نتایج جستجو برای: order preserving transformation
تعداد نتایج: 1147513 فیلتر نتایج به سال:
fuzzy order congruences play an important role in studying the categoricalproperties of fuzzy posets. in this paper, the correspondence between the fuzzyorder congruences and the fuzzy order-preserving maps is discussed. we focus onthe characterization of fuzzy order congruences on the fuzzy poset in terms ofthe fuzzy preorders containing the fuzzy partial order. at last, fuzzy completecongruen...
S. Janson [Poset limits and exchangeable random posets, Combinatorica 31 (2011), 529–563] defined limits of finite posets in parallel to the emerging theory of limits of dense graphs. We prove that each poset limit can be represented as a kernel on the unit interval with the standard order, thus answering an open question of Janson. We provide two proofs: real-analytic and combinatorial. The co...
Partial order based reduction techniques to reduce time and memory in model-checking procedures are becoming quite popular. Partial order reduction techniques exploit the independence of actions. Symmetry based reduction techniques exploit the inherent structure of the system to reduce the state space explored during model checking. We provide an abstract framework for combining partial-order a...
Laws of programming are important not only to define the axiomatic semantics of programming languages but also to assist in the software development process. In fact, these laws can be used as the foundation for informal development practices, such as refactorings, widely adopted due to modern methodologies, in special Extreme Programming. Although they have not been sufficiently studied yet, m...
Privacy has become an important issue in the progress of data mining techniques. Many laws are being enacted in various countries to protect the privacy of data. This privacy concern has been addressed by developing data mining techniques under a framework called privacy preserving data mining. Presently there are two main approaches popularly used -data perturbation and secure multiparty compu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید