5,579 resources related to Set theory
- Topics related to Set theory
- IEEE Organizations related to Set theory
- Conferences related to Set theory
- Periodicals related to Set theory
- Most published Xplore authors for Set theory
2013 12th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)
Cognitive Informatics (CI) is a cutting-edge and multidisciplinary research field that tackles the fundamental problems shared by modern informatics, computing, AI, cybernetics, computational intelligence, cognitive science, intelligence science, neuropsychology, brain science, systems science, software engineering, knowledge engineering, cognitive robots, scientific philosophy, cognitive linguistics, life sciences, and cognitive computing.
2012 IEEE International Conference on Granular Computing (GrC-2012)
IEEE GrC 2012 will continue to address the issues related to Granular Computing and its applications. IEEE GrC 2012 will provide researchers from universities, laboratories and industry to present state-of-the-art research results and methodologies in theory and applications of granular computing. The conference will also make it possible for researchers and developers to highlight their new research directions and new interactions with novel computing models. To broaden more impact on granular computing and its applications, IEEE GrC 2012 will focus on currently important major research tracks such as soft computing (fuzzy, rough sets and etc), social network, cloud computing, e-intelligence (web intelligence, semantic web), bioinformatics and medical informatics.
2011 International Conference on Artificial Intelligence and Computational Intelligence (AICI)
AICI 11 aims to provide an international forum for researchers and practitioners to present and discuss the state of the art of Artiicial Intelligence and Computational Intelligence, including but not limited to, Expert System, Decision support systems, Fuzzy logic and soft computing, Heuristic searching methods, Knowledge representation, Natural Language Understanding, Machine Learning, Neural Network, Robotics, Pattern Recognition, Machine Vision, Intelligent Control, Intelligent Information Retrieval, Di
FITME 2010 is a forum for presentation of new research results and demonstration of new systems and techniques in the broad field of information systems, information technology, information management, management engineering and their applications. The forum aims to bring together researchers, developers, and users from around the world in both industry and academia for sharing state-of-art results, for exploring new areas of research and development, and to discuss emerging issues facing business organizat
Signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing. Includes theory, algorithms, and architectures for image coding, filtering, enhancement, restoration, segmentation, and motion estimation; image formation in tomography, radar, sonar, geophysics, astronomy, microscopy, and crystallography; image scanning, digital half-toning and display, andcolor reproduction.
Blum, Manuel; Impagliazzo, Russell Foundations of Computer Science, 1987., 28th Annual Symposium on, 1987
In this paper, we examine various complexity issues relative to an oracle for a generic set in order to determine which are the more "natural" conjectures for these issues. Generic oracle results should be viewed as parallels to random oracle results, as in [BG]; the two are in many ways related, but, as we shall exhibit, not equivalent. Looking at ...
Lei Wen; Zhaocai Xi Automation and Logistics, 2007 IEEE International Conference on, 2007
Supply chain risk management includes the estimating of risk through risk identification and analysis, risk evaluation or assessment. In the paper, using the method of fuzzy multi-criteria lattice-order decision-making to evaluate the potential risks through ranking and structuring the risks. Normalizing the fuzzy risk evaluation matrix, through triangular fuzzy number calculation and comparing each risk with the positive ideal risk ...
Carter, Tony M.; Robertson, J.E. Computers, IEEE Transactions on, 1990
The set theory of arithmetic decomposition is a method of designing complex addition/subtraction circuits at any radix using strictly positional, sign- local number systems. The specification of an addition circuit is simply an equation that describes the inputs and the outputs as weighted digit sets. Design is done by applying a set of rewrite rules known as decomposition operators to ...
Kahraman, C.; Kaya, I.; Cebi, S. Intelligent Systems and Knowledge Engineering (ISKE), 2010 International Conference on, 2010
Process capability indices (PCIs) are summary statistics to depict the process location and dispersion successfully and they can be used to show the process performance by producing PCIs. Although PCIs are generally used for a process which has a symmetric tolerance, it is a necessity to analyze some processes where the target value (T) cannot be defined at the midpoint ...
Suozhu Wang; Chunjie Xu; Rui Wu Business and Information Management, 2008. ISBIM '08. International Seminar on, 2008
Web log mining is the application of data mining techniques to Web log data repositories, in which clustering analysis is one of important Web usage mining techniques. Recently various clustering approaches have been developed for Web pages and customer segments clustering. However, most of them take user access frequency or Web page time duration as measurement of user navigation interest ...
Moschytz, George Design of Active-RC Filters for the Analog Front End (of Integrated Circuit System Chips), 2008
The concept of the 'Analog Front End' (AFE), which is the interface to the real world in most IC-system chips, is first introduced. The course then focuses on active-RC filters which constitute an essential part of most AFEs. The formulation of filter specifications and the basic ideas associated with classical filter approximation theory are then briefly reviewed. Some key points ...
Henderson, Peter Mathematical Foundations, 2011
This tutorial is part of a series of eLearning courses designed to help you prepare for the examination to become a Certified Software Development Professional (CSDP) or to learn more about specific software engineering topics. Courses in this series address one or more of the fifteen Knowledge Areas that comprise the Software Engineering Body of Knowledge - or SWEBOK, upon ...
Johnson, Larry OTDR Theory and Operation - Introducing the OTDR, 2009
In this tutorial, we will introduce the role of the OTDR and what makes it unique when used for manufacturing, installation, maintenance and troubleshooting of optical fibers, cables and various passive components. Next, we will examine how the OTDR works and the evolution of OTDR. Platform OTDRs and OTDR setting and menus will be discussed as well as specialty OTDRs.
IMS 2012 Special Sessions: A Retrospective of Field Theory in Microwave Engineering - David M. Pozar
IMS 2012 Special Sessions: A Retrospective of Field Theory in Microwave Engineering - Constantine A. Balanis
Fast Scale Prototyping for Folded Millirobots
Applying Control Theory to the Design of Cancer Therapy
The Josephson Effect: Brian Josephson Debates John Bardeen
Tech News on IEEE.tv
TRIC VI @ Argentina
Quantum Computation - ASC-2014 Plenary series - 4 of 13 - Tuesday 2014/8/12
Anticipating Human Activities for Reactive Robotic Response
Beobot 2.0: Autonomous Mobile Robot Localization and Navigation in Outdoor Pedestrian Environment
Recording and Using 3D Object Models with RoboEarth
Ronald Fagin: 2012 IEEE Computer Society W. Wallace McDowell Award Winner
Computing Conversations: Len Kleinrock on the Theory of Packets
"Approximation- Beyond the Tyranny of Digital Computing," (Rebooting Computing)
Norbert Wiener in the 21st Century Conference Concept
IEEE Xtreme 7.0
The Josephson Effect: SQUIDs Then and Now: From SLUGS to Axions
No standards are currently tagged "Set theory"