Sciweavers

1076 search results - page 55 / 216
» Operations on proofs and labels
Sort
View
100
Voted
COMBINATORICS
2004
96views more  COMBINATORICS 2004»
15 years 18 days ago
Conjectured Combinatorial Models for the Hilbert Series of Generalized Diagonal Harmonics Modules
Haglund and Loehr previously conjectured two equivalent combinatorial formulas for the Hilbert series of the Garsia-Haiman diagonal harmonics modules. These formulas involve weigh...
Nicholas A. Loehr, Jeffrey B. Remmel
TNN
2010
154views Management» more  TNN 2010»
14 years 7 months ago
Discriminative semi-supervised feature selection via manifold regularization
We consider the problem of semi-supervised feature selection, where we are given a small amount of labeled examples and a large amount of unlabeled examples. Since a small number ...
Zenglin Xu, Irwin King, Michael R. Lyu, Rong Jin
CSFW
2000
IEEE
15 years 4 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
TIT
1998
100views more  TIT 1998»
15 years 12 days ago
Block-Coded PSK Modulation Using Two-Level Group Codes Over Dihedral Groups
—A length n group code over a group G is a subgroup of Gn under component-wise group operation. Group codes over dihedral groups DM, with 2M elements, that are two-level construc...
Jyoti Bali, B. Sundar Rajan
JSC
2006
71views more  JSC 2006»
15 years 22 days ago
Towards a clausal analysis of cut-elimination
In this paper we show that a large class of cut-elimination methods can be analyzed by clause terms representing sets of characteristic clauses extractable from the original proof...
Matthias Baaz, Alexander Leitsch