Sciweavers

5344 search results - page 36 / 1069
» Privacy-Preserving Set Operations
Sort
View
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
14 years 3 months ago
Evolutionary computation methods for synchronization of effects based operations
Effects based operations (EBO) is a concept based on the premise that a desired strategic outcome can be achieved through synergistic, multiplicative, and cumulative application ...
Jeffrey P. Ridder
CVPR
2012
IEEE
12 years 9 days ago
Linear discriminative image processing operator analysis
In this paper, we propose a method to select a discriminative set of image processing operations for Linear Discriminant Analysis (LDA) as an application of the use of generating ...
Toru Tamaki, Bingzhi Yuan, Kengo Harada, Bisser Ra...
NMR
2004
Springer
14 years 3 months ago
Preliminary considerations on the modelling of belief change operators by metric spaces
In this paper, a possible worlds framework for representing general belief change operators is presented. In common with many approaches, an agent’s set of beliefs are specifie...
James P. Delgrande
IGPL
2008
67views more  IGPL 2008»
13 years 10 months ago
Complete Axiomatisations of Properties of Finite Sets
We study a logic whose formulae are interpreted as properties of a finite set over some universe. The language is propositional, with two unary operators inclusion and extension, ...
Thomas Ågotnes, Michal Walicki
ARSCOM
2005
67views more  ARSCOM 2005»
13 years 9 months ago
Avoidable Sets in The Bicyclic Inverse Semigroup
A subset U of a set S with a binary operation is called avoidable if S can be partitioned into two subsets A and B such that no element of U can be written as a product of two dis...
Nándor Sieben