Sciweavers

114 search results - page 9 / 23
» Some Notes on Pseudo-closed Sets
Sort
View
CORR
2010
Springer
90views Education» more  CORR 2010»
15 years 13 days ago
Table manipulation in simplicial databases
In [Spi], we developed a category of databases in which the schema of a database is represented as a simplicial set. Each simplex corresponds to a table in the database. There, our...
David I. Spivak
DM
2008
69views more  DM 2008»
15 years 13 days ago
Connectedness of the graph of vertex-colourings
For a positive integer k and a graph G, the k-colour graph of G, Ck(G), is the graph that has the proper k-vertex-colourings of G as its vertex set, and two k-colourings are joine...
Luis Cereceda, Jan van den Heuvel, Matthew Johnson
IPL
2000
101views more  IPL 2000»
15 years 4 days ago
Visual cryptography for grey level images
Visual cryptography is a cryptographic paradigm introduced by Naor and Shamir [Lecture Notes in Comput. Sci., Vol. 950, Springer, Berlin, 1995, p. 1]. Some predefined set of parti...
Carlo Blundo, Alfredo De Santis, Moni Naor
AAAI
2008
15 years 2 months ago
Parallel Belief Revision
A recalcitrant problem in approaches to iterated belief revision is that, after first revising by a formula and then by a formula that is inconsistent with the first formula, all ...
James P. Delgrande, Yi Jin
177
Voted
ICDE
2012
IEEE
252views Database» more  ICDE 2012»
13 years 2 months ago
Approximate String Membership Checking: A Multiple Filter, Optimization-Based Approach
— We consider the approximate string membership checking (ASMC) problem of extracting all the strings or substrings in a document that approximately match some string in a given ...
Chong Sun, Jeffrey F. Naughton, Siddharth Barman