Sciweavers

178 search results - page 23 / 36
» An Application of Program Derivation Techniques to 18th-Cent...
Sort
View
ISI
2008
Springer
13 years 8 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
SIAMSC
2008
191views more  SIAMSC 2008»
13 years 8 months ago
ORBIT: Optimization by Radial Basis Function Interpolation in Trust-Regions
Abstract. We present a new derivative-free algorithm, ORBIT, for unconstrained local optimization of computationally expensive functions. A trust-region framework using interpolati...
Stefan M. Wild, Rommel G. Regis, Christine A. Shoe...
AAAI
2006
13 years 10 months ago
Exploring GnuGo's Evaluation Function with a SVM
While computers have defeated the best human players in many classic board games, progress in Go remains elusive. The large branching factor in the game makes traditional adversar...
Christopher Fellows, Yuri Malitsky, Gregory Wojtas...
JAR
2008
89views more  JAR 2008»
13 years 8 months ago
An Extensible Encoding of Object-oriented Data Models in hol
Abstract We present an extensible encoding of object-oriented data models into higherorder logic (HOL). Our encoding is supported by a datatype package that leverages the use of th...
Achim D. Brucker, Burkhart Wolff
SIGCSE
2003
ACM
198views Education» more  SIGCSE 2003»
14 years 1 months ago
Computer graphics in undergraduate computational science education
Computer graphics forms an important part of a working scientist’s tools. This may be provided by resources with the scientist’s group or by capabilities of the toolkits that ...
Steve Cunningham, Angela B. Shiflet