Letteratura scientifica selezionata sul tema "Information-Based Complexity"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Information-Based Complexity".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Information-Based Complexity"
Wozniakowski, H. "Information-Based Complexity". Annual Review of Computer Science 1, n. 1 (giugno 1986): 319–80. http://dx.doi.org/10.1146/annurev.cs.01.060186.001535.
Testo completoPackel, Edward W., e J. F. Traub. "Information-based complexity". Nature 328, n. 6125 (luglio 1987): 29–33. http://dx.doi.org/10.1038/328029a0.
Testo completoHeinrich, Stefan, e Jörg-Detlef Kern. "Parallel information-based complexity". Journal of Complexity 7, n. 4 (dicembre 1991): 339–70. http://dx.doi.org/10.1016/0885-064x(91)90024-r.
Testo completoKon, Mark A. "Book Review: Information-based complexity". Bulletin of the American Mathematical Society 21, n. 2 (1 ottobre 1989): 332–40. http://dx.doi.org/10.1090/s0273-0979-1989-15851-5.
Testo completoTraub, J. F., e H. Wo\'zniakowski. "Perspectives on Information-Based Complexity". Bulletin of the American Mathematical Society 26, n. 1 (1 aprile 1992): 29–53. http://dx.doi.org/10.1090/s0273-0979-1992-00240-9.
Testo completoLui, Leong Ting, Germán Terrazas, Hector Zenil, Cameron Alexander e Natalio Krasnogor. "Complexity Measurement Based on Information Theory and Kolmogorov Complexity". Artificial Life 21, n. 2 (maggio 2015): 205–24. http://dx.doi.org/10.1162/artl_a_00157.
Testo completoParlett, Beresford N. "Some basic information\\ on information-based complexity theory". Bulletin of the American Mathematical Society 26, n. 1 (1 gennaio 1992): 3–29. http://dx.doi.org/10.1090/s0273-0979-1992-00239-2.
Testo completoOrme, Anthony Mark, Haining Yao e Letha H. Etzkorn. "Complexity metrics for ontology based information". International Journal of Technology Management 47, n. 1/2/3 (2009): 161. http://dx.doi.org/10.1504/ijtm.2009.024120.
Testo completoPackel, Edward W., e Henryk Woźniakowski. "Recent developments in information-based complexity". Bulletin of the American Mathematical Society 17, n. 1 (1 luglio 1987): 9–37. http://dx.doi.org/10.1090/s0273-0979-1987-15511-x.
Testo completoGalas, David J., Matti Nykter, Gregory W. Carter, Nathan D. Price e Ilya Shmulevich. "Biological Information as Set-Based Complexity". IEEE Transactions on Information Theory 56, n. 2 (febbraio 2010): 667–77. http://dx.doi.org/10.1109/tit.2009.2037046.
Testo completoTesi sul tema "Information-Based Complexity"
Schmitt, Wagner. "A new 3D shape descriptor based on depth complexity and thickness information". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2015. http://hdl.handle.net/10183/127030.
Testo completoGeometric models play a vital role in several fields, from the entertainment industry to scientific applications. To reduce the high cost of model creation, reusing existing models is the solution of choice. Model reuse is supported by content-based shape retrieval (CBR) techniques that help finding the desired models in massive repositories, many publicly available on the Internet. Key to efficient and effective CBR techniques are shape descriptors that accurately capture the characteristics of a shape and are able to discriminate between different shapes. We present a descriptor based on the distribution of two global features measured on a 3D shape, depth complexity and thickness, which respectively capture aspects of the geometry and topology of 3D shapes. The final descriptor, called DCT (depth complexity and thickness histogram), is a 2D histogram that is invariant to the translation, rotation and scale of geometric shapes. We efficiently implement the DCT on the GPU, allowing its use in real-time queries of large model databases. We validate the DCT with the Princeton and Toyohashi Shape Benchmarks, containing 1815 and 10000 models respectively. Results show that DCT can discriminate meaningful classes of these benchmarks, and is fast to compute and robust against shape transformations and different levels of subdivision and smoothness.
Alamoudi, Rami Hussain. "Interaction Based Measure of Manufacturing Systems Complexity and Supply Chain Systems Vulnerability Using Information Entropy". Scholarly Repository, 2008. http://scholarlyrepository.miami.edu/oa_dissertations/76.
Testo completoThost, Veronika. "Using Ontology-Based Data Access to Enable Context Recognition in the Presence of Incomplete Information". Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-227633.
Testo completoDash, Santanu Kumar. "Adaptive constraint solving for information flow analysis". Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/16354.
Testo completoEugénio, António Luís Beja. "The information systems and technology innovation process: a study using an agent-based approach". Master's thesis, Instituto Superior de Economia e Gestão, 2007. http://hdl.handle.net/10400.5/636.
Testo completoUm modelo abstracto baseado em agentes é utilizado para estudar a inovação em Sistemas de Informação e em Tecnologia de Informação, no plano organizacional, utilizando uma aproximação sócio-cognitiva. A conclusão do estudo indica que o poder dos profissionais conhecedores de tecnologias de informação na decisão de adopção de uma determinada inovação varia com o nível de concordância de ideias entre eles e os decisores, ao mesmo tempo que depende da taxa de depreciação das transacções, conduzindo a uma forte flutuação de poder quando o ambiente é instável.
An abstract Agent Based Model is used to study Information Systems and Information Technology innovation on an organizational realm, using a socio-cognitive approach. Conclusion is drawn that the power of the knowledge workers in the decision to adopt an IS/IT innovation within an organization varies with the matching level of ideas between them and the top management, while being dependant of the transactions’ depreciation rate, leading to a strong fluctuation of power when the environment is unstable.
Syed, Tamseel Mahmood. "Precoder Design Based on Mutual Information for Non-orthogonal Amplify and Forward Wireless Relay Networks". University of Akron / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=akron1392043776.
Testo completoClément, François. "An Optimization Perspective on the Construction of Low-Discrepancy Point Sets". Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS138.
Testo completoDiscrepancy measures are metrics designed to quantify how well spread a point set is in a given space. Among these, the L∞ star discrepancy is arguably one of the most popular. Indeed, by the Koksma-Hlawka inequality~cite{Hlawka,Koksma}, when replacing an integral by the average of function evaluations in specific points, the error made is bounded by a product of two terms, one depending only on the function and the other on the L∞ star discrepancy of the points. This leads to a variety of applications, from computer vision to financial mathematics and to design of experiments where well-spread points covering a space are essential.Low-discrepancy sets used in such applications usually correspond to number theoretic designs, with a wide variety of possible constructions. Despite the high demand in practice, the design of these point sets remains largely the work of mathematicians, often more interested in finding asymptotic bounds than in adapting the point sets to the desired applications. This results in point sets that, while theoretically excellent, sometimes leave a lot to be desired for applications, in particular high-dimensional ones. Indeed, the constructions are not tailored to the many different settings found in applications and are thus suboptimal. Furthermore, not only do we not know how low the discrepancy of point sets of a given size in a fixed dimension can go, but often we do not even know the discrepancy of existing constructions. This leaves essential questions unanswered in the design of low-discrepancy sets and sequences. In this thesis, we tackle the problem of constructing low-discrepancy sets from a computational perspective. With optimization approaches applied in isolation or on top of existing sets and sequences, we provide a diverse set of methods to generate excellent low-discrepancy sets, largely outperforming the discrepancy of known constructions in a wide variety of contexts. In particular, we describe a number of examples such as provably optimal sets for very few points in dimension 2, or improved sets of hundreds of points in moderate dimensions via subset selection. Finally, we extend recent work on greedy one-dimensional sequence construction to show that greedy L2 construction of point sets provides excellent empirical results with respect to the L∞ star discrepancy
Domercant, Jean Charles. "ARC-VM: an architecture real options complexity-based valuation methodology for military systems-of-systems acquisitions". Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/42928.
Testo completoМельничук, Андрій Богданович, e Andrii Melnychuk. "Методи захисту інформації в рамках предметно-орієнтованого проєктування інформаційних систем". Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36742.
Testo completoПредметно-орієнтоване проектування — це підхід до проектування програмного забезпечення. Метод проєктування визначає у собі практики як спілкуватись із спеціалістами, самої, предметної області та набір правил проектування де кінцевий код буде відображати у собі всі поняття самого домену. У деяких випадках розділення проблем, передбачених предметно орієнтованим підходом, важко досягти, а саме, коли розглядається функціональність, яка не залежить від домену, але є тісно пов’язаною з функціональністю, пов’язаною з предметною областю. Дані проблеми стосуються блоку програми яка б відповідала за безпеку. На жаль, засновник досліджуваного підходу не визначив як саме можна поєднати таку логіку, тому було досліджено різні методи забезпечення захисту даних та аналіз найкращих варіантів реалізації, які можна застосовувати у реальних проектах.
Domain Driven Design — is an approach to software design. The approach method defines the practices of how to communicate with specialists, of the subject area and a set of design rules where the final code will reflect all the concepts of the domain itself. In some cases, the separation covered by a subject-oriented approach is difficult to achieve, namely when considering functionality that is independent of the domain but is closely related to functionality related to the subject area. These issues are related to the security unit. Unfortunately, the founder of the researched approach did not define exactly how such logic can be combined. That is why were researched the different methods of data protection and analysis of the best implementation options that can be used in real projects.
ПЕРЕЛІК УМОВНИХ СКОРОЧЕНЬ…8 ВСТУП… 9 РОЗДІЛ 1. АНАЛІЗ ПРЕДМЕТНО-ОРІЄНТОВАНОГО ПРОЄКТУВАННЯ ТА ПРОБЛЕМИ БЕЗПЕКИ У НЬОМУ…13 1.1. Предметно-орієнтоване проєктування…13 1.2 Архітектура та структура проекту при DDD проєктуванні… 16 1.3 Аспектно-орієнтоване програмування…18 1.4 Вимірювання складності реалізації методу… 20 1.5 Проблема захисту даних при проектуванні…22 РОЗДІЛ 2. ЗАХИСТ ІНФОРМАЦІЇ В РАМКАХ ПРЕДМЕТНО-ОРІЄНТОВАНОГО ПРОЄКТУВАННЯ…24 2.1 Предмет дослідження проблеми захисту інформації… 24 2.2 Критерії оцінки варіантів реалізації безпеки в рамках предметно-орієнтованому проектуванні… 26 2.3 Аналіз методу захисту інформації, яка вбудована у шар предметної області… 28 2.3.1 Опис підходу та його плюси…28 2.3.2 Недоліки підходу… 30 2.3.3 Висновок по підрозділу…30 2.4 Аналіз методу захисту інформації, яка винесена в окремий контекст… 31 2.4.1 Опис підходу та його плюси…31 2.4.2 Недоліки підходу… 32 2.4.3 Висновок по підрозділу…34 2.5 Аналіз методу захисту інформації, з використанням фасаду предметної області… 34 2.5.1 Опис підходу та його плюси…35 2.5.2 Недоліки підходу… 36 2.5.3 Висновок по підрозділу…36 2.6 Аналіз методу захисту інформації, з використанням аспектно-орієнтованого підходу…37 2.6.1 Опис підходу та його плюси…37 2.6.2 Недоліки підходу… 38 2.6.3 Висновок по підрозділу…39 РОЗДІЛ 3. РЕАЛІЗАЦІЯ МЕТОДІВ ЗАХИСТУ ТА ПОРІВНЯННЯ СКЛАДНОСТІ…40 3.1 Реалізація базової структури проекту…40 3.1.1 Вибір середовища та технологія для створення інформаційної системи… 40 3.1.2 Розробка головного ядра інформаційної системи… 40 3.1.3 Розробка відокремленого контексту безпеки… 42 3.1.4 Розробка інтерфейсу користувача… 43 3.2 Аналіз складності у реалізацій та підтримки кожного із методів…44 3.2.1 Визначення значення залежностей у інформаційній системі…44 3.2.2 Вимірювання цикломатичної складності… 44 3.3 Підсумки отриманих результатів…45 РОЗДІЛ 4. ОХОРОНА ПРАЦІ ТА БЕЗПЕКА У НАДЗВИЧАЙНИХ СИТУАЦІЯХ…47 4.1 Охорона праці…47 4.2 Підвищення стійкості роботи підприємств будівельної галузі у воєнний час…49 ВИСНОВКИ… 54 СПИСОК ВИКОРИСТАНИХ ДЖЕРЕЛ… 56 ДОДАТКИ…59
Kuhn, John. "A THEORY OF COMPLEX ADAPTIVE INQUIRING ORGANIZATIONS: APPLICATION TO CONTINUOUS ASSURANCE OF CORPORATE FINANCIAL INFORMATION". Doctoral diss., University of Central Florida, 2009. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2432.
Testo completoPh.D.
Department of Management Information Systems
Business Administration
Business Administration PhD
Libri sul tema "Information-Based Complexity"
W, Wasilkowski G., e Woźniakowski H, a cura di. Information-based complexity. Boston: Academic Press, 1988.
Cerca il testo completoPetras, Iasonas. Contributions to Information-Based Complexity and to Quantum Computing. [New York, N.Y.?]: [publisher not identified], 2013.
Cerca il testo completoCvetkov, Viktor. Basics of complexity theory. ru: INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/2110856.
Testo completoZu, Qiaohong. Pervasive Computing and the Networked World: Joint International Conference, ICPCA/SWS 2012, Istanbul, Turkey, November 28-30, 2012, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Cerca il testo completoBaryshev, Ruslan. Proactive library in the information and educational environment of the University. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1123649.
Testo completoKaliski, Burton S. Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop Redwood Shores, CA, USA, August 13 15, 2002 Revised Papers. Berlin: Springer-Verlag Berlin Heidelberg, 2003.
Cerca il testo completoChristof, Paar, e SpringerLink (Online service), a cura di. RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Cerca il testo completoJianying, Zhou, Li Hui e SpringerLink (Online service), a cura di. Information Security: 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings. Berlin, Heidelberg: Springer-Verlag GmbH Berlin Heidelberg, 2011.
Cerca il testo completoStanescu, Liana. Creating New Medical Ontologies for Image Annotation: A Case Study. New York, NY: Springer Science+Business Media, LLC, 2012.
Cerca il testo completo1969-, Sarkar Palash, e SpringerLink (Online service), a cura di. Identity-Based Encryption. Boston, MA: Springer Science+Business Media, LLC, 2011.
Cerca il testo completoCapitoli di libri sul tema "Information-Based Complexity"
Traub, J. F. "Introduction to Information-Based Complexity". In Complexity in Information Theory, 63–76. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4612-3774-7_3.
Testo completoStandish, Russell K. "Information-Based Complexity of Networks". In Advances in Network Complexity, 209–27. Weinheim, Germany: Wiley-VCH Verlag GmbH & Co. KGaA, 2013. http://dx.doi.org/10.1002/9783527670468.ch09.
Testo completoPolkowski, Lech. "Granulation of Knowledge: Similarity Based Approach in Information and Decision Systems". In Computational Complexity, 1464–87. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1800-9_94.
Testo completoLin, Grace Y., Richard Breitwieser, Feng Cheng, John T. Eagen e Markus Ettl. "Product Hardware Complexity and Its Impact on Inventory and Customer On-Time Delivery". In Information-Based Manufacturing, 61–79. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1599-9_4.
Testo completoZhao, Weidong, Haitao Liu e Xi Liu. "Role Identification Based on the Information Dependency Complexity". In Advanced Data Mining and Applications, 276–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-53917-6_25.
Testo completoTraub, Joseph F. "Information-based complexity: Recent results and open problems". In Fundamentals of Computation Theory, 86–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/3-540-54458-5_52.
Testo completoMockus, Jonas, William Eddy, Audris Mockus, Linas Mockus e Gintaras Reklaitis. "Information-Based Complexity (IBC) and the Bayesian Heuristic Approach". In Nonconvex Optimization and Its Applications, 31–46. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4757-2627-5_2.
Testo completoPolkowski, Lech. "Granulation of Knowledge: Similarity Based Approach in Information and Decision Systems". In Encyclopedia of Complexity and Systems Science, 4411–35. New York, NY: Springer New York, 2009. http://dx.doi.org/10.1007/978-0-387-30440-3_262.
Testo completoPolkowski, Lech. "Granulation of Knowledge: Similarity Based Approach in Information and Decision Systems". In Encyclopedia of Complexity and Systems Science, 1–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-642-27737-5_262-2.
Testo completoEguchi, Takao, Tsuyoshi Koga e Kazuhiro Aoyama. "MANAGEMENT OF RELATIONSHIPS BETWEEN PRODUCT INFORMATION ON MODEL BASED DESIGN PROCESS". In Gain competitive advantage by managing complexity, 211–24. München: Carl Hanser Verlag GmbH & Co. KG, 2012. http://dx.doi.org/10.3139/9783446434127.017.
Testo completoAtti di convegni sul tema "Information-Based Complexity"
Wasilkowski, G. W. "Information-Based Complexity; An Overview". In 1990 American Control Conference. IEEE, 1990. http://dx.doi.org/10.23919/acc.1990.4790762.
Testo completoKipp, Teresa A. "Fusion by the information-based complexity approach". In Optical Engineering and Photonics in Aerospace Sensing, a cura di Lynn E. Garn e Lynda L. Graceffo. SPIE, 1993. http://dx.doi.org/10.1117/12.161456.
Testo completoMoore, Philip. "The Complexity of Context in Mobile Information Systems". In 2009 International Conference on Network-Based Information Systems (NBIS). IEEE, 2009. http://dx.doi.org/10.1109/nbis.2009.10.
Testo completoFoucart, Simon. "Complexity of multivariate problems based on binary information". In 2017 International Conference on Sampling Theory and Applications (SampTA). IEEE, 2017. http://dx.doi.org/10.1109/sampta.2017.8024351.
Testo completoFuhrer, Julian, Alejandro Blenkmann, Tor Endestad, Anne-Kristin Solbakk e Kyrre Glette. "Complexity-based Encoded Information Quantification in Neurophysiological Recordings". In 2022 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC). IEEE, 2022. http://dx.doi.org/10.1109/embc48229.2022.9871501.
Testo completoPizzolante, Raffaele, Arcangelo Castiglione, Bruno Carpentieri e Alfredo De Santis. "Parallel Low-Complexity Lossless Coding of Three-Dimensional Medical Images". In 2014 17th International Conference on Network-Based Information Systems (NBiS). IEEE, 2014. http://dx.doi.org/10.1109/nbis.2014.107.
Testo completoRavari, Alireza Norouzzadeh, e Hamid D. Taghirad. "Transformation invariant 3D object recognition based on information complexity". In 2014 Second RSI/ISM International Conference on Robotics and Mechatronics (ICRoM). IEEE, 2014. http://dx.doi.org/10.1109/icrom.2014.6991019.
Testo completoAimin, Luo, Huang Li e Luo Xueshan. "Entropy-Based Complexity Analysis for Architecture of Information System". In 2008 IEEE International Conference on Networking, Sensing and Control (ICNSC). IEEE, 2008. http://dx.doi.org/10.1109/icnsc.2008.4525503.
Testo completoLee, Gil-beom, Youn-chul Shin, Joo-heon Park e Myeong-jin Lee. "Low-complexity camera tamper detection based on edge information". In 2014 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW). IEEE, 2014. http://dx.doi.org/10.1109/icce-tw.2014.6904034.
Testo completoSun Yanming, Zhang Kaisheng, Zhang Xiaohua e Zheng Shixiong. "Modeling of manufacturing information system based on complexity science". In International Technology and Innovation Conference 2006 (ITIC 2006). IEE, 2006. http://dx.doi.org/10.1049/cp:20060765.
Testo completoRapporti di organizzazioni sul tema "Information-Based Complexity"
Parlett, Beresford. Some Basic Information on Information-Based Complexity Theory. Fort Belvoir, VA: Defense Technical Information Center, luglio 1989. http://dx.doi.org/10.21236/ada256585.
Testo completoSanders, David M., e William B. Carlton. Information Overload at the Tactical Level (an Application of Agent Based Modeling and Complexity Theory in Combat Modeling). Fort Belvoir, VA: Defense Technical Information Center, agosto 2002. http://dx.doi.org/10.21236/ada405459.
Testo completoMascagni, Giulia, Roel Dom e Fabrizio Santoro. The VAT in Practice: Equity, Enforcement and Complexity. Institute of Development Studies (IDS), gennaio 2021. http://dx.doi.org/10.19088/ictd.2021.002.
Testo completoPilkevych, Ihor, Oleg Boychenko, Nadiia Lobanchykova, Tetiana Vakaliuk e Serhiy Semerikov. Method of Assessing the Influence of Personnel Competence on Institutional Information Security. CEUR Workshop Proceedings, aprile 2021. http://dx.doi.org/10.31812/123456789/4374.
Testo completoBaader, Franz, Stefan Borgwardt e Marcel Lippmann. Temporal Conjunctive Queries in Expressive DLs with Non-simple Roles. Technische Universität Dresden, 2015. http://dx.doi.org/10.25368/2022.222.
Testo completoBorgwardt, Stefan, e Walter Forkel. Closed-World Semantics for Conjunctive Queries with Negation over ELH⊥ Ontologies. Technische Universität Dresden, 2019. http://dx.doi.org/10.25368/2023.222.
Testo completoKud, A. A. Figures and Tables. Reprinted from “Comprehensive сlassification of virtual assets”, A. A. Kud, 2021, International Journal of Education and Science, 4(1), 52–75. KRPOCH, 2021. http://dx.doi.org/10.26697/reprint.ijes.2021.1.6.a.kud.
Testo completoLutz, Carsten, e Frank Wolter. Modal Logics of Topological Relations. Technische Universität Dresden, 2004. http://dx.doi.org/10.25368/2022.142.
Testo completoKoopmann, Patrick. Ontology-Mediated Query Answering for Probabilistic Temporal Data with EL Ontologies (Extended Version). Technische Universität Dresden, 2018. http://dx.doi.org/10.25368/2022.242.
Testo completoLutz, Carsten, Carlos Areces, Ian Horrocks e Ulrike Sattler. Keys, Nominals, and Concrete Domains. Technische Universität Dresden, 2002. http://dx.doi.org/10.25368/2022.122.
Testo completo