Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,981,993 papers from all fields of science
Search
Sign In
Create Free Account
Existential quantification
Known as:
∃E
, Existential operator
, ∄
Expand
In predicate logic, an existential quantification is a type of quantifier, a logical constant which is interpreted as "there exists", "there is at…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
37 relations
Alternating finite automaton
Attempto Controlled English
Category theory
Conjunctive query
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Birational Geometry of Algebraic Varieties
Shigeetj Iitaka
2010
Corpus ID: 34217102
Needless to say, tlie prototype of classification theory of varieties is tlie classical classification theory of algebraic…
Expand
Highly Cited
2009
Highly Cited
2009
An econometric study of CO2 emissions, energy consumption, income and foreign trade in Turkey
Ferda Halicioglu
2009
Corpus ID: 31485335
Highly Cited
2007
Highly Cited
2007
Imperialist competitive algorithm: An algorithm for optimization inspired by imperialistic competition
E. Atashpaz-Gargari
,
C. Lucas
IEEE Congress on Evolutionary Computation
2007
Corpus ID: 2736579
This paper proposes an algorithm for optimization inspired by the imperialistic competition. Like other evolutionary ones, the…
Expand
Highly Cited
2006
Highly Cited
2006
Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach
Jiawei Han
,
J. Pei
,
Yiwen Yin
,
Runying Mao
Sixth IEEE International Conference on Data…
2006
Corpus ID: 21192
Mining frequent patterns in transaction databases, time-series databases, and many other kinds of databases has been studied…
Expand
Highly Cited
2004
Highly Cited
2004
Blind separation of speech mixtures via time-frequency masking
Ö. Yilmaz
,
S. Rickard
IEEE Transactions on Signal Processing
2004
Corpus ID: 206796385
Binary time-frequency masks are powerful tools for the separation of sources from a single mixture. Perfect demixing via binary…
Expand
Highly Cited
1998
Highly Cited
1998
Divertible Protocols and Atomic Proxy Cryptography
M. Blaze
,
Gerrit Bleumer
,
M. Strauss
International Conference on the Theory and…
1998
Corpus ID: 7395578
First, we introduce the notion of divertibility as a protocol property as opposed to the existing notion as a language property…
Expand
Highly Cited
1991
Highly Cited
1991
Studying Information Technology in Organizations: Research Approaches and Assumptions
W. Orlikowski
,
Jack J. Baroudi
Information systems research
1991
Corpus ID: 13526273
We examined 155 information systems research articles published from 1983 to 1988 and found that although this research is not…
Expand
Highly Cited
1991
Highly Cited
1991
Measuring the hedonic and utilitarian sources of consumer attitudes
R. Batra
,
O. Ahtola
1991
Corpus ID: 38189603
It has been suggested theoretically that consumer attitudes have distinct hedonic and utilitarian components, and that product…
Expand
Highly Cited
1978
Highly Cited
1978
ON DATA BANKS AND PRIVACY HOMOMORPHISMS
Ronald L. Rivest
,
M. Dertouzos
1978
Corpus ID: 6905087
Encryption is a well—known technique for preserving the privacy of sensitive information. One of the basic, apparently inherent…
Expand
Highly Cited
1977
Highly Cited
1977
Existence of solitary waves in higher dimensions
W. Strauss
1977
Corpus ID: 121422787
The elliptic equation Δu=F(u) possesses non-trivial solutions inRn which are exponentially small at infinity, for a large class…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE