Sciweavers

2125 search results - page 103 / 425
» Points with Type-2 Operations
Sort
View
JCM
2007
82views more  JCM 2007»
13 years 8 months ago
Secret Sharing Schemes With General Access Structure Based On MSPs
— In this paper we introduce two operations of access structure to build large monotone span programs MSPs from small MSPs. Furthermore, we point out a new method of constructing...
Jun Xu, Xiaomin Zha
CORR
2000
Springer
132views Education» more  CORR 2000»
13 years 8 months ago
Declarative Representation of Revision Strategies
Abstract. We introduce a nonmonotonic framework for belief revision in which reasoning about the reliability of different pieces of information based on meta-knowledge about the in...
Gerhard Brewka
MOR
2002
72views more  MOR 2002»
13 years 8 months ago
An Analytic Center Cutting Plane Method for Semidefinite Feasibility Problems
Semidefinite feasibility problems arise in many areas of operations research. The abstract form of these problems can be described as finding a point in a nonempty bounded convex b...
Jie Sun, Kim-Chuan Toh, Gongyun Zhao
TCOM
2010
114views more  TCOM 2010»
13 years 3 months ago
Concentric Permutation Source Codes
Permutation codes are a class of structured vector quantizers with a computationally-simple encoding procedure based on sorting the scalar components. Using a codebook comprising s...
Ha Q. Nguyen, Lav R. Varshney, Vivek K. Goyal
ICIP
2009
IEEE
14 years 10 months ago
Adaptivity And Group Invariance In Mathematical Morphology
The standard morphological operators are (i) defined on Euclidean space, (ii) based on structuring elements, and (iii) invariant with respect to translation. There are several way...