multiset
- 网络多重集合;多重集;多集合;多集;多重集合容器
-
The log format of this is the mul ( event multiset log ) .
该工具输入的日志格式是mul(事件多重集日志)。
-
However , the workflow mining algorithm proposed in this paper , i.e. , λ - algorithm , is not based on event trace , but event multiset which is called the mining algorithm based on event multiset .
然而,本文所提出的工作流挖掘算法不是基于事件轨迹的,而是基于事件多重集,称之为基于事件多重集的工作流挖掘算法(简称为λ-算法)。
-
This paper discusses basic theory , methods , application of the Multiset attack .
本文讨论了Multiset攻击的基本原理、方法以及它们在分组密码中的应用。
-
Theory 、 Method and Application of Multiset Attack
Multiset攻击的原理、方法及应用
-
The Caving Mechanical Analysis on Block Top Coal Cut By Multiset Fissures and its Application
多组裂隙切割时块体顶煤的冒落失稳力学分析及应用
-
Later Multiset attack is also used to attack block ciphers whose structure is not Square-like .
后来Multiset攻击又被应用到其它结构的分组密码上。
-
The model uses strongly typed multiset rewriting over firs order atomic formulas to express protocol actions and relies on a form of existential quantification to symbolically model the generation of fresh data .
MSR用基于一阶原子公式的类型化的多重集重写规则描述协议动作,用存在量词模拟新鲜数的产生,是一种精确、灵活的密码协议形式化模型。
-
We analyse the Square attack against Serpent which is bit-oriented cipher , and the result shows that Square attack on Serpent is weak , because the bit-oriented linear operations interrupt the rules of propagation for active and passive Multiset .
我们分析了对Serpent密码的Square攻击,Serpent密码的按比特线性混合运算打乱了所构造Multiset的传播路径,使得攻击只能进行到3轮Serpent密码。
-
In addition , the log scale growth of event multiset trends to a constant value , but the log scale growth based on event trace is linear . Hence , the former log scale is much smaller than the latter which further enhance the efficiency of A-algorithm .
除此之外,基于事件多重集的日志规模增长会趋于常量值,而基于事件轨迹的日志规模呈线性增长的,前者的日志规模远小于后者,这也进一步提高了λ-算法的挖掘效率。