Sciweavers

5344 search results - page 39 / 1069
» Privacy-Preserving Set Operations
Sort
View
VL
1996
IEEE
157views Visual Languages» more  VL 1996»
14 years 2 months ago
Visualizing Program Executions on Large Data Sets
Understanding and interpreting a large data source is an important but challenging operation in many technical disciplines. Computer visualization has become a valuable tool to he...
John T. Stasko, Jeyakumar Muthukumarasamy
FSS
2007
176views more  FSS 2007»
13 years 9 months ago
Set approximations in fuzzy formal concept analysis
Formal concept analysis and rough set theory are two important tools in knowledge representation and knowledge discovery in relational information systems. The purpose of this pap...
Ming-Wen Shao, Min Liu, Wen-Xiu Zhang
BPM
2009
Springer
113views Business» more  BPM 2009»
14 years 4 months ago
Set Algebra for Service Behavior: Applications and Constructions
Abstract. Compatibility of behavior, i.e. the correct ordering of messages, is one of the core aspects for the interaction between services as parts of an inter-organizational busi...
Kathrin Kaschner, Karsten Wolf
CAV
2006
Springer
141views Hardware» more  CAV 2006»
14 years 1 months ago
Formal Verification of a Lazy Concurrent List-Based Set Algorithm
We describe a formal verification of a recent concurrent list-based set algorithm due to Heller et al. The algorithm is optimistic: the add and remove operations traverse the list ...
Robert Colvin, Lindsay Groves, Victor Luchangco, M...
JAT
2010
80views more  JAT 2010»
13 years 8 months ago
The Bregman distance, approximate compactness and convexity of Chebyshev sets in Banach spaces
We present some sufficient conditions ensuring the upper semicontinuity and the continuity of the Bregman projection operator Π g C and the relative projection operator P g C in...
Chong Li, Wen Song, Jen-Chih Yao