Results 11 to 20 of about 597,383 (289)

Influence of Binomial Crossover on Approximation Error of Evolutionary Algorithms

open access: yesMathematics, 2022
Although differential evolution (DE) algorithms perform well on a large variety of complicated optimization problems, only a few theoretical studies are focused on the working principle of DE algorithms.
Cong Wang, Jun He, Yu Chen, Xiufen Zou
doaj   +1 more source

Efficient computation for differential network analysis with applications to quadratic discriminant analysis

open access: yesComputational Statistics & Data Analysis, 2020
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yuqing Pan, Qing Mai
openaire   +2 more sources

Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
White-box cryptography is the last security barrier for a cryptographic software implementation deployed in an untrusted environment. The principle of internal encodings is a commonly used white-box technique to protect block cipher implementations.
Matthieu Rivain, Junwei Wang
doaj   +1 more source

Sensitivities via Rough Paths [PDF]

open access: yes, 2014
Motivated by a problematic coming from mathematical finance, this paper is devoted to existing and additional results of continuity and differentiability of the It\^o map associated to rough differential equations.
Marie, Nicolas
core   +4 more sources

A Fast High-Order Predictor–Corrector Method on Graded Meshes for Solving Fractional Differential Equations

open access: yesFractal and Fractional, 2022
In this paper, we focus on the computation of Caputo-type fractional differential equations. A high-order predictor–corrector method is derived by applying the quadratic interpolation polynomial approximation for the integral function.
Xinxin Su, Yongtao Zhou
doaj   +1 more source

Accuracy First: Selecting a Differential Privacy Level for Accuracy-Constrained ERM

open access: yesThe Journal of Privacy and Confidentiality, 2019
Traditional approaches to differential privacy assume a fixed privacy requirement ε for a computation, and attempt to maximize the accuracy of the computation subject to the privacy constraint.
Steven Wu   +4 more
doaj   +1 more source

Polynomial Time corresponds to Solutions of Polynomial Ordinary Differential Equations of Polynomial Length [PDF]

open access: yes, 2016
We provide an implicit characterization of polynomial time computation in terms of ordinary differential equations: we characterize the class $\operatorname{PTIME}$ of languages computable in polynomial time in terms of differential equations with ...
Bournez, Olivier   +2 more
core   +3 more sources

A differential algebra based importance sampling method for impact probability computation on Earth resonant returns of Near Earth Objects [PDF]

open access: yes, 2018
A differential algebra based importance sampling method for uncertainty propagation and impact probability computation on the first resonant returns of Near Earth Objects is presented in this paper.
Armellin, Roberto   +3 more
core   +2 more sources

Stability Analysis of Complex-Valued Nonlinear Differential System

open access: yesJournal of Applied Mathematics, 2013
This paper studies the stability of complex-valued nonlinear differential system. The stability criteria of complex-valued nonlinear autonomous system are established.
Tao Fang, Jitao Sun
doaj   +1 more source

The Analysis of Fractional-Order Proportional Delay Physical Models via a Novel Transform

open access: yesComplexity, 2022
In this paper, we deal with an alternative analytical analysis of fractional-order partial differential equations with proportional delay, achieved by applying Yang decomposition method, where the fractional derivative is taken in Caputo sense.
Meshari Alesemi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy