• MATSLISE

  • Referenced in 54 articles [sw00559]
  • high-order piecewise constant perturbation methods, a technique described by Ixaru. For a well-outlined...
  • PERSYS

  • Referenced in 6 articles [sw00702]
  • accurate method, which consists of a perturbative technique in which the centrifugal term is taken ... rest of terms are seen as a perturbation...
  • onlinePCA

  • Referenced in 4 articles [sw21315]
  • current context of data explosion, online techniques that do not require storing all data ... main approaches to online PCA, namely, perturbation techniques, incremental methods, and stochastic optimization, and compare...
  • ipfilter

  • Referenced in 72 articles [sw04778]
  • proposes an algorithm which uses the filter technique of Fletcher and Leyffer to globalize ... primal-dual step obtained from the perturbed first-order necessary conditions into a normal...
  • FRAPP

  • Referenced in 3 articles [sw08861]
  • mining process, a variety of techniques based on random perturbation of individual data records have ... systematic approach to the design of perturbation mechanisms for privacy-preserving mining. Specifically, FRAPP ... prior techniques differ only in their choices for the perturbation matrix elements ... general-purpose random-perturbation-based privacy-preserving mining technique, is evaluated specifically with regard...
  • xPert

  • Referenced in 20 articles [sw06827]
  • perturbation of curvature tensors and their gauge changes, and the use of highly efficient techniques...
  • MBnumerics

  • Referenced in 5 articles [sw31434]
  • Mellin-Barnes (MB) techniques applied to integrals emerging in particle physics perturbative calculations are summarized...
  • FLUVSIM

  • Referenced in 9 articles [sw40401]
  • simulated annealing and non-random perturbation rules for conditioning to extensive soft facies-proportion data ... local well data. Object-based modeling techniques are widely applicable to modeling fluvial depositional systems...
  • VASP

  • Referenced in 16 articles [sw19550]
  • quasiparticles, and ACFDT-RPA) and many-body perturbation theory (2nd-order Møller-Plesset) are available ... makes use of efficient iterative matrix diagonalisation techniques, like the residual minimisation method with direct...
  • VFC package

  • Referenced in 18 articles [sw16729]
  • necessarily cut out transversally. Such techniques have the potential for applications as foundations for invariants ... geometric (in particular, we do not use perturbation). Sheaf-theoretic tools play an important role...
  • CRYSCOR

  • Referenced in 5 articles [sw20310]
  • level (presently local second order Møller-Plesset Perturbation Theory — LMP2). It uses the Hartree-Fock ... that applied in the corresponding molecular techniques, e.g. in the MOLPRO package. Two-Electron integrals...
  • quadprogIP

  • Referenced in 7 articles [sw36327]
  • nonconvex quadratic programs via linear integer programming techniques . We reformulate a (indefinite) quadratic program ... fundamental results on the solution of perturbed linear systems to impose bounds...
  • HOPPET

  • Referenced in 6 articles [sw10645]
  • Higher Order Perturbative Parton Evolution Toolkit (HOPPET). This document describes a Fortran 95 package ... piecewise polynomial basis functions, and Runge-Kutta techniques are used for the evolution...
  • ScanView

  • Referenced in 6 articles [sw07700]
  • widespread audience. We have investigated techniques for protecting 3D graphics content, and we have developed ... monitoring and limiting request streams, and slightly perturbing and distorting the rendered images. We consider...
  • NETWRK

  • Referenced in 3 articles [sw35106]
  • ecosystem may be reacting to a perturbation are often manifested first as changes ... ecological software. NETWRK consolidates four analytical techniques: (1) The study of indirect trophic effects allows...
  • muView

  • Referenced in 1 article [sw18626]
  • surrounding the ischemic zone and identify how perturbations of variables change the propagation of their ... addition to presenting a collection of visualization techniques, which individually highlight different aspects...
  • ADMP

  • Referenced in 2 articles [sw36681]
  • boundary value problems with initial conditions. This technique is based on a new definition ... algorithm. The algorithm does not require linearization, perturbation, predicting the initial terms...
  • MeLIME

  • Referenced in 1 article [sw38487]
  • produces more meaningful explanations compared to other techniques over different ML models, operating on various ... generalizes the LIME method, allowing more flexible perturbation sampling and the use of different local...
  • GeNGe

  • Referenced in 3 articles [sw29326]
  • accelerated by the advent of new experimental techniques, such as RNA interference. A battery ... option to introduce global and local network perturbations. Resulting data can be used...