
MATSLISE
 Referenced in 54 articles
[sw00559]
 highorder piecewise constant perturbation methods, a technique described by Ixaru. For a welloutlined...

PERSYS
 Referenced in 6 articles
[sw00702]
 accurate method, which consists of a perturbative technique in which the centrifugal term is taken ... rest of terms are seen as a perturbation...

onlinePCA
 Referenced in 4 articles
[sw21315]
 current context of data explosion, online techniques that do not require storing all data ... main approaches to online PCA, namely, perturbation techniques, incremental methods, and stochastic optimization, and compare...

ipfilter
 Referenced in 72 articles
[sw04778]
 proposes an algorithm which uses the filter technique of Fletcher and Leyffer to globalize ... primaldual step obtained from the perturbed firstorder necessary conditions into a normal...

FRAPP
 Referenced in 3 articles
[sw08861]
 mining process, a variety of techniques based on random perturbation of individual data records have ... systematic approach to the design of perturbation mechanisms for privacypreserving mining. Specifically, FRAPP ... prior techniques differ only in their choices for the perturbation matrix elements ... generalpurpose randomperturbationbased privacypreserving mining technique, is evaluated specifically with regard...

xPert
 Referenced in 20 articles
[sw06827]
 perturbation of curvature tensors and their gauge changes, and the use of highly efficient techniques...

MBnumerics
 Referenced in 5 articles
[sw31434]
 MellinBarnes (MB) techniques applied to integrals emerging in particle physics perturbative calculations are summarized...

FLUVSIM
 Referenced in 9 articles
[sw40401]
 simulated annealing and nonrandom perturbation rules for conditioning to extensive soft faciesproportion data ... local well data. Objectbased modeling techniques are widely applicable to modeling fluvial depositional systems...

VASP
 Referenced in 16 articles
[sw19550]
 quasiparticles, and ACFDTRPA) and manybody perturbation theory (2ndorder MøllerPlesset) are available ... makes use of efficient iterative matrix diagonalisation techniques, like the residual minimisation method with direct...

VFC package
 Referenced in 18 articles
[sw16729]
 necessarily cut out transversally. Such techniques have the potential for applications as foundations for invariants ... geometric (in particular, we do not use perturbation). Sheaftheoretic tools play an important role...

CRYSCOR
 Referenced in 5 articles
[sw20310]
 level (presently local second order MøllerPlesset Perturbation Theory — LMP2). It uses the HartreeFock ... that applied in the corresponding molecular techniques, e.g. in the MOLPRO package. TwoElectron integrals...

quadprogIP
 Referenced in 7 articles
[sw36327]
 nonconvex quadratic programs via linear integer programming techniques . We reformulate a (indefinite) quadratic program ... fundamental results on the solution of perturbed linear systems to impose bounds...

HOPPET
 Referenced in 6 articles
[sw10645]
 Higher Order Perturbative Parton Evolution Toolkit (HOPPET). This document describes a Fortran 95 package ... piecewise polynomial basis functions, and RungeKutta techniques are used for the evolution...

ScanView
 Referenced in 6 articles
[sw07700]
 widespread audience. We have investigated techniques for protecting 3D graphics content, and we have developed ... monitoring and limiting request streams, and slightly perturbing and distorting the rendered images. We consider...

NETWRK
 Referenced in 3 articles
[sw35106]
 ecosystem may be reacting to a perturbation are often manifested first as changes ... ecological software. NETWRK consolidates four analytical techniques: (1) The study of indirect trophic effects allows...

muView
 Referenced in 1 article
[sw18626]
 surrounding the ischemic zone and identify how perturbations of variables change the propagation of their ... addition to presenting a collection of visualization techniques, which individually highlight different aspects...

ADMP
 Referenced in 2 articles
[sw36681]
 boundary value problems with initial conditions. This technique is based on a new definition ... algorithm. The algorithm does not require linearization, perturbation, predicting the initial terms...

MeLIME
 Referenced in 1 article
[sw38487]
 produces more meaningful explanations compared to other techniques over different ML models, operating on various ... generalizes the LIME method, allowing more flexible perturbation sampling and the use of different local...

GeNGe
 Referenced in 3 articles
[sw29326]
 accelerated by the advent of new experimental techniques, such as RNA interference. A battery ... option to introduce global and local network perturbations. Resulting data can be used...