AbstractIn reality we are always faced with a large number of complex massive databases. In this work we introduce the notion of a homomorphism as a kind of tool to study data compression in covering information systems. The concepts of consistent functions related to covers are first defined. Then, by classical extension principle the concepts of covering mapping and inverse covering mapping are introduced and their properties are studied. Finally, the notions of homomorphisms of information systems based on covers are proposed, and it is proved that a complex massive covering information system can be compressed into a relatively small-scale information system and its attribute reduction is invariant under the condition of homomorphism, t...
International audienceThis chapter is concerned with encryption techniques in the cryptographic sens...
International audienceThis chapter is concerned with encryption techniques in the cryptographic sens...
International audienceThis chapter is concerned with encryption techniques in the cryptographic sens...
AbstractIn reality we are always faced with a large number of complex massive databases. In this wor...
AbstractAn information system is one of the most important mathematical models in the field of artif...
Some invariant properties of incomplete information systems homomorphism are studied in this paper. ...
AbstractThe study of homomorphic encryption techniques has led to significant advancements in the co...
Unfolds generate data structures, and folds consume them. A hylomorphism is a fold after an unfold, ...
AbstractAlthough every computable data type has an initial algebra specification with hidden functio...
Although every computable data type has an initial algebra specification with hidden functions, it m...
Unfolds generate data structures, and folds consume them. A hylomorphism is a fold after an unfold, ...
AbstractThe information system is one of the most important mathematical models in the field of arti...
Cloud service providers play a vital role in data storage and data processing by providing software,...
Unfolds generate data structures, and folds consume them. A hylomorphism is a fold after an unfold, ...
AbstractThe study of homomorphic encryption techniques has led to significant advancements in the co...
International audienceThis chapter is concerned with encryption techniques in the cryptographic sens...
International audienceThis chapter is concerned with encryption techniques in the cryptographic sens...
International audienceThis chapter is concerned with encryption techniques in the cryptographic sens...
AbstractIn reality we are always faced with a large number of complex massive databases. In this wor...
AbstractAn information system is one of the most important mathematical models in the field of artif...
Some invariant properties of incomplete information systems homomorphism are studied in this paper. ...
AbstractThe study of homomorphic encryption techniques has led to significant advancements in the co...
Unfolds generate data structures, and folds consume them. A hylomorphism is a fold after an unfold, ...
AbstractAlthough every computable data type has an initial algebra specification with hidden functio...
Although every computable data type has an initial algebra specification with hidden functions, it m...
Unfolds generate data structures, and folds consume them. A hylomorphism is a fold after an unfold, ...
AbstractThe information system is one of the most important mathematical models in the field of arti...
Cloud service providers play a vital role in data storage and data processing by providing software,...
Unfolds generate data structures, and folds consume them. A hylomorphism is a fold after an unfold, ...
AbstractThe study of homomorphic encryption techniques has led to significant advancements in the co...
International audienceThis chapter is concerned with encryption techniques in the cryptographic sens...
International audienceThis chapter is concerned with encryption techniques in the cryptographic sens...
International audienceThis chapter is concerned with encryption techniques in the cryptographic sens...