Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,635,696 papers from all fields of science
Search
Sign In
Create Free Account
Symmetric closure
In mathematics, the symmetric closure of a binary relation R on a set X is the smallest symmetric relation on X that contains R. For example, if X is…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
5 relations
Abstract rewriting system
Reflexive closure
Rewrite order
Rewriting
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Interval Type-2 Fuzzy Rough Sets and Interval Type-2 Fuzzy Closure Spaces
S. Sharan
,
S. Tiwari
,
V. Yadav
2015
Corpus ID: 56027789
The purpose of the present work is to establish a one-to-one cor- respondence between the family of interval type-2 fuzzy reexive…
Expand
2014
2014
What can FCA do for database linkkey extraction
Manuel Atencia
,
Jérôme David
,
J. Euzenat
2014
Corpus ID: 18003339
Links between heterogeneous data sets may be found by using a generalisation of keys in databases, called linkkeys, which apply…
Expand
Highly Cited
2011
Highly Cited
2011
Kernels and closures of soft set relations, and soft set relation mappings
Hai-Long Yang
,
Zhi-Lian Guo
Comput. Math. Appl.
2011
Corpus ID: 5561359
2010
2010
A Decision Procedure for a Two-sorted Extension of Multi-Level Syllogistic with the Cartesian Product and Some Map Constructs
Domenico Cantone
,
Cristiano Longo
,
Marianna Nicolosi Asmundo
CILC
2010
Corpus ID: 17320172
We present a nondeterministic polynomial-time decision pro- cedure for an extension of multi-level syllogistic with the singleton…
Expand
2008
2008
Comments on 'The Logic of Conditional Doxastic Actions'
H. V. Ditmarsch
2008
Corpus ID: 15077081
I first summarize Baltag and Smets’ contribution to this volume, and praise their work. Then I compare the anti-lexicographic…
Expand
2006
2006
Acyclic Argumentation: Attack = Conflict + Preference
S. Kaci
,
Leendert van der Torre
,
E. Weydert
ECAI
2006
Corpus ID: 15566951
In this paper we study the fragment of Dung's argumentation theory in which the strict attack relation is acyclic. We show that…
Expand
2005
2005
Symmetrization of Closure Operators and Visibility
H. Martini
,
W. Wenzel
2005
Corpus ID: 119974110
Abstract.For an arbitrary set E and a given closure operator $$ \sigma :\,\mathcal{P}(E) \to \,\mathcal{P}(E) $$, we want to…
Expand
2002
2002
Structural Induction and the λ-Calculus
René Vestergaard
2002
Corpus ID: 1200934
We consider formal provability with structural induction and related proof principles in the λ-calculus presented with first…
Expand
1996
1996
The Structure of Imprimitive Non-symmetric 3-Class Association Schemes
R. Goldbach
,
H. Claasen
Eur. J. Comb.
1996
Corpus ID: 21748804
Abstract In this paper we present a classification into three categories of the imprimitive non-symmetric association schemes…
Expand
1996
1996
Feasibility conditions for non-symmetric 3-class association schemes
R. Goldbach
,
H. Claasen
Discret. Math.
1996
Corpus ID: 204993579
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE