Sciweavers

5647 search results - page 1126 / 1130
» A word from the editor
Sort
View
EVOW
2011
Springer
12 years 11 months ago
Market Microstructure: Can Dinosaurs Return? A Self-Organizing Map Approach under an Evolutionary Framework
This paper extends a previous model where we examined the markets’ microstructure dynamics by using Genetic Programming as a trading rule inference engine, and Self Organizing Ma...
Michael Kampouridis, Shu-Heng Chen, Edward P. K. T...
ISPEC
2011
Springer
12 years 10 months ago
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
The AES block cipher has a 128-bit block length and a user key of 128, 192 or 256 bits, released by NIST for data encryption in the USA; it became an ISO international standard in ...
Yongzhuang Wei, Jiqiang Lu, Yupu Hu
JCC
2011
154views more  JCC 2011»
12 years 10 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
MP
2011
12 years 10 months ago
An interior-point piecewise linear penalty method for nonlinear programming
We present an interior-point penalty method for nonlinear programming (NLP), where the merit function consists of a piecewise linear penalty function (PLPF) and an 2-penalty functi...
Lifeng Chen, Donald Goldfarb
SCL
2011
12 years 10 months ago
Regularity issues for the null-controllability of the linear 1-d heat equation
The fact that the heat equation is controllable to zero in any bounded domain of the euclidean space, any time T > 0 and from any open subset of the boundary is well known. On ...
Sorin Micu, Enrique Zuazua
« Prev « First page 1126 / 1130 Last » Next »