreativeWork
    151 sg:pub.10.1007/978-3-642-14295-6_50 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027510605
    152 https://doi.org/10.1007/978-3-642-14295-6_50
    153 rdf:type schema:CreativeWork
    154 sg:pub.10.1007/978-3-642-15643-4_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015762979
    155 https://doi.org/10.1007/978-3-642-15643-4_11
    156 rdf:type schema:CreativeWork
    157 sg:pub.10.1007/bfb0028022 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002164856
    158 https://doi.org/10.1007/bfb0028022
    159 rdf:type schema:CreativeWork
    160 sg:pub.10.1007/s10472-007-9078-x schema:sameAs https://app.dimensions.ai/details/publication/pub.1014137598
    161 https://doi.org/10.1007/s10472-007-9078-x
    162 rdf:type schema:CreativeWork
    163 grid-institutes:None schema:alternateName Key Laboratory for Information System Security, MOE, Beijing, China
    164 schema:name Key Laboratory for Information System Security, MOE, Beijing, China
    165 School of Software, Tsinghua University, 100084, Beijing, China
    166 Tsinghua National Laboratory for Information Science and Technology, Beijing, China
    167 rdf:type schema:Organization
    168 grid-institutes:grid.28665.3f schema:alternateName Academia Sinica, Taipei, Taiwan
    169 schema:name Academia Sinica, Taipei, Taiwan
    170 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...