Sciweavers

2131 search results - page 36 / 427
» Immunity for Closed Sets
Sort
View
RSCTC
2000
Springer
113views Fuzzy Logic» more  RSCTC 2000»
14 years 2 months ago
Approximation of Information Granule Sets
The aim of the paper is to present basic notions related to granular computing, namely the information granule syntax and semantics as well as the inclusion and closeness (similari...
Andrzej Skowron, Jaroslaw Stepaniuk, James F. Pete...
APPML
2010
91views more  APPML 2010»
13 years 11 months ago
Certificates of convexity for basic semi-algebraic sets
We provide two certificates of convexity for arbitrary basic closed semi-algebraic sets of Rn. The first one is based on a necessary and sufficient condition whereas the second one...
Jean B. Lasserre
ALGORITHMICA
2006
161views more  ALGORITHMICA 2006»
13 years 11 months ago
The Expected Size of the Rule k Dominating Set
Dai, Li, and Wu proposed Rule k, a localized approximation algorithm that attempts to find a small connected dominating set in a graph. In this paper we consider the "average...
Jennie C. Hansen, Eric Schmutz, Li Sheng
SIGMOD
2002
ACM
132views Database» more  SIGMOD 2002»
14 years 11 months ago
Clustering by pattern similarity in large data sets
Clustering is the process of grouping a set of objects into classes of similar objects. Although definitions of similarity vary from one clustering model to another, in most of th...
Haixun Wang, Wei Wang 0010, Jiong Yang, Philip S. ...
DM
2007
112views more  DM 2007»
13 years 11 months ago
Affine blocking sets, three-dimensional codes and the Griesmer bound
We construct families of three-dimensional linear codes that attain the Griesmer bound and give a probablistic construction of linear codes that are close to the Griesmer bound. Al...
Simeon Ball, Elisa Montanucci