1979
DOI: 10.1007/978-94-009-9550-5
|View full text |Cite
|
Sign up to set email alerts
|

Theory of categories

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
23
0

Year Published

1994
1994
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(23 citation statements)
references
References 0 publications
0
23
0
Order By: Relevance
“…We denote with A the group A=t(A) and with E(A) = E the endomorphism ring of A. P is the set of primes. All unexplained notions and results can be found in [12,14,16].…”
Section: Introductionmentioning
confidence: 98%
See 1 more Smart Citation
“…We denote with A the group A=t(A) and with E(A) = E the endomorphism ring of A. P is the set of primes. All unexplained notions and results can be found in [12,14,16].…”
Section: Introductionmentioning
confidence: 98%
“…In [17], the author considers the abelian category QA which has all abelian groups as objects and, if A and C are abelian groups, the group of morphisms from A to C in QA is Q ⊗ Z Hom(A; C). He proves that this category is equivalent to the quotient category A=B of the category of all abelian groups, A, modulo the thick subcategory B of A which contains exactly all bounded groups (see [14] for the construction of the quotient category).…”
Section: Introductionmentioning
confidence: 98%
“…Several people were helpful in pointing out some of these in response to requests posted to the topology and category-theory mailing lists. The references include books by L. and N. Popescu [31,32], H. Schubert [36], and F. Borceux [7]. Curiously enough the localization construction doesn't seem to appear in [24], although the underlying free and quotient category techniques are there.…”
Section: Introductionmentioning
confidence: 98%
“…These systems often provide some security mechanisms such as client or user authentication [3,4], but are weak at enforcing information flow control policies. As soon as a client has access to a document or data file, its contents are vulnerable in that the client can redistribute this information to unauthorized parties.…”
Section: Introductionmentioning
confidence: 99%