Have a personal or library account? Click to login
A note on the fuzzy Xor Cover
Open Access
|Nov 2025

References

  1. M. Baczyński and B. Jayaram, Fuzzy Implications, Studies in Fuzziness and Soft Computing, Vol. 231, Springer-Verlag, Berlin, 2008.
  2. B.C. Bedregal, R.H.S. Reiser, and G.P. Dimuro, Xor-implications and E-implications: classes of fuzzy implications based on fuzzy Xor, Electron. Notes Theor. Comput. Sci. 247 (2009), 5–18.
  3. B.C. Bedregal, R.H.S. Reiser, and G.P. Dimuro, Revisiting Xor-implications: classes of fuzzy (co)implications based on f-Xor (f-XNor) connectives, Internat. J. Uncertain. Fuzziness Knowledge-Based Systems 21 (2013), no. 6, 899–925.
  4. G. Bongiovanni and P. Penna, XOR-based schemes for fast parallel IP lookups, Theory Comput. Syst. 38 (2005), no. 4, 481–501.
  5. E.G. Codding and G. Horlick, Application of AND and exclusive-or (XOR) logic operations to the identification of elemental emission spectra measured using a photodiode array direct reading spectrometer, Appl. Spectrosc. 27 (1973), no. 5, 366–370.
  6. M.M. Gupta, A. Kandel, W. Bandler, and J.B. Kiszka (Eds.), Approximate Reasoning in Expert Systems, North-Holland Publishing Co., Amsterdam, 1985.
  7. Y. Horikawa, Landscapes of basins of local minima in the XOR problem, in: Proceedings of 1993 International Conference on Neural Networks (IJCNN-93-Nagoya, Japan), IEEE, 1993, pp. 1677–1680.
  8. L. Kohout and E. Kim, Characterization of interval fuzzy logic systems of connectives by group transformations, Reliab. Comput. 10 (2004), no. 4, 299–334.
  9. A.G. Konheim, Computer Security and Cryptography, John Wiley & Sons, Inc., Hoboken, 2007.
  10. M. Maeda, M. Suenaga, and H. Miyajima, Qubit neuron according to quantum circuit for XOR problem, Appl. Math. Comput. 185 (2007), no. 2, 1015–1025.
  11. C.F. Mela and D.R. Lehmann, Using fuzzy set theoretic techniques to identify preference rules from interactions in the linear model: an empirical study, Fuzzy Sets and Systems 71 (1995), no. 2, 165–181.
  12. N.D. Mermin, Quantum Computer Science. An Introduction, Cambridge University Press, Cambridge, 2007.
  13. W. Pedrycz and G. Succi, fXOR fuzzy logic networks, Soft Comput. 7 (2002), no. 2, 115–120.
  14. C. Shannon, Communication theory of secrecy systems, Bell System Tech. J. 28 (1949), 656–715.
  15. W. Stallings, Cryptography and Network Security. Principles and Practice, Prentice Hall, Upper Saddle River, 1999.
  16. H. Vandierendonck and K. De Bosschere, XOR-based hash functions, IEEE Trans. Comput. 54 (2005), no. 7, 800–812.
  17. H. Vandierendonck, P. Manet, and J.-D. Legat, Application-specific reconfigurable XOR-indexing to eliminate cache conflict misses, in: Proceedings of the Design Automation & Test in Europe Conference, IEEE, 2006, pp. 357–362.
DOI: https://doi.org/10.2478/amsil-2025-0018 | Journal eISSN: 2391-4238 | Journal ISSN: 0860-2107
Language: English
Submitted on: Jul 7, 2025
Accepted on: Oct 26, 2025
Published on: Nov 15, 2025
Published by: University of Silesia in Katowice, Institute of Mathematics
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year
Keywords:

© 2025 Radosław Łukasik, published by University of Silesia in Katowice, Institute of Mathematics
This work is licensed under the Creative Commons Attribution 4.0 License.

AHEAD OF PRINT