2672 Ergebnisse für "computationally"

Computationally efficient implementation of Method of Images in MAT...

... Computationally efficient implementation of Method of Images in MATLAB - Research Collection ... Computationally efficient implementation of Method of Images in MATLAB - Research Collection Header ... Computationally efficient implementation of Method of Images in MATLAB - Research Collection ...

Supplemental material to the paper "Computationally efficient robus...

... it. Supplemental material to the paper " Computationally efficient robust MPC using optimized ... Supplemental material to the paper " Computationally efficient robust MPC using optimized constraint ... Supplemental material to the paper " Computationally efficient robust MPC using optimized constraint ... Supplemental material to the paper " Computationally efficient robust MPC using optimized constraint ...

Computationally approximated solution for the equation for Henssge’...

... straightforward way, solutions to the Henssge equation can be approximated computationally. Abstract Background ... the Henssge equation can be approximated computationally. 19 downloads since 12 months Communities ... Computationally approximated solution for the equation for Henssge’s time of death estimation ... Computationally approximated solution for the equation for Henssge’s time of death estimation ... Computationally approximated solution for the equation for Henssge’s time of death estimation ...

Computationally designed liver-specific transcriptional modules and...

... Computationally designed liver-specific transcriptional modules and hyperactive factor IX improve ... Computationally designed liver-specific transcriptional modules and hyperactive factor IX improve ... Computationally designed liver-specific transcriptional modules and hyperactive factor IX improve ...

Computationally Designed Armadillo Repeat Proteins for Modular Pept...

... Computationally Designed Armadillo Repeat Proteins for Modular Peptide Recognition - Zurich Open ... Computationally Designed Armadillo Repeat Proteins for Modular Peptide Recognition - Zurich Open ... Computationally Designed Armadillo Repeat Proteins for Modular Peptide Recognition - Zurich Open ...

An improved approach for the sensitivity analysis of computationall...

... it. An improved approach for the sensitivity analysis of computationally expensive microscopic ... An improved approach for the sensitivity analysis of computationally expensive microscopic traffic ... An improved approach for the sensitivity analysis of computationally expensive microscopic traffic ... An improved approach for the sensitivity analysis of computationally expensive microscopic traffic ...

Quasi-OTEE versus Kriging-based approach for the sensitivity analys...

... Quasi-OTEE versus Kriging-based approach for the sensitivity analysis of computationally expensive ... Quasi-OTEE versus Kriging-based approach for the sensitivity analysis of computationally expensive ... Quasi-OTEE versus Kriging-based approach for the sensitivity analysis of computationally expensive ...

Parallel Repetition of Computationally Sound Protocols Revisited - ...

... Parallel Repetition of Computationally Sound Protocols Revisited Krzysztof Pietrzak and Douglas ... that this is also true for protocols where the soundness only holds against computationally bounded ... Parallel Repetition of Computationally Sound Protocols Revisited - Information Security and ... Parallel Repetition of Computationally Sound Protocols Revisited - Information Security and ... Parallel Repetition of Computationally Sound Protocols Revisited - Information Security and ...

Information-Theoretically and Computationally Secure Key Agreement ...

... Information-Theoretically and Computationally Secure Key Agreement in Cryptography Stefan Wolf PhD ... discrete-logarithm problem are computationally equivalent for certain, but not for all group orders. The ... Information-Theoretically and Computationally Secure Key Agreement in Cryptography - Information ... Information-Theoretically and Computationally Secure Key Agreement in Cryptography - Information ... Information-Theoretically and Computationally Secure Key Agreement in Cryptography - Information ...

TetraBox: Advanced Simulation With Physics-Driven Computation

... . Traditional Monte Carlo methods were computationally expensive and time-consuming, limiting their ability to ... methods were computationally expensive and time-consuming, limiting their ability to assess risks and ...

Mehr Ergebnisse

Nach oben