Abstract. Processing on encrypted data is a subject of rich investigation. Several new and exotic encryption schemes, supporting a diverse set of features, have been developed for ...
Subdirect representations are investigated in varieties which are defined by operations of not necessarily finite arity. It is shown that, in this context, Birkhoff's Subdire...
Constraints that are defined by tables of allowed tuples of assignments are common in constraint programming. In this paper we present an approach to reformulating table constraint...