Results 181 to 190 of about 133,438 (232)

Deep exploration of logical models of cell differentiation in human preimplantation embryos. [PDF]

open access: yesNPJ Syst Biol Appl
Bolteau M   +4 more
europepmc   +1 more source

BloomSec: Scalable and privacy-preserving searchable encryption for cloud environments. [PDF]

open access: yesPLoS One
Khan AN   +5 more
europepmc   +1 more source

Pseudo-Boolean Programming

Operations Research, 1969
Many a problem in combinatorial operations research (including, in particular, linear and nonlinear integer programming), can be formulated with the aid of real-valued functions with bivalent (0, 1) variables. This paper surveys the methods originated and developed by the authors for solving such problems.
Hammer, P. L., Rudeanu, S.
openaire   +2 more sources

Hardware verification, Boolean logic programming, Boolean functional programming

Proceedings of Tenth Annual IEEE Symposium on Logic in Computer Science, 2002
One of the main obstacles to automatic verification of finite state systems (FSSs) is state explosion. In this respect automatic verification of an FSS M using model checking and binary decision diagrams (BDDs) has an intrinsic limitation: no automatic global optimization of the verification task is possible until a BDD representation for M is ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy