Sciweavers

184 search results - page 26 / 37
» Horn-Representation of a Concept Lattice
Sort
View
ICCS
1998
Springer
15 years 1 months ago
Handling Specification Knowledge Evolution Using Context Lattices
Internet-based information technologies have considerable potential for improving collaboration in professional communities. In this paper, we explain the concept of user-driven sp...
Aldo de Moor, Guy W. Mineau
79
Voted
IFSA
2003
Springer
89views Fuzzy Logic» more  IFSA 2003»
15 years 2 months ago
Lattice Fuzzy Signal Operators and Generalized Image Gradients
In this paper we use concepts from the lattice-based theory of morphological operators and fuzzy sets to develop generalized lattice image operators that are nonlinear convolutions...
Petros Maragos, Vassilis Tzouvaras, Giorgos B. Sta...
88
Voted
ICIP
2001
IEEE
15 years 11 months ago
Synthesis and applications of lattice image operators based on fuzzy norms
In this paper we use concepts from the lattice-based theory of morphological operators and fuzzy sets to develop generalized lattice image operators that can be expressed as nonli...
Petros Maragos, Vassilis Tzouvaras, Giorgos B. Sta...
JUCS
2010
109views more  JUCS 2010»
14 years 4 months ago
Semantics of Query-Driven Communication of Exact Values
: We address the question of how to communicate among distributed processes values such as real numbers, continuous functions and geometrical solids with arbitrary precision, yet e...
Michal Konecný, Amin Farjudian
ASIACRYPT
2011
Springer
13 years 9 months ago
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
A cryptographic assumption is the (unproven) mathematical statement that a certain computational problem (e.g. factoring integers) is computationally hard. The leakage-resilience l...
Divesh Aggarwal, Ueli Maurer