Results 231 to 240 of about 4,554,873 (311)
Some of the next articles are maybe not open access.
Types ‘Char’ and ‘Boolean’. Boolean Operators
1983So far, we have formally introduced two types of data. Both of them are numerical: INTEGER and REAL. We have also discussed and demonstrated the output of strings (or, to be more specific, character strings) of which characters are the single elements (letters of the alphabet, decimal digits 0–9, punctuation marks, mathematical signs and other symbols).
openaire +1 more source
Functionally-Complete Boolean Logic in Real DRAM Chips: Experimental Characterization and Analysis
International Symposium on High-Performance Computer ArchitectureProcessing-using-DRAM (PuD) is an emerging paradigm that leverages the analog operational properties of DRAM circuitry to enable massively parallel in-DRAM computation.
˙Ismail Emir +10 more
semanticscholar +1 more source
Special operations on Boolean algebras
1996We give the basic definitions and facts about several operations on Boolean algebras which were not discussed in the Handbook.
openaire +1 more source
Mid-air modeling with Boolean operations in VR
IEEE Symposium on 3D User Interfaces, 2017Daniel Mendes +6 more
semanticscholar +1 more source
Accelerated robust Boolean operations based on hybrid representations
Computer Aided Geometric Design, 2018Bin Sheng +5 more
semanticscholar +1 more source
Topology optimization with closed B-splines and Boolean operations
, 2017Weihong Zhang +3 more
semanticscholar +1 more source
Demonstration of fault-tolerant universal quantum gate operations
Nature, 2022Ivan Pogorelov +2 more
exaly
Robust Boolean operations algorithm on regularized triangular mesh and implementation
Multimedia tools and applications, 2018Hongjuan Wang +4 more
semanticscholar +1 more source
Dynamic spatial progression of isolated lithium during battery operations
Nature, 2021Fang Liu, Yecun Wu, David T Boyle
exaly
Predicates A — Boolean operators
1990As already mentioned, the manipulation of predicates will be our main vehicle for program development. As such, manipulating them must become second nature. This comes from practice. Throughout this chapter there are theorems whose proofs are omitted. Although these proofs are exercises at chapter end, we highly recommend attacking them as they appear ...
openaire +1 more source

