default search action
ICCS 2020: Amsterdam, The Netherlands
- Valeria V. Krzhizhanovskaya
, Gábor Závodszky
, Michael Harold Lees, Jack J. Dongarra
, Peter M. A. Sloot
, Sérgio Brissos, João Teixeira:
Computational Science - ICCS 2020 - 20th International Conference, Amsterdam, The Netherlands, June 3-5, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12138, Springer 2020, ISBN 978-3-030-50416-8 - Andrzej Kuzelewski
, Eugeniusz Zieniuk
, Agnieszka Boltuc
, Krzysztof Szerszen
:
Modified Binary Tree in the Fast PIES for 2D Problems with Complex Shapes. 1-14 - Frédéric Goualard
:
Generating Random Floating-Point Numbers by Dividing Integers: A Case Study. 15-28 - Leonid A. Sevastianov
, Konstantin P. Lovetskiy
, Dmitry S. Kulyabov
:
An Effective Stable Numerical Method for Integrating Highly Oscillating Functions with a Linear Phase. 29-43 - Jacek Klimaszewski
, Marcin Korzen
:
Fitting Penalized Logistic Regression Models Using QR Factorization. 44-57 - Abhishek Kumar Singh
, Mani Mehra
:
Uncertainty Quantification in Fractional Stochastic Integro-Differential Equations Using Legendre Wavelet Collocation Method. 58-71 - Fariba Mohammadi, Shusil Dangi, Suzanne M. Shontz, Cristian A. Linte:
A Direct High-Order Curvilinear Triangular Mesh Generation Method Using an Advancing Front Technique. 72-85 - Mikhail Maslyaev, Alexander Hvatov
, Anna V. Kalyuzhnaya
:
Data-Driven Partial Differential Equations Discovery Approach for the Noised Multi-dimensional Data. 86-100 - M. Ali Rostami
, H. Martin Bücker
:
Preconditioning Jacobian Systems by Superimposing Diagonal Blocks. 101-115 - Marta Kapturczak
, Eugeniusz Zieniuk
, Andrzej Kuzelewski
:
NURBS Curves in Parametric Integral Equations System for Modeling and Solving Boundary Value Problems in Elasticity. 116-123 - Ryszard Kozera
, Lyle Noakes, Magdalena Wilkolazka
:
Parameterizations and Lagrange Cubics for Fitting Multidimensional Data. 124-140 - June Sallou
, Alexandre Gauvain
, Johann Bourcier
, Benoît Combemale, Jean-Raynald de Dreuzy:
Loop Aggregation for Approximate Scientific Computing. 141-155 - Shotaro Hamato, Masashi Yamakawa, Yongmann M. Chung
, Shinichi Asao:
Numerical Computation for a Flow Caused by a High-Speed Traveling Train and a Stationary Overpass. 156-169 - Agnieszka Boltuc
, Eugeniusz Zieniuk
, Krzysztof Szerszen
, Andrzej Kuzelewski
:
Bézier Surfaces for Modeling Inclusions in PIES. 170-183 - Ji Zhou
, Wenbin Jiang
, Mian Lin
, Lili Ji
, Gaohui Cao
:
Impact of Water on Methane Adsorption in Nanopores: A Hybrid GCMC-MD Simulation Study. 184-196 - Marcin Los
, Sergio Rojas
, Maciej Paszynski
, Ignacio Muga
, Victor M. Calo:
A Stable Discontinuous Galerkin Based Isogeometric Residual Minimization for the Stokes Problem. 197-211 - Vladislava V. Churuksaeva
, Alexander V. Starchenko
:
Numerical Modeling of the Two-Phase Flow of Water with Ice in the Tom River. 212-224 - Xinyin Huang, Gang Liu, Qiang Niu
:
Remarks on Kaczmarz Algorithm for Solving Consistent and Inconsistent System of Linear Equations. 225-236 - Ahmad Abdelfattah, Stan Tomov
, Jack J. Dongarra:
Investigating the Benefit of FP16-Enabled Mixed-Precision Solvers for Symmetric Positive Definite Matrices Using GPUs. 237-250 - Grzegorz Bocewicz
, Zbigniew Banaszak
, Czeslaw Smutnicki
, Katarzyna Rudnik
, Marcin Witczak
, Robert Wójcik
:
Simulation Versus an Ordered-Fuzzy-Numbers-Driven Approach to the Multi-depot Vehicle Cyclic Routing and Scheduling Problem. 251-266 - Kornel Chrominski
, Magdalena Tkacz
, Mariusz Boryczka
:
Epigenetic Modification of Genetic Algorithm. 267-278 - Youting Liu, Shu Li, Chengwei Zhang, Chao Zheng, Yong Sun, Qingyun Liu:
ITP-KNN: Encrypted Video Flow Identification Based on the Intermittent Traffic Pattern of Video and K-Nearest Neighbors Classification. 279-293 - Dali Zhu, Yuchen Ma, Yinlong Liu:
DeepAD: A Joint Embedding Approach for Anomaly Detection on Attributed Networks. 294-307 - Zhi Hong, Roselyne Tchoua, Kyle Chard, Ian T. Foster:
SciNER: Extracting Named Entities from Scientific Literature. 308-321 - Bartosz Minch
, Mateusz Nowak, Rafal Wcislo
, Witold Dzwinel
:
GPU-Embedding of kNN-Graph Representing Large and High-Dimensional Data. 322-336 - Vicente Coelho Lobo Neto
, Leandro Aparecido Passos
, João Paulo Papa
:
Evolving Long Short-Term Memory Networks. 337-350 - Mikolaj Biel, Marcin Kuta
, Jacek Kitowski
:
Personality Recognition from Source Code Based on Lexical, Syntactic and Semantic Features. 351-363 - Petr Chunaev
, Ildar Safiullin:
Data Fitting by Exponential Sums with Equal Weights. 364-371 - Katarzyna Gosciewska
, Dariusz Frejlichowski
:
A Combination of Moment Descriptors, Fourier Transform and Matching Measures for Action Recognition Based on Shape. 372-386 - Javier Ferrando, Juan Luis Domínguez, Jordi Torres, Raúl García, David García, Daniel Garrido
, Jordi Cortada, Mateo Valero:
Improving Accuracy and Speeding Up Document Image Classification Through Parallel Systems. 387-400 - Anna Wawrzynczak
, Monika Berendt-Marchel
:
Computation of the Airborne Contaminant Transport in Urban Area by the Artificial Neural Network. 401-413 - Manuchehr Aminian
, Eric Kehoe
, Xiaofeng Ma
, Amy Peterson
, Michael Kirby:
Exploring Musical Structure Using Tonnetz Lattice Geometry and LSTMs. 414-424 - Changbo Tian, Yongzheng Zhang, Tao Yin:
Modeling of Anti-tracking Network Based on Convex-Polytope Topology. 425-438 - Jun Li, Huan Ma, Guangjun Wu, Yanqin Zhang, Bingnan Ma, Zhen Hui, Lei Zhang, Bingqing Zhu:
A Workload Division Differential Privacy Algorithm to Improve the Accuracy for Linear Computations. 439-452 - Andrea Tundis
, Samuel Ruppert, Max Mühlhäuser:
On the Automated Assessment of Open-Source Cyber Threat Intelligence Sources. 453-467 - Qing Wang, Linyu Li, Bo Jiang, Zhigang Lu, Junrong Liu, Shijie Jian:
Malicious Domain Detection Based on K-means and SMOTE. 468-481 - Maude Manouvrier
, Cesare Pautasso, Marta Rukoz
:
Microservice Disaster Crash Recovery: A Weak Global Referential Integrity Management. 482-495 - Lijing Lu
, Rong Yin
, Yong Liu, Weiping Wang:
Hashing Based Prediction for Large-Scale Kernel Machine. 496-509 - Paulina Adamska
, Marta Juzwin
, Adam Wierzbicki
:
Picking Peaches or Squeezing Lemons: Selecting Crowdsourcing Workers for Reducing Cost of Redundancy. 510-523 - Jakub Kruczek, Paulina Kruczek, Marcin Kuta
:
Are n-gram Categories Helpful in Text Classification? 524-537 - Sebastian Ernst, Leszek Kotulski
, Tomasz Lerch, Michal Rad
, Adam Sedziwy, Igor Wojnicki
:
Calculating Reactive Power Compensation for Large-Scale Street Lighting. 538-550 - Andrew Lewis, Marcus Randall
, Ben Stewart-Koster
:
Developing a Decision Support App for Computational Agriculture. 551-561 - Angelie R. Ferrolino, Jose Ernie C. Lope
, Renier G. Mendoza
:
Optimal Location of Sensors for Early Detection of Tsunami Waves. 562-575 - Leonardo Ramos Emmendorfer
, Graçaliz Pereira Dimuro
:
A Novel Formulation for Inverse Distance Weighting from Weighted Linear Regression. 576-589 - Srishti Srivastava, Ioana Banicescu, William S. Sanders:
Addressing the Robustness of Resource Allocation in the Presence of Application and System Irregularities via PEPA Based Modeling. 590-603 - Julia Anten, Jordan Earle, Jan Treur
:
An Adaptive Computational Network Model for Strange Loops in Political Evolution in Society. 604-617 - Jie Xie, Yuhai Lu, Cong Cao, Zhenzhen Li, Yangyang Guan, Yanbing Liu:
Joint Entity Linking for Web Tables with Hybrid Semantic Matching. 618-631 - Wojciech Salabun
, Karol Urbaniak
:
A New Coefficient of Rankings Similarity in Decision-Making Problems. 632-645 - Pavel Savov, Adam Jatowt, Radoslaw Nielek:
Innovativeness Analysis of Scholarly Publications by Age Prediction Using Ordinal Regression. 646-660 - Magdalena A. Tkacz
, Kornel Chrominski
:
Advantage of Using Spherical over Cartesian Coordinates in the Chromosome Territories 3D Modeling. 661-673 - Preeti Malakar, Vijay Natarajan, Sathish S. Vadhiyar:
Adaptive and Efficient Transfer for Online Remote Visualization of Critical Weather Applications. 674-693
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.