Sciweavers

5344 search results - page 106 / 1069
» Privacy-Preserving Set Operations
Sort
View
CADE
2006
Springer
16 years 2 months ago
Combining Type Theory and Untyped Set Theory
Abstract. We describe a second-order type theory with proof irrelevance. Within this framework, we give a representation of a form of Mac Lane set theory and discuss automated supp...
Chad E. Brown
ISVC
2005
Springer
15 years 8 months ago
Tool for Storm Analysis Using Multiple Data Sets
This note describes a web-based tool for storm analysis using multiple data sets developed for use in research of thunderstorms and forecasting applications. The tool was developed...
Robert M. Rabin, Tom Whittaker
RSFDGRC
2005
Springer
151views Data Mining» more  RSFDGRC 2005»
15 years 8 months ago
DIXER - Distributed Executor for Rough Set Exploration System
We present the Distributed Executor for RSES (DIXER) which is a supplementary software for the Rough Set Exploration System (RSES). It takes an advantage of grid computing paradigm...
Jan G. Bazan, Rafal Latkowski, Marcin S. Szczuka
DATE
2003
IEEE
85views Hardware» more  DATE 2003»
15 years 7 months ago
Set Manipulation with Boolean Functional Vectors for Symbolic Reachability Analysis
Symbolic techniques usually use characteristic functions for representing sets of states. Boolean functional vectors provide an alternate set representation which is suitable for ...
Amit Goel, Randal E. Bryant
TAPSOFT
1997
Springer
15 years 6 months ago
Inclusion Constraints over Non-empty Sets of Trees
Abstract. We present a new constraint system called INES. Its constraints are conjunctions of inclusions t1 t2 between rst-order terms (without set operators) which are interpreted...
Martin Müller, Joachim Niehren, Andreas Podel...