Sciweavers

5344 search results - page 22 / 1069
» Privacy-Preserving Set Operations
Sort
View
CL
2000
Springer
14 years 2 months ago
Dominance Constraints with Set Operators
Abstract. Dominance constraints are widely used in computational linguistics as a language for talking and reasoning about trees. In this paper, we extend dominance constraints by ...
Denys Duchier, Joachim Niehren
EUSFLAT
2007
13 years 11 months ago
Power Sets and Implication Operators Revisited: A Retrospective Look at the Foundational and Conceptual Issues in Bandler and Ko
In our case study we look at one of the early papers that interrelates the concept of fuzzy set inclusion, power set and many-valued implication operators, namely the paper of Ban...
Ladislav J. Kohout
ENTCS
2008
87views more  ENTCS 2008»
13 years 10 months ago
Checking Emptiness of Non-Deterministic Regular Types with Set Operators
An algorithm to decide the emptiness of a regular type expression with set operators given a set of parameterized type definitions is presented. The algorithm generalizes previous...
Lunjin Lu
ISPAN
2002
IEEE
14 years 2 months ago
On Locality of Dominating Set in Ad Hoc Networks with Switch-On/Off Operations
Routing based on a connected dominating set is a promising approach, where the search space for a route is reduced to the hosts in the set. A set is dominating if all the hosts in...
Jie Wu, Fei Dai
ISCA
2000
IEEE
78views Hardware» more  ISCA 2000»
14 years 1 months ago
Vector instruction set support for conditional operations
Vector instruction sets are receiving renewed interest because of their applicability to multimedia. Current multimedia instruction sets use short vectors with SIMD implementation...
James E. Smith, Greg Faanes, Rabin A. Sugumar