Showing 1,801 - 1,820 results of 7,728 for search '(programa OR programs) computational', query time: 0.17s Refine Results
  1. 1801
  2. 1802

    Quadrotor Trajectory Planning with Tetrahedron Partitions and B-Splines in Unknown and Dynamic Environments by Jiayu Men, Jesús Requena Carrión

    Published 2024-12-01
    “…Furthermore, our method can reduce the computational burden caused by moving obstacles during trajectory replanning.…”
    Get full text
    Article
  3. 1803

    Multiple‐input multiple‐output with frequency diverse array radar transmit beamforming design for low‐probability‐of‐intercept in cluttered environments by Panke Jiang, Pengcheng Gong, Yuntao Wu, Xiong Deng

    Published 2022-09-01
    “…To this end, a constrained multiple‐ratio fractional programming model with concerning the transmit beam matrix and the receive filter is first constructed, and then, it is transformed into two suboptimisation problems using a circular iterative approach. …”
    Get full text
    Article
  4. 1804

    Learning-Free Unsupervised Extractive Summarization Model by Myeongjun Jang, Pilsung Kang

    Published 2021-01-01
    “…To achieve this, we formulate an integer programming problem based on pre-trained sentence embedding vectors. …”
    Get full text
    Article
  5. 1805

    Optimal Power Procurement for Green Cellular Wireless Networks Under Uncertainty and Chance Constraints by Nadhir Ben Rached, Shyam Mohan Subbiah Pillai, Raúl Tempone

    Published 2025-03-01
    “…This probabilistic constraint prevents using the dynamic programming principle to solve the stochastic optimal control problem. …”
    Get full text
    Article
  6. 1806
  7. 1807
  8. 1808
  9. 1809

    Maritime inventory routing with an application to fish feed distribution by Anders Bjelland, Aksel Borgen, Sjur Wold, Kjetil Fagerholt, Dimitri J. Papageorgiou, Kristian Thun, Simen Tung Vadseth

    Published 2025-12-01
    “…We perform a computational study on a number of realistic test instances generated using data from one of Norway’s largest fish feed suppliers. …”
    Get full text
    Article
  10. 1810

    PyBrook—A Python framework for processing and visualising real-time data by Michał Rokita, Mateusz Modrzejewski, Przemysław Rokita

    Published 2025-05-01
    “…In this paper, we present PyBrook - an original real-time cloud computing framework for the Internet of Things. PyBrook enables users to define complex data processing models declaratively, using the Python programming language. …”
    Get full text
    Article
  11. 1811
  12. 1812

    Modeling the Effect of Prior Knowledge on Memory Efficiency for the Study of Transfer of Learning: A Spiking Neural Network Approach by Mojgan Hafezi Fard, Krassie Petrova, Nikola Kirilov Kasabov, Grace Y. Wang

    Published 2025-06-01
    “…This study uses a cognitive computing approach to identify and explore brain activity patterns related to memory efficiency in the context of learning a new programming language. …”
    Get full text
    Article
  13. 1813
  14. 1814
  15. 1815

    Art and Language After AI by Anil Bawa-Cavia

    Published 2024-07-01
    “…Throughout I will endorse a topological view of computation, which will inform the neural turn in computer science, characterised as a shift from the notion of a stored program to that of a cognitive model. …”
    Get full text
    Article
  16. 1816

    TPCM-based trusted PXE boot method for servers by Guojie LIU, Jianbiao ZHANG

    Published 2020-12-01
    “…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
    Get full text
    Article
  17. 1817

    Constraining Free Merge by Jason Ginsburg

    Published 2024-12-01
    “…Some recent influential work in the Minimalist Program takes the position that Merge, the core language ability to recursively combine two elements together, is free. …”
    Get full text
    Article
  18. 1818

    APLIKASI PERANGKAT LUNAK BERBASIS MATLAB UNTUK PENGUKURAN RADIOGRAF DIGITAL by Susilo -, S. B. Wahyu, Kusminarto -

    Published 2013-01-01
    “…<p>Telah dilakukan pengukuran densitas optis terhadap radiograf digital citra stepwedge aluminium standart menggunakan perangkat lunak berbasis Matlab pada sistem radiografi Computed Radiography. Data hasil pemotretan berupa file radiograf citra stepwedge dianalisis menggunakan perangkat ukur densitas optis (derajat kehitaman) dari film radiograf berupa densitometer optis sebagai pembanding dan menggunakan perangkat lunak hasil rekayasa berbasis program aplikasi Matlab 7.1. …”
    Get full text
    Article
  19. 1819

    International Cybersecurity on Railway Transport: Methodological Approaches and Normal Procedural Framework by S. E. Adadurov, S. V. Diasamidze, A. A. Kornienko, A. A. Sidak

    Published 2015-12-01
    “…There is presented classification of the types of computer attacks and their implementation me-dia. Also discussed are organizational and routine hacking countermeasures to be taken in the railway IT infrastructure environment.…”
    Get full text
    Article
  20. 1820

    La LÓGICA MATEMÁTICA DESDE LAS DISCIPLINAS CIENTÍFICAS DE INFORMÁTICA by YUDELKIS VALDERRAMA GARRIDO, WALFREDO GONZÁLEZ HERNÁNDEZ

    Published 2019-07-01
    “…For this reason, the importance of Mathematical Logic and its deep relationship with Computer Science isaddressed, specifying its link with the main disciplines: Database, Programming, Software Engineering, ComputerArchitecture and Artificial Intelligence. …”
    Get full text
    Article