Model of computation

Results: 512



#Item
371Oracle inequalities for computationally adaptive model selection arXiv:1208.0129v1 [stat.ML] 1 Aug[removed]Alekh Agarwal†

Oracle inequalities for computationally adaptive model selection arXiv:1208.0129v1 [stat.ML] 1 Aug[removed]Alekh Agarwal†

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-08-01 20:37:08
372Agent-Based Computational Models And Generative Social Science JOSHUA M. EPSTEIN Economic Studies, Brookings Institution, Washington, D.C., 20036, USA External Faculty, Santa Fe Institute, Santa Fe, NM, 87501, USA e-mail

Agent-Based Computational Models And Generative Social Science JOSHUA M. EPSTEIN Economic Studies, Brookings Institution, Washington, D.C., 20036, USA External Faculty, Santa Fe Institute, Santa Fe, NM, 87501, USA e-mail

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-11-03 11:21:54
373Real artificial life: Where we may be1 David H. Ackley Department of Computer Science University of New Mexico  Abstract

Real artificial life: Where we may be1 David H. Ackley Department of Computer Science University of New Mexico Abstract

Add to Reading List

Source URL: keys.ccrcentral.net

Language: English - Date: 2014-01-25 11:26:34
374Accepted to appear in IEE Systems Biology  Symbolic Reachable Set Computation of Piecewise Affine Hybrid Automata and its Application to Biological Modelling: Delta-Notch Protein Signalling Ronojoy Ghosh

Accepted to appear in IEE Systems Biology Symbolic Reachable Set Computation of Piecewise Affine Hybrid Automata and its Application to Biological Modelling: Delta-Notch Protein Signalling Ronojoy Ghosh

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2006-11-03 02:08:52
375F  Formal Methods && Tools Group Stefania Gnesi F M&&T

F Formal Methods && Tools Group Stefania Gnesi F M&&T

Add to Reading List

Source URL: fmics.inria.fr

Language: English - Date: 2003-07-04 03:48:30
376Report on DIMACS∗ Workshop on Security Analysis of Protocols Date of workshop: June 7 – 9, 2004 Workshop Organizers: John Mitchell, Stanford University Ran Canetti, IBM Watson

Report on DIMACS∗ Workshop on Security Analysis of Protocols Date of workshop: June 7 – 9, 2004 Workshop Organizers: John Mitchell, Stanford University Ran Canetti, IBM Watson

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-07-27 15:21:45
377An Algorithm for Reachability Computations on Hybrid Automata Models of Protein Signaling Networks

An Algorithm for Reachability Computations on Hybrid Automata Models of Protein Signaling Networks

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2007-01-10 20:11:24
378Byzantine Agreement in the Full-Information Model in O(log n) Rounds Michael Ben-Or∗ The Hebrew University Jerusalem, Israel [removed]

Byzantine Agreement in the Full-Information Model in O(log n) Rounds Michael Ben-Or∗ The Hebrew University Jerusalem, Israel [removed]

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:28:34
379GAMSWorld and the Growing Demand for Reproducible Computational Experiments Steve Dirkse

GAMSWorld and the Growing Demand for Reproducible Computational Experiments Steve Dirkse

Add to Reading List

Source URL: www.gams.com

Language: English - Date: 2009-02-17 12:24:37
380Appendix C  Computation in R and Stan We illustrate some practical issues of simulation by fitting a single example—the hierarchical normal model for the eight schools described in Section 5.5. After some background in

Appendix C Computation in R and Stan We illustrate some practical issues of simulation by fitting a single example—the hierarchical normal model for the eight schools described in Section 5.5. After some background in

Add to Reading List

Source URL: www.stat.columbia.edu

Language: English - Date: 2013-09-18 03:45:36