Results 21 to 30 of about 145,870 (284)

Explainable Artificial Intelligence Using Expressive Boolean Formulas

open access: yesMachine Learning and Knowledge Extraction, 2023
We propose and implement an interpretable machine learning classification model for Explainable AI (XAI) based on expressive Boolean formulas. Potential applications include credit scoring and diagnosis of medical conditions.
Gili Rosenberg   +8 more
doaj   +1 more source

On Tarski's axiomatic foundations of the calculus of relations [PDF]

open access: yes, 2016
It is shown that Tarski's set of ten axioms for the calculus of relations is independent in the sense that no axiom can be derived from the remaining axioms. It is also shown that by modifying one of Tarski's axioms slightly, and in fact by replacing the
Andréka, H.   +3 more
core   +3 more sources

Software Model Checking via Large-Block Encoding [PDF]

open access: yes, 2009
The construction and analysis of an abstract reachability tree (ART) are the basis for a successful method for software verification. The ART represents unwindings of the control-flow graph of the program.
Alberto Griggio   +5 more
core   +5 more sources

Implicit modeling of narrow vein type ore bodies based on Boolean combination constraints

open access: yesScientific Reports, 2022
In this paper, we implement an automatic modeling method for narrow vein type ore bodies based on Boolean combination constraints. Different from the direct interpolation approach, we construct the implicit functions of the hanging wall and foot wall ...
Deyun Zhong   +3 more
doaj   +1 more source

No-Cloning Theorem on Quantum Logics

open access: yes, 2009
This paper discusses the no-cloning theorem in a logico-algebraic approach. In this approach, an orthoalgebra is considered as a general structure for propositions in a physical theory.
Bennett C. H.   +3 more
core   +1 more source

Rough operations on Boolean algebras [PDF]

open access: yesInformation Sciences, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Qi, G., Liu, Weiru
openaire   +1 more source

RG-Based (k, n)-Threshold Visual Cryptography with Abilities of OR and XOR Decryption

open access: yesEngineering Proceedings, 2023
A (k, n) visual cryptography (VCS) is used to build a system for secret sharing. The system divides a secret image (S) into n shares and recovers S by stacking shares bigger than or equal to k, while shares below k provide no information about S.
Yu-Ru Lin, Justie Su-Tzu Juan
doaj   +1 more source

Spectral Orbits and Peak-to-Average Power Ratio of Boolean Functions with respect to the {I,H,N}^n Transform

open access: yes, 2005
We enumerate the inequivalent self-dual additive codes over GF(4) of blocklength n, thereby extending the sequence A090899 in The On-Line Encyclopedia of Integer Sequences from n = 9 to n = 12.
A. Bouchet   +10 more
core   +1 more source

Semigroups with if-then-else and halting programs [PDF]

open access: yes, 2009
The "if–then–else" construction is one of the most elementary programming commands, and its abstract laws have been widely studied, starting with McCarthy.
Jackson, Marcel, Stokes, Tim E.
core   +2 more sources

Boolean differential operators

open access: yesTURKISH JOURNAL OF MATHEMATICS, 2018
18 páginas, 1 ...
Hernández Encinas, Luis   +1 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy