• SDPT3

  • Referenced in 630 articles [sw04009]
  • SeDuMi format. Sparsity and block diagonal structure are exploited. We also exploit low-rank structures...
  • PHCpack

  • Referenced in 216 articles [sw00705]
  • considerable progress has been accomplished on exploiting structure in a polynomial system, in particular...
  • ve08

  • Referenced in 144 articles [sw05141]
  • using a minimization algorithm that exploits some special structure of f. One such possibility...
  • SparsePOP

  • Referenced in 65 articles [sw04331]
  • sparse SDP relaxation exploits a sparse structure of polynomials in POPs when applying “a hierarchy...
  • MOCHA

  • Referenced in 91 articles [sw12935]
  • MOCHA is to exploit, rather than destroy, design structure in automatic verification. MOCHA is intended...
  • KronFit

  • Referenced in 41 articles [sw20428]
  • that Kronecker graphs can effectively model the structure of real networks. We then present KRONFIT ... contrast, KRONFIT takes linear time, by exploiting the structure of Kronecker matrix multiplication...
  • STAN

  • Referenced in 38 articles [sw03348]
  • Graphplan in several ways, including exploiting a powerful representational structure for the core plan-graph ... plan-graph structure reaches a stable state. STAN has also always exploited a parallel domain...
  • MAYA

  • Referenced in 26 articles [sw03423]
  • verification in-the-large to exploit the structure of the specification, and maintains the verification...
  • ADMAT

  • Referenced in 31 articles [sw04864]
  • many sophisticated techniques such as exploiting sparsity and structure to achieve high efficiency in computing...
  • OOPS

  • Referenced in 31 articles [sw10470]
  • Parallel interior point solver for structured linear programs. Issues of implementation of an object-oriented ... addressed. The solver can easily exploit any special structure of the underlying optimization problem...
  • BADMM

  • Referenced in 24 articles [sw20288]
  • choice of different Bregman divergences to exploit the structure of problems. BADMM provides a unified...
  • ODRPACK

  • Referenced in 21 articles [sw00649]
  • trust region Levenberg-Marquardt procedure that exploits the structure of the problem so that...
  • SBmethod

  • Referenced in 12 articles [sw07710]
  • design variables and allows to exploit structural properties of the matrices such as sparsity...
  • QPSchur

  • Referenced in 16 articles [sw06918]
  • many different application areas. Moreover, the specialized structure of the QP is abstracted away behind ... flexible with respect to allowing exploitation of problem structure, it is not as numerically stable ... that the QP solver can exploit application-specific structure in a computationally efficient and fairly...
  • smt

  • Referenced in 14 articles [sw09205]
  • structured matrices. The full exploitation of the structure of large scale algebraic problems is often...
  • MIQR

  • Referenced in 9 articles [sw07242]
  • algorithm builds the factorization by exploiting structural orthogonality in general sparse matrices. At any given...
  • LearnLib

  • Referenced in 18 articles [sw09913]
  • modular structure allows users to configure their own tailored learning scenarios, which exploit specific properties ... been shown earlier, exploiting application-specific structural features enables optimizations that may lead to performance...
  • Periodic Systems Toolbox

  • Referenced in 6 articles [sw22601]
  • approach to develop this toolbox was to exploit the powerful object manipulation features of MATLAB ... Fortran implementations of recently developed structure exploiting and structure preserving numerical algorithms for periodic systems...
  • MUSCOP

  • Referenced in 6 articles [sw06143]
  • programming problems (QPs) we develop a structure exploiting two-stage approach. In the first stage ... exploit the multiple shooting and Newton-Picard structure to reduce the large-scale...
  • PSBLAS

  • Referenced in 22 articles [sw04026]
  • kernels. Suitable preconditioner data structures are defined to fully exploit the existing PSBLAS functionalities; however...