Results 31 to 40 of about 160,535 (190)

Automatic Classification of Restricted Lattice Walks [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2009
We propose an $\textit{experimental mathematics approach}$ leading to the computer-driven $\textit{discovery}$ of various conjectures about structural properties of generating functions coming from enumeration of restricted lattice walks in 2D and in 3D.
Alin Bostan, Manuel Kauers
doaj   +1 more source

Devito: Towards a generic Finite Difference DSL using Symbolic Python

open access: yes, 2016
Domain specific languages (DSL) have been used in a variety of fields to express complex scientific problems in a concise manner and provide automated performance optimization for a range of computational architectures.
Gorman, Gerard   +8 more
core   +1 more source

Online Adaptive Approximate Stream Processing With Customized Error Control

open access: yesIEEE Access, 2019
In approximate processing on stream data, most works focus on how to approximate online arrival data. However, the efficiency of approximation needs to consider multiple aspects.
Xiaohui Wei   +4 more
doaj   +1 more source

Three loop massive operator matrix elements and asymptotic Wilson coefficients with two different masses

open access: yesNuclear Physics B, 2017
Starting at 3-loop order, the massive Wilson coefficients for deep-inelastic scattering and the massive operator matrix elements describing the variable flavor number scheme receive contributions of Feynman diagrams carrying quark lines with two ...
J. Ablinger   +5 more
doaj   +1 more source

Neurons and symbols: a manifesto [PDF]

open access: yes, 2010
We discuss the purpose of neural-symbolic integration including its principles, mechanisms and applications. We outline a cognitive computational model for neural-symbolic integration, position the model in the broader context of multi-agent systems ...
Garcez, A.
core  

Symbolic computation with monotone operators

open access: yes, 2017
We consider a class of monotone operators which are appropriate for symbolic representation and manipulation within a computer algebra system. Various structural properties of the class (e.g., closure under taking inverses, resolvents) are investigated ...
Lauster, Florian   +2 more
core   +1 more source

Symbolic computation and satisfiability checking [PDF]

open access: yesJournal of Symbolic Computation, 2020
Abstract The two communities of Symbolic Computation and Satisfiability Checking have recently found themselves tackling similar problems and having a growing interest in each other's technology. This special issue presents articles whose contribution is of interest to, and is influenced by, both communities.
Davenport, J. H.   +4 more
openaire   +4 more sources

An Iris Image Super-Resolution Model Based on Swin Transformer and Generative Adversarial Network

open access: yesAlgorithms
The process of iris recognition can result in a decline in recognition performance when the resolution of the iris images is insufficient. In this study, a super-resolution model for iris images, namely SwinGIris, which combines the Swin Transformer and ...
Hexin Lu   +3 more
doaj   +1 more source

A Novel Pure Pursuit Algorithm for Autonomous Vehicles Based on Salp Swarm Algorithm and Velocity Controller

open access: yesIEEE Access, 2020
Pure pursuit algorithm is one of the most effective ways of path tracking in autonomous vehicles. Nevertheless, the tracking accuracy of the existing pure pursuit algorithm is limited by the look-ahead distance.
Rui Wang   +4 more
doaj   +1 more source

Lattice Perturbation Theory by Computer Algebra: A Three-Loop Result for the Topological Susceptibility

open access: yes, 1994
We present a scheme for the analytic computation of renormalization functions on the lattice, using a symbolic manipulation computer language. Our first nontrivial application is a new three-loop result for the topological susceptibility.Comment: 15 ...
't Hooft   +28 more
core   +1 more source

Home - About - Disclaimer - Privacy