Computational mathematics

Results: 4662



#Item
651

Optimization Methods and Software, Vol.11&12, pp, 1999 User’s Guide to LIPSOL Linear-programming Interior Point Solvers v0.4 ∗ Yin Zhang Department of Computational and Applied Mathematics

Add to Reading List

Source URL: www.caam.rice.edu

Language: English - Date: 2003-12-22 11:07:25
    652

    Stabilization to a nonstationary solution for the equations of fluid mechanics S´ergio S. Rodrigues ¨ Johann Radon Institute for Computational and Applied Mathematics, OAW, Austria,

    Add to Reading List

    Source URL: gfm.cii.fc.ul.pt

    Language: English - Date: 2014-04-15 07:30:24
      653Complexity classes / Mathematical optimization / NP-complete problems / Structural complexity theory / NP-hard / NP-complete / Dead-end elimination / NP / P / Theoretical computer science / Computational complexity theory / Applied mathematics

      Protein Engineering vol.15 no.10 pp.779–782, 2002 Protein Design is NP-hard Niles A.Pierce1,2 and Erik Winfree3 1Applied

      Add to Reading List

      Source URL: www.piercelab.caltech.edu

      Language: English - Date: 2010-09-08 02:56:32
      654Computational science / Theoretical chemistry / Numerical analysis / Computational physics / Partial differential equations / Computational electromagnetics / Computational chemistry / Algorithm / Wavelet / Science / Chemistry / Mathematics

      Advanced Scientific Computing Research FY 2004 Accomplishment Scientific Application Prototype Project Fundamental Algorithms for Advanced Applications in Science and Technology-Low Separation Rank Approximations for

      Add to Reading List

      Source URL: www.csm.ornl.gov

      Language: English - Date: 2006-06-16 09:46:25
      655Applied mathematics / Quantum complexity theory / Computational complexity theory / Secure multi-party computation / Communication complexity / Secure two-party computation / PP / One-way function / IP / Cryptography / Theoretical computer science / Cryptographic protocols

      Efficient Set Intersection with Simulation-Based Security Michael J. Freedman∗ Carmit Hazay† Kobbi Nissim‡

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2014-09-04 05:09:56
      656Estimation theory / Neural networks / Matrices / Computational neuroscience / Differential calculus / Fisher information / Maximum likelihood / Gradient / Linear map / Mathematics / Mathematical analysis / Calculus

      Optimizing Neural Networks with Kronecker-factored Approximate Curvature James Martens Roger Grosse Department of Computer Science, University of Toronto

      Add to Reading List

      Source URL: www.cs.toronto.edu

      Language: English - Date: 2015-06-03 15:15:50
      657Information science / Delaunay triangulation / Voronoi diagram / Priority queue / Z-order curve / Quadtree / Computational geometry / Point location / Nearest neighbor search / Triangulation / Geometry / Mathematics

      1 Introduction Triangulated spatial models and neighbourhood search: an experimental comparison

      Add to Reading List

      Source URL: users.cs.cf.ac.uk

      Language: English - Date: 2005-12-09 06:20:39
      658Biology / Cybernetics / Bioinformatics / Systems / Mathematical and theoretical biology / Applied mathematics / Courant Institute of Mathematical Sciences / Computational neuroscience / Neuroscience / Science / Knowledge / Interdisciplinary fields

      Kreˇsimir Josi´c Department of Mathematics Houston, TX 77204–Phone: (

      Add to Reading List

      Source URL: www.math.uh.edu

      Language: English - Date: 2013-08-15 16:52:55
      659San Diego Supercomputer Center / University of California /  San Diego / Supercomputers / Computational science / Petascale / Computer science / Engineering / Computing / Cyberinfrastructure / E-Science

      Postdoctoral Scholar Research Opportunity at SDSC Academic Division: Engineering, Mathematics, Natural and Physical Sciences Academic Department/Research Unit: Computer Science and Engineering, Electrical and Computer En

      Add to Reading List

      Source URL: hpgeoc.sdsc.edu

      Language: English - Date: 2014-08-07 19:15:29
      660Computational complexity theory / Applied mathematics / Cryptography / Mathematics / Message authentication codes / Cryptographic hash functions / VEST

      A New Approach to Practical Active-Secure Two-Party Computation 1 1

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2012-02-14 09:50:59
      UPDATE