Sciweavers

5344 search results - page 214 / 1069
» Privacy-Preserving Set Operations
Sort
View
99
Voted
JOT
2008
62views more  JOT 2008»
15 years 3 months ago
An Increase In Value
Value is not always created as explicitly or as tangibly as with a product that benefits its user and its creator. Increasingly, value emerges from a set of activities and the kno...
John McGregor
129
Voted
ORDER
2006
105views more  ORDER 2006»
15 years 3 months ago
Descending Chains and Antichains of the Unary, Linear, and Monotone Subfunction Relations
The C-subfunction relations on the set of functions on a finite base set A defined by function classes C are examined. For certain clones C on A, it is determined whether the part...
Erkko Lehtonen
ENTCS
2002
129views more  ENTCS 2002»
15 years 3 months ago
Eliminating Proofs from Programs
This paper presents a step in the development of an operational approach to program extraction in type theory. In order to get a program from a lambda term, the logical parts need...
Femke van Raamsdonk, Paula Severi
143
Voted
EUSFLAT
2009
262views Fuzzy Logic» more  EUSFLAT 2009»
15 years 1 months ago
Type-2 Fuzzy Arithmetic using Alpha-planes
Abstract-- This paper examines type-2 fuzzy arithmetic using interval analysis. It relies heavily on alpha-cuts and alpha-planes. Furthermore, we discuss the use of quasi type-2 fu...
Hussam Hamrawi, Simon Coupland
128
Voted
ICRA
2009
IEEE
188views Robotics» more  ICRA 2009»
15 years 1 months ago
Mining GPS data for extracting significant places
This paper presents a fast and robust algorithm for extracting significant places from a set of raw GPS data points. Determining such places provides valuable context information ...
Gabriel Agamennoni, Juan Nieto, Eduardo Mario Nebo...