{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T05:55:18Z","timestamp":1725342918064},"reference-count":32,"publisher":"EDP Sciences","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["RAIRO-Oper. Res."],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1051\/ro\/2014034","type":"journal-article","created":{"date-parts":[[2014,12,16]],"date-time":"2014-12-16T15:57:28Z","timestamp":1418745448000},"page":"39-66","source":"Crossref","is-referenced-by-count":3,"title":["A complete classification of equational classes of threshold functions included in clones"],"prefix":"10.1051","volume":"49","author":[{"given":"Miguel","family":"Couceiro","sequence":"first","affiliation":[]},{"given":"Erkko","family":"Lehtonen","sequence":"additional","affiliation":[]},{"given":"Karsten","family":"Sch\u00f6lzel","sequence":"additional","affiliation":[]}],"member":"250","published-online":{"date-parts":[[2014,12,17]]},"reference":[{"key":"R1","doi-asserted-by":"crossref","unstructured":"Bioch J.C. and TIbaraki , Generating and approximating nondominated coteries.IEEE Trans. Parallel Distrib. Syst.6(1995) 905\u2013914.","DOI":"10.1109\/71.466629"},{"key":"R2","doi-asserted-by":"crossref","unstructured":"V.G. Bodnar\u010duk, L.A. Kalu\u017enin, V.N. Kotov and B.A. Romov, Galois theory for Post algebras, I, II, Kibernetika3, 1\u201310,5, 1\u20139 (1969) (Russian). English translation:Cybernetics5, 243\u2013252, 531\u2013539 (1969)","DOI":"10.1007\/BF01267873"},{"key":"R3","unstructured":"Chow C.K., Boolean functions realizable with single threshold devices.Proc. Inst. Radio Engineers49(1961) 370\u2013371."},{"key":"R4","unstructured":"Couceiro M., On Galois connections between external functions and relational constraints: arity restrictions and operator decompositions,Acta Sci. Math. (Szeged)72(2006) 15\u201335."},{"key":"R5","doi-asserted-by":"crossref","unstructured":"Couceiro M. and Foldes S., On closed sets of relational constraints and classes of functions closed under variable substitution,Algebra Universalis54(2005) 149\u2013165.","DOI":"10.1007\/s00012-005-1933-1"},{"key":"R6","doi-asserted-by":"crossref","unstructured":"Couceiro M. and Lehtonen E., On the effect of variable identification on the essential arity of functions on finite sets.Int. J. Found. Comput. Sci.18(2007) 975\u2013986.","DOI":"10.1142\/S012905410700508X"},{"key":"R7","unstructured":"Couceiro M. and Lehtonen E., Generalizations of \u015awierczkowski\u2019s lemma and the arity gap of finite functions,Discrete Math.309(2009) 5905\u20135912."},{"key":"R8","doi-asserted-by":"crossref","unstructured":"Couceiro M. and Marichal J.-L., Discrete integrals based on comonotonic modularity,Axioms2(2013) 390\u2013403.","DOI":"10.3390\/axioms2030390"},{"key":"R9","unstructured":"Couceiro M. and Pouzet M., On a quasi-ordering on Boolean functions.Theoret. Comput. Sci.396(2008) 71\u201387."},{"key":"R10","unstructured":"Couceiro M., Foldes S. and Lehtonen E., Composition of Post classes and normal forms of Boolean functions,Discrete Math.306(2006) 3223\u20133243."},{"key":"R11","doi-asserted-by":"crossref","unstructured":"K. Denecke, M. Ern\u00e9 and S.L. Wismath,Galois Connections and Applications, Kluwer Academic Publishers, Dordrecht (2004)","DOI":"10.1007\/978-1-4020-1898-5"},{"key":"R12","unstructured":"Ekin O., Foldes S., Hammer P.L. and Hellerstein L., Equational characterizations of Boolean function classes.Discrete Math.211(2000) 27\u201351."},{"key":"R13","doi-asserted-by":"crossref","unstructured":"C.C. Elgot, Truth functions realizable by single threshold organs, AIEE Conf. Paper 60-1311, Oct. 1960, revised Nov. 1960; alsoIEEE Symposium on Swithing Circuit Theory and Logical Design(1961) 225\u2013245.","DOI":"10.1109\/FOCS.1961.39"},{"key":"R14","unstructured":"Foldes S. and Pogosyan G.R., Post classes characterized by functional terms.Discrete Appl. Math.142(2004) 35\u201351."},{"key":"R15","doi-asserted-by":"crossref","unstructured":"Geiger D., Closed systems of functions and predicates,Pacific J. Math.27(1968) 95\u2013100.","DOI":"10.2140\/pjm.1968.27.95"},{"key":"R16","doi-asserted-by":"crossref","unstructured":"Hellerstein L., On generalized constraints and certificates,Discrete Math.226(2001) 211\u2013232.","DOI":"10.1016\/S0012-365X(00)00166-7"},{"key":"R17","unstructured":"Isbell J.R., A class of majority games,Q. J. Math.7(1956) 183\u2013187."},{"key":"R18","doi-asserted-by":"crossref","unstructured":"S.W. Jablonski, G.P. Gawrilow and W.B. Kudrjawzew,Boolesche Funktionen und Postsche Klassen, Vieweg, Braunschweig (1970).","DOI":"10.1515\/9783112649282"},{"key":"R19","unstructured":"Jeroslow R.G., On defining sets of vertices of the hypercube by linear inequalities,Discrete Math.11(1975) 119\u2013124."},{"key":"R20","unstructured":"D. Lau,Function Algebras on Finite Sets.Springer-Verlag, Berlin, Heidelberg (2006)"},{"key":"R21","unstructured":"S.R. Lay,Convex sets and their applications, Dover (2007)."},{"key":"R22","doi-asserted-by":"crossref","unstructured":"L. Lov\u00e1sz,Submodular functions and convexity, Mathematical programming, in proc. 11th int. Symp., Bonn (1982) 235\u2013257.","DOI":"10.1007\/978-3-642-68874-4_10"},{"key":"R23","unstructured":"S. Muroga,Threshold logic and its applications, Wiley-Interscience, New York (1971)"},{"key":"R24","unstructured":"Peleg B., A theory of coalition formation in committees, J. Math. Econom.7115\u2013134 (1980)"},{"key":"R25","doi-asserted-by":"crossref","unstructured":"Peleg B., Coalition formation in simple games with dominant players,Int. J. Game Theory10(1981) 11\u201333.","DOI":"10.1007\/BF01770068"},{"key":"R26","unstructured":"Pippenger N., Galois theory for minors of finite functions.Discrete Math.254(2002) 405\u2013419."},{"key":"R27","unstructured":"R. P\u00f6schel, Concrete representation of algebraic structures and a general Galois theory, inContributions to General Algebra (Proc. Klagenfurt Conf., 1978),edited by H. Kautschitsch, W.B. M\u00fcller and W. N\u00f6bauer, Verlag Johannes Heyn, Klagenfurt (1979) 249\u2013272."},{"key":"R28","unstructured":"E. Post,The Two-Valued Iterative Systems of Mathematical Logic, Annals of Mathematical Studies,Vol. 5, Princeton University Press, Princeton, NJ (1941)"},{"key":"R29","unstructured":"Singer I., Extensions of functions of 0-1 variables and applications to combinatorial optimization.Numer. Funct. Anal. Optim.7(1984) 23\u201362."},{"key":"R30","doi-asserted-by":"crossref","unstructured":"Taylor A. and Zwicker W., Simple games and magic squares.J. Combin. Theory Ser. A71(1995) 67\u201388.","DOI":"10.1016\/0097-3165(95)90016-0"},{"key":"R31","unstructured":"Topkis D.M., Minimizing a submodular function on a lattice.Oper. Res.26(1978) 305\u2013321."},{"key":"R32","unstructured":"R.O. Winder,Threshold Logic, Ph.D. thesis, Mathematics Department, Princeton University (1962)."}],"container-title":["RAIRO - Operations Research"],"original-title":[],"link":[{"URL":"http:\/\/www.rairo-ro.org\/10.1051\/ro\/2014034\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,30]],"date-time":"2023-07-30T18:25:08Z","timestamp":1690741508000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.rairo-ro.org\/10.1051\/ro\/2014034"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,17]]},"references-count":32,"journal-issue":{"issue":"1"},"alternative-id":["ro140034"],"URL":"https:\/\/doi.org\/10.1051\/ro\/2014034","relation":{},"ISSN":["0399-0559","1290-3868"],"issn-type":[{"value":"0399-0559","type":"print"},{"value":"1290-3868","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,17]]}}}