Results 61 to 70 of about 322,113 (276)

A Q‐Learning Algorithm to Solve the Two‐Player Zero‐Sum Game Problem for Nonlinear Systems

open access: yesInternational Journal of Adaptive Control and Signal Processing, Volume 39, Issue 3, Page 566-581, March 2025.
A Q‐learning algorithm to solve the two‐player zero‐sum game problem for nonlinear systems. ABSTRACT This paper deals with the two‐player zero‐sum game problem, which is a bounded L2$$ {L}_2 $$‐gain robust control problem. Finding an analytical solution to the complex Hamilton‐Jacobi‐Issacs (HJI) equation is a challenging task.
Afreen Islam   +2 more
wiley   +1 more source

What Do Large Language Models Know About Materials?

open access: yesAdvanced Engineering Materials, EarlyView.
If large language models (LLMs) are to be used inside the material discovery and engineering process, they must be benchmarked for the accurateness of intrinsic material knowledge. The current work introduces 1) a reasoning process through the processing–structure–property–performance chain and 2) a tool for benchmarking knowledge of LLMs concerning ...
Adrian Ehrenhofer   +2 more
wiley   +1 more source

A Lightweight Procedural Layer for Hybrid Experimental–Computational Workflows in Materials Science

open access: yesAdvanced Engineering Materials, EarlyView.
We unveil a prototype hybrid‐workflow framework that fuses automatedcomputation with hands‐on experiments. Built atop pyiron, a lightweight, parameterized layer translates procedure descriptions into executable manual steps, syncing instrument settings, human interventions, and data capture in real‐time today.
Steffen Brinckmann   +8 more
wiley   +1 more source

Dark triad and knowledge hiding in firms: Mediating role of perceived organizational politics

open access: yesActa Psychologica
Negative behaviors at the workplace always disturb the management of the firms. This research investigates the link between the dark triad and various types of Knowledge hiding (Evasive hiding, Playing dumb, and Rationalized hiding) in firms. In addition,
Yiyu Wang   +3 more
doaj   +1 more source

Managing Communication Latency-Hiding at Runtime for Parallel Programming Languages and Libraries

open access: yes, 2012
This work introduces a runtime model for managing communication with support for latency-hiding. The model enables non-computer science researchers to exploit communication latency-hiding techniques seamlessly.
Kristensen, Mads Ruben Burgdorff   +1 more
core   +1 more source

Workflow for Design of Experiments‐Based Modeling of Species Transport and Growth Kinetics in GaN Hydride Vapor Phase Epitaxy

open access: yesAdvanced Engineering Materials, EarlyView.
A novel workflow for investigating hydride vapor phase epitaxy for GaN bulk crystal growth is proposed. It combines Design of experiments (DoE) with physical simulations of mass transport and crystal growth kinetics, serving as an intermediate step between DoE and experiments.
J. Tomkovič   +7 more
wiley   +1 more source

NanoMOF‐Based Multilevel Anti‐Counterfeiting by a Combination of Visible and Invisible Photoluminescence and Conductivity

open access: yesAdvanced Functional Materials, EarlyView.
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner   +9 more
wiley   +1 more source

Personality Traits, Knowledge-Hiding Behavior and Job Performance of Employees

open access: yesFoundations of Management
The banking sector is knowledge intensive and faces increasing competitive pressure. Knowledge hiding can undermine job performance and erode an organization’s competitive advantage.
HANG Nga Nguyen THI, KIM Nam Nguyen
doaj   +1 more source

Automated Cryptographic Analysis of the Pedersen Commitment Scheme

open access: yes, 2017
Aiming for strong security assurance, recently there has been an increasing interest in formal verification of cryptographic constructions. This paper presents a mechanised formal verification of the popular Pedersen commitment protocol, proving its ...
Dong, Changyu, Metere, Roberto
core   +1 more source

Multi-Prover Commitments Against Non-Signaling Attacks [PDF]

open access: yes, 2015
We reconsider the concept of multi-prover commitments, as introduced in the late eighties in the seminal work by Ben-Or et al. As was recently shown by Cr\'{e}peau et al., the security of known two-prover commitment schemes not only relies on the ...
A Kent   +9 more
core   +3 more sources

Home - About - Disclaimer - Privacy