1995
DOI: 10.1007/bfb0030825
|View full text |Cite
|
Sign up to set email alerts
|

Computations with finite closure systems and implications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

1996
1996
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 32 publications
(37 citation statements)
references
References 8 publications
0
37
0
Order By: Relevance
“…This possibly accounts for the small number of lattices M P and can help in their study. On the other hand there exist several algorithms to compute lattices defined by implications (see for instance Wild [20]). Using such an algorithm, Nourine [12] computed the cardinality of M P for P an antichain of size n ≤ 6 (i.e.…”
Section: Resultsmentioning
confidence: 99%
“…This possibly accounts for the small number of lattices M P and can help in their study. On the other hand there exist several algorithms to compute lattices defined by implications (see for instance Wild [20]). Using such an algorithm, Nourine [12] computed the cardinality of M P for P an antichain of size n ≤ 6 (i.e.…”
Section: Resultsmentioning
confidence: 99%
“…Of special interest is the canonical implication basis of the context (usually called the Duquenne-Guigues basis), which is a minimal cover of the set of implications that hold in the context. The fact that all bases (minimal covers) have the same cardinality was already known in the database literature [16], but the specific role of the canonical basis in that was made explicit in [23] and [24] (see also [10] A quasi-closed set A is called pseudo-closed if A = A and B ⊂ A for any quasiclosed B ⊂ A. A pseudo-intent of the context is a pseudo-closed (with respect to ) attribute set.…”
Section: Formal Contexts and Implicationsmentioning
confidence: 99%
“…To make the description of the algorithm self-contained, we describe a "naïve" procedure to calculate the saturation. There are other suitable algorithms for this purpose: LinClosure, which is well known in the database theory [16]; the one proposed in [24], which has nonlinear time complexity but is claimed to be an enhanced version of LinClosure; etc.…”
Section: Ganter's Algorithm For Computing the Canonical Basismentioning
confidence: 99%
See 1 more Smart Citation
“…Details of most of the above , and of several numerical tables , ‡ are given in [14] . See also [16] . 3 …”
Section: E Numeration Of B Inary and T Ernary M Atroidsmentioning
confidence: 99%