We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 7,406 results
  1. The Weighted Vector Finite Element Method for Vector Wave Equation with Singularity

    Boundary value problems for wave vector equations with singularity are used in mathematical models of electromagnetism problems in domains with a...
    Viktor A. Rukavishnikov, Elena I. Rukavishnikova in Computational Science and Its Applications – ICCSA 2024
    Conference paper 2024
  2. Unlocking the Lookup Singularity with Lasso

    This paper introduces Lasso, a new family of lookup arguments, which allow an untrusted prover to commit to a vector...
    Srinath Setty, Justin Thaler, Riad Wahby in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  3. Singularity separation Chebyshev collocation method for weakly singular Volterra integral equations of the second kind

    Volterra integral equation of the second kind with weakly singular kernel usually exhibits singular behavior at the origin, which deteriorates the...

    Tongke Wang, Huan Lian, Lu Ji in Numerical Algorithms
    Article 01 August 2023
  4. Event-based singularity-free fixed-time fuzzy control for active suspension systems with displacement constraint

    This paper investigates the event-based adaptive fixed-time (FT) control problem for active suspension systems (ASSs) with actuator faults. The fuzzy...

    Tinghan Jia, Liang Cao, ... Yingnan Pan in Neural Computing and Applications
    Article 05 July 2023
  5. Distributed fixed-time NN tracking control of vehicular platoon systems with singularity-free

    This paper focuses on a distributed adaptive singularity-free fixed-time neural network tracking control problem for vehicular platoon with model...

    Jiaxin An, Yang Liu, ... Hong Xue in Neural Computing and Applications
    Article 01 September 2022
  6. Are We Nearing Singularity? A Study of Language Capabilities of ChatGPT

    There has been a huge uproar about ChatGPT in recent times. There are widespread fears that generative models such as ChatGPT will affect...
    Suparna Dhar, Indranil Bose in AGC 2023
    Conference paper 2024
  7. Singularity Analysis for the Perspective-Four and Five-Line Problems

    This paper deals with image-based visual servoing and pose estimation by observing four and five lines. Our main interest is to determine the...

    Jorge García Fontán, Abhilash Nayak, ... Mohab Safey El Din in International Journal of Computer Vision
    Article 12 February 2022
  8. A philosophical view on singularity and strong AI

    More intellectual modesty, but also conceptual clarity is urgently needed in AI, perhaps more than in many other disciplines. AI research has been...

    Christian Hugo Hoffmann in AI & SOCIETY
    Article 17 January 2022
  9. Locating the Closest Singularity in a Polynomial Homotopy

    A polynomial homotopy is a family of polynomial systems, where the systems in the family depend on one parameter. If for one value of the parameter...
    Jan Verschelde, Kylash Viswanathan in Computer Algebra in Scientific Computing
    Conference paper 2022
  10. HPX with Spack and Singularity Containers: Evaluating Overheads for HPX/Kokkos Using an Astrophysics Application

    Cloud computing for high performance computing resources is an emerging topic. This service is of interest to researchers who care about reproducible...
    Patrick Diehl, Steven R. Brandt, ... Hartmut Kaiser in Asynchronous Many-Task Systems and Applications
    Conference paper 2024
  11. Error analysis of a high-order fully discrete method for two-dimensional time-fractional convection-diffusion equations exhibiting weak initial singularity

    This study presents a novel high-order numerical method designed for solving the two-dimensional time-fractional convection-diffusion (TFCD)...

    Anshima Singh, Sunil Kumar in Numerical Algorithms
    Article 09 July 2024
  12. Historicism, Science Fiction, and the Singularity

    Many writers who have discussed the SingularityThe Singularity have treated it not only as the inevitable outcome of advancements in cybernetic...
    Mark Silcox in Minding the Future
    Chapter 2021
  13. Complete Singularity Analysis for the Perspective-Four-Point Problem

    This paper is concerned with pose estimation and visual servoing from four points. We determine the configurations for which the corresponding...

    Beatriz Pascual-Escudero, Abhilash Nayak, ... François Chaumette in International Journal of Computer Vision
    Article 18 January 2021
  14. The Singularity Hoax: Why Computers Will Never Be More Intelligent than Humans

    We argue that the dream of the supporters of the technological singularity, the notion that computers will one day be smarter than their human...
    Chapter 2021
  15. Ethical Design in an AI-Driven World

    In the fields of quantum mechanics and general relativity, there is a term called “singularity.” It refers to the theoretical phenomenon where...
    Diana Olynick in Interfaceless
    Chapter 2024
  16. Autonomy and Singularity - Work, Ubiquity and Operational Fluidity

    The differential value of an ergonomic intervention is to bring an innovative approach in the models and practices of treatment of risks at work, in...
    Juan A. Castillo-M, Carlos Alberto Cifuentes Pinzón, Jose Luis Gil Gomez in Proceedings of the 21st Congress of the International Ergonomics Association (IEA 2021)
    Conference paper 2021
  17. Numerical correction of finite difference solution for two-dimensional space-fractional diffusion equations with boundary singularity

    In this paper, an efficient algorithm is presented by adopting the extrapolation technique to improve the accuracy of finite difference schemes for...

    Zhaopeng Hao, Wanrong Cao, Shengyue Li in Numerical Algorithms
    Article 27 April 2020
  18. Security assurance of MongoDB in singularity LXCs: an elastic and convenient testbed using Linux containers to explore vulnerabilities

    It is essential to ensure the data security of data analytical frameworks as any security vulnerability existing in the system can lead to a data...

    Akalanka Mailewa Dissanayaka, Susan Mengel, ... Hafiz Khan in Cluster Computing
    Article 25 July 2020
  19. Topological operations for editing the singularity on a hex mesh

    This paper introduces topological operations for editing the singularity on a hex mesh while maintaining the connectivity of hexahedral mesh. The...

    Chun Shen, Shuming Gao, Rui Wang in Engineering with Computers
    Article 19 November 2019
  20. Prescribed time control based on the periodic delayed sliding mode surface without singularities

    In this paper, nonsingular prescribed-time control is studied based on periodic delayed sliding mode surfaces. Different from the existing sliding...

    Bin Zhou, Yi Ding, ... Guang-Ren Duan in Science China Information Sciences
    Article 27 June 2024
Did you find what you were looking for? Share feedback.