Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Μ operator

Known as: Unbounded search operator, Unbounded search, M operator 
In computability theory, the μ operator, minimization operator, or unbounded search operator searches for the least natural number with a given… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
An increasing number of research and industrial initiatives have focused on publishing Linked Open Data, but little attention has… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
2016
2016
Fitness landscape analysis encompasses a selection of techniques designed to estimate the properties of a search landscape… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
We study scalar, pseudoscalar, vector, and axial-vector mesons with nonstrange and strange quantum numbers in the framework of a… Expand
  • table I
  • table II
  • figure 1
  • table III
  • figure 2
Is this relevant?
2011
2011
The development of distributed execution engines has greatly simplified parallel programming, by shielding developers from the… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We examine the behavior of the spectral function for the Tμμ operator in QCD in the two regimes where it is possible to make… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
What makes innovation representing a particular type of change, behaviour, or problem-solving, so ambivalent? An innovation’s… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2007
2007
In knowledge intensive domains the underlying information system is asked to provide a behaviour that match with highly-changea… Expand
  • figure 1
  • figure 2
Is this relevant?
2006
2006
Recently, using a limit schema, we presented an analog and machine independent algebraic characterization of elementary functions… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Basic information theory is used to analyse the amount of confidential information which may be leaked by programs written in a… Expand
  • figure 1
  • figure 2
Is this relevant?
1990
1990
  • R. Beigel
  • SIAM J. Comput.
  • 1990
  • Corpus ID: 33504914
The unbounded search problem was posed by Bentley and Yao. It is the problem of finding a key in a linearly ordered unbounded… Expand
Is this relevant?