Sciweavers

5647 search results - page 1126 / 1130
» A word from the editor
Sort
View
EVOW
2011
Springer
14 years 3 months ago
Market Microstructure: Can Dinosaurs Return? A Self-Organizing Map Approach under an Evolutionary Framework
This paper extends a previous model where we examined the markets’ microstructure dynamics by using Genetic Programming as a trading rule inference engine, and Self Organizing Ma...
Michael Kampouridis, Shu-Heng Chen, Edward P. K. T...
ISPEC
2011
Springer
14 years 2 months ago
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
The AES block cipher has a 128-bit block length and a user key of 128, 192 or 256 bits, released by NIST for data encryption in the USA; it became an ISO international standard in ...
Yongzhuang Wei, Jiqiang Lu, Yupu Hu
JCC
2011
154views more  JCC 2011»
14 years 2 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
MP
2011
14 years 2 months ago
An interior-point piecewise linear penalty method for nonlinear programming
We present an interior-point penalty method for nonlinear programming (NLP), where the merit function consists of a piecewise linear penalty function (PLPF) and an 2-penalty functi...
Lifeng Chen, Donald Goldfarb
SCL
2011
14 years 2 months ago
Regularity issues for the null-controllability of the linear 1-d heat equation
The fact that the heat equation is controllable to zero in any bounded domain of the euclidean space, any time T > 0 and from any open subset of the boundary is well known. On ...
Sorin Micu, Enrique Zuazua
« Prev « First page 1126 / 1130 Last » Next »