Sciweavers

2432 search results - page 130 / 487
» Cryptographic logical relations
Sort
View
90
Voted
COMBINATORICS
2002
87views more  COMBINATORICS 2002»
15 years 15 days ago
Map Genus, Forbidden Maps, and Monadic Second-Order Logic
A map is a graph equipped with a circular order of edges around each vertex. These circular orders represent local planar embeddings. The genus of a map is the minimal genus of an...
Bruno Courcelle, V. Dussaux
SEMWEB
2010
Springer
14 years 10 months ago
Representing and Querying Validity Time in RDF and OWL: A Logic-Based Approach
RDF(S) and OWL 2 currently support only static ontologies. In practice, however, the truth of statements often changes with time, and Semantic Web applications often need to repres...
Boris Motik
94
Voted
JMLR
2010
95views more  JMLR 2010»
14 years 7 months ago
Feature Extraction for Machine Learning: Logic-Probabilistic Approach
The paper analyzes peculiarities of preprocessing of learning data represented in object data bases constituted by multiple relational tables with ontology on top of it. Exactly s...
Vladimir Gorodetsky, Vladimir Samoilov
RULEML
2010
Springer
14 years 11 months ago
Superiority Based Revision of Defeasible Theories
We propose a systematic investigation on how to modify a preference relation in a defeasible logic theory to change the conclusions of the theory itself. We argue that the approach...
Guido Governatori, Francesco Olivieri, Simone Scan...
WOLLIC
2009
Springer
15 years 7 months ago
Classic-Like Analytic Tableaux for Finite-Valued Logics
The paper provides a recipe for adequately representing a very inclusive class of finite-valued logics by way of tableaux. The only requisite for applying the method is that the o...
Carlos Caleiro, João Marcos