نتایج جستجو برای: order preserving transformation

تعداد نتایج: 1147513  

Journal: :iranian journal of fuzzy systems 2014
jing hao qingguo li lankun guo

fuzzy order congruences play an important role in studying the categoricalproperties of fuzzy posets. in this paper, the correspondence between the fuzzyorder congruences and the fuzzy order-preserving maps is discussed. we focus onthe characterization of fuzzy order congruences on the fuzzy poset in terms ofthe fuzzy preorders containing the fuzzy partial order. at last, fuzzy completecongruen...

2012
JAN HLADKÝ

S. Janson [Poset limits and exchangeable random posets, Combinatorica 31 (2011), 529–563] defined limits of finite posets in parallel to the emerging theory of limits of dense graphs. We prove that each poset limit can be represented as a kernel on the unit interval with the standard order, thus answering an open question of Janson. We provide two proofs: real-analytic and combinatorial. The co...

1997
Somesh Jha

Partial order based reduction techniques to reduce time and memory in model-checking procedures are becoming quite popular. Partial order reduction techniques exploit the independence of actions. Symmetry based reduction techniques exploit the inherent structure of the system to reduce the state space explored during model checking. We provide an abstract framework for combining partial-order a...

2004
Rohit Gheyi

Laws of programming are important not only to define the axiomatic semantics of programming languages but also to assist in the software development process. In fact, these laws can be used as the foundation for informal development practices, such as refactorings, widely adopted due to modern methodologies, in special Extreme Programming. Although they have not been sufficiently studied yet, m...

2010
R. Vidyabanu N. Nagaveni

Privacy has become an important issue in the progress of data mining techniques. Many laws are being enacted in various countries to protect the privacy of data. This privacy concern has been addressed by developing data mining techniques under a framework called privacy preserving data mining. Presently there are two main approaches popularly used -data perturbation and secure multiparty compu...

Journal: :IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2019

Journal: :Theoretical Computer Science 2001

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید