Results 31 to 40 of about 1,889,843 (332)
A Categorical Construction for the Computational Definition of Vector Spaces [PDF]
Lambda-S\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {S}}$$\
Alejandro Díaz-Caro, Octavio Malherbe
semanticscholar +1 more source
Representation and application of Fuzzy soft sets in type-2 environment
This paper has represented a soft-set in the type-2 environment by its simplest form as an augmentation to soft-set theories. Furthermore, we have applied the type-2 fuzzy soft set(T2FSS) by using our most straightforward representation to find the ...
Biplab Paik, S. Mondal
semanticscholar +1 more source
Extracting discourse elements and annotating scientific documents using the SciAnnotDoc model: a use case in gender documents [PDF]
When scientists are searching for informa- tion, they generally have a precise objective in mind. Instead of looking for documents “about a topic T”, they try to answer specific questions such as finding the definition of a concept, finding results for a
De Ribaupierre, Hélène +1 more
core +2 more sources
Ideas for a Regulatory Definition of FinTech
Purpose: The aim of the paper is to develop the approach to a legal definition of FinTech. Design/Methodology/Approach: In this paper we evolve possible approaches of FinTech legal definition, investigate existing approaches at the international level ...
Ramona Rupeika-Apoga, E. Thalassinos
semanticscholar +1 more source
Design Principles of Learning Messages in E-Learning
Some things still need more attention in the content or messages contained in e-learning. Therefore, good message planning or arrangement is needed concerning the principles of learning message design.
Rama Faiz Pangestu, Herman Dwi Surjono
doaj +1 more source
A flexible mandatory access control policy for XML databases [PDF]
A flexible mandatory access control policy (MAC) for XML databases is presented in this paper. The label type and label access policy can be defined according to the requirements of applications.
Jin, R, Lü, K, Zhu, H
core +1 more source
Un protocole pour la modélisation du fonctionnement des stations d'épuration à boues activées
Le groupe de travail Good Modelling Practice de l'International Water Association (IWA) a analysé les pratiques et l'expérience en matière d'utilisation des outils de modélisation du fonctionnement des boues activées, et a élaboré une procédure afin de ...
S. GILLOT +6 more
doaj +1 more source
Secure Querying of Recursive XML Views: A Standard XPath-based Technique [PDF]
Most state-of-the art approaches for securing XML documents allow users to access data only through authorized views defined by annotating an XML grammar (e.g. DTD) with a collection of XPath expressions.
Imine, Abdessamad, Mahfoud, Houari
core +6 more sources
The article explores the issues of feasibility of conducting forensic examinations of materials and objects submitted to federal forensic science organizations of the Ministry of Justice of the Russian Federation if these materials and objects were ...
G. G. Bocharov
doaj +1 more source
XSIL: Extensible Scientific Interchange Language [PDF]
We motivate and define the XSIL language as a flexible, hierarchical, extensible transport language for scientific data objects. The entire object may be represented in the file, or there may be metadata in the XSIL file, with a powerful, fault-tolerant ...
Blackburn, Kent +3 more
core +1 more source

