Results 31 to 40 of about 436,355 (315)

Fast randomized entropically regularized semidefinite programming [PDF]

open access: yesarXiv, 2023
We develop a practical approach to semidefinite programming (SDP) that includes the von Neumann entropy, or an appropriate variant, as a regularization term. In particular we solve the dual of the regularized program, demonstrating how a carefully chosen randomized trace estimator can be used to estimate dual gradients effectively.
arxiv  

Standardized Software Development Model For SME Software Houses In Pakistan

open access: yesJISR on Computing, 2014
There are many software development models that exist for software development like Extreme Programming, Waterfall, Spiral, Agile, RAD, SCRUM etc. These models are very useful for development but its usefulness varies from company to company in nature ...
Asif Mansoori, M. Ejaz Tayab
doaj   +1 more source

Comparative Analysis of Agile Methods for Managing Software Projects [PDF]

open access: yesEuropean Project Management Journal, 2017
The purpose of this paper is to review and compare four of the widely used and referenced agile methods – Spiral model, Dynamic System Development Method, Scrum, and Extreme programming.
Petar Bogojević
doaj  

Bioengineering facets of the tumor microenvironment in 3D tumor models: insights into cellular, biophysical and biochemical interactions

open access: yesFEBS Open Bio, EarlyView.
The tumor microenvironment is a dynamic, multifaceted complex system of interdependent cellular, biochemical, and biophysical components. Three‐dimensional in vitro models of the tumor microenvironment enable a better understanding of these interactions and their impact on cancer progression and therapeutic resistance.
Salma T. Rafik   +3 more
wiley   +1 more source

The AI Definition and a Program Which Satisfies this Definition [PDF]

open access: yesarXiv, 2022
We will consider all policies of the agent and will prove that one of them is the best performing policy. While that policy is not computable, computable policies do exist in its proximity. We will define AI as a computable policy which is sufficiently proximal to the best performing policy.
arxiv  

KCS1 and VIP1, the genes encoding yeast phosphoinositol pyrophosphate synthases, are required for Ca2+‐mediated response to dimethylsulfoxide (DMSO)

open access: yesFEBS Open Bio, EarlyView.
Ca2+‐mediated response to DMSO was investigated in Saccharomyces cerevisiae cells expressing Ca2+‐dependent aequorin. Cell exposure to DMSO induced a cytosolic Ca2+ wave dependent on the integrity of the Cch1/Mid1 channel. Deletion of KCS1 or VIP1 genes encoding the phosphoinositol pyrophosphate (PP‐IP) synthases suppressed the DMSO‐induced Ca2 ...
Larisa Ioana Gogianu   +4 more
wiley   +1 more source

XP PROJECT MANAGEMENT [PDF]

open access: yes, 2007
Extreme programming project management examines software development theory, the extreme programming process, and the essentials of standard project management as applied to software projects. The goal of this thesis is to integrate standard software
Macholz, Craig William
core   +1 more source

User Story Software Estimation:a Simplification of Software Estimation Model with Distributed Extreme Programming Estimation Technique [PDF]

open access: yes, 2011
Software estimation is an area of software engineering concerned with the identification, classification and measurement of features of software that affect the cost of developing and sustaining computer programs [19].
Ashari, A. (Ahmad)   +3 more
core   +3 more sources

The Long Term Effects of a 12‐Session Community Exercise Program on Health Measures in Cancer Patients

open access: yesAging and Cancer, EarlyView.
ABSTRACT Purpose To assess the long‐term effects of a community cancer exercise program on quality of life, fatigue, weight, waist circumference, physical activity levels, lower extremity strength, body mass index (BMI), heart rate, and blood pressure, across non‐metastatic and metastatic patients.
Isaac Oppong, Roozbeh Naemi
wiley   +1 more source

Concrat: An Automatic C-to-Rust Lock API Translator for Concurrent Programs [PDF]

open access: yesarXiv, 2023
Concurrent programs suffer from data races. To prevent data races, programmers use locks. However, programs can eliminate data races only when they acquire and release correct locks at correct timing. The lock API of C, in which people have developed a large portion of legacy system programs, does not validate the correct use of locks.
arxiv  

Home - About - Disclaimer - Privacy