Sciweavers

5344 search results - page 140 / 1069
» Privacy-Preserving Set Operations
Sort
View
134
Voted
VLDB
1990
ACM
166views Database» more  VLDB 1990»
15 years 7 months ago
The Tree Quorum Protocol: An Efficient Approach for Managing Replicated Data
In this paper, we present an efficient algorithm for managing replicated data. We impose a logical tree structure on the set of copies of an object. In a failurefree environment t...
Divyakant Agrawal, Amr El Abbadi
AAAI
2008
15 years 5 months ago
A Semantic Approach for Iterated Revision in Possibilistic Logic
In this paper, we propose a new approach for iterated revision in possibilistic logic by applying a one-step revision operator. We first argue that the set of KM postulates for re...
Guilin Qi
JSYML
2000
97views more  JSYML 2000»
15 years 3 months ago
Weakly Algebraizable Logics
The class of weakly algebrizable logics is defined as the class of logics having monotonic and injective Leibniz operator. We show that "monotonicity" cannot be discarde...
Janusz Czelakowski, Ramon Jansana
ICNC
2005
Springer
15 years 8 months ago
Credit Rating Analysis with AFS Fuzzy Logic
In this paper, we propose a new machine learning approach based on AFS (Axiomatic Fuzzy Sets) fuzzy logic, in attempt to provide a better model with interpretability. First, we wil...
Xiaodong Liu, Wanquan Liu
ECAI
2010
Springer
15 years 4 months ago
Majority Merging: from Boolean Spaces to Affine Spaces
Abstract. This paper is centered on the problem of merging (possibly conflicting) information coming from different sources. Though this problem has attracted much attention in pro...
Jean-François Condotta, Souhila Kaci, Pierr...