Results 21 to 30 of about 145,870 (284)
Explainable Artificial Intelligence Using Expressive Boolean Formulas
We propose and implement an interpretable machine learning classification model for Explainable AI (XAI) based on expressive Boolean formulas. Potential applications include credit scoring and diagnosis of medical conditions.
Gili Rosenberg +8 more
doaj +1 more source
On Tarski's axiomatic foundations of the calculus of relations [PDF]
It is shown that Tarski's set of ten axioms for the calculus of relations is independent in the sense that no axiom can be derived from the remaining axioms. It is also shown that by modifying one of Tarski's axioms slightly, and in fact by replacing the
Andréka, H. +3 more
core +3 more sources
Software Model Checking via Large-Block Encoding [PDF]
The construction and analysis of an abstract reachability tree (ART) are the basis for a successful method for software verification. The ART represents unwindings of the control-flow graph of the program.
Alberto Griggio +5 more
core +5 more sources
Implicit modeling of narrow vein type ore bodies based on Boolean combination constraints
In this paper, we implement an automatic modeling method for narrow vein type ore bodies based on Boolean combination constraints. Different from the direct interpolation approach, we construct the implicit functions of the hanging wall and foot wall ...
Deyun Zhong +3 more
doaj +1 more source
No-Cloning Theorem on Quantum Logics
This paper discusses the no-cloning theorem in a logico-algebraic approach. In this approach, an orthoalgebra is considered as a general structure for propositions in a physical theory.
Bennett C. H. +3 more
core +1 more source
Rough operations on Boolean algebras [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Qi, G., Liu, Weiru
openaire +1 more source
RG-Based (k, n)-Threshold Visual Cryptography with Abilities of OR and XOR Decryption
A (k, n) visual cryptography (VCS) is used to build a system for secret sharing. The system divides a secret image (S) into n shares and recovers S by stacking shares bigger than or equal to k, while shares below k provide no information about S.
Yu-Ru Lin, Justie Su-Tzu Juan
doaj +1 more source
We enumerate the inequivalent self-dual additive codes over GF(4) of blocklength n, thereby extending the sequence A090899 in The On-Line Encyclopedia of Integer Sequences from n = 9 to n = 12.
A. Bouchet +10 more
core +1 more source
Semigroups with if-then-else and halting programs [PDF]
The "if–then–else" construction is one of the most elementary programming commands, and its abstract laws have been widely studied, starting with McCarthy.
Jackson, Marcel, Stokes, Tim E.
core +2 more sources
Boolean differential operators
18 páginas, 1 ...
Hernández Encinas, Luis +1 more
openaire +2 more sources

