We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Optimization of Subsurface Flow Operations Using a Dynamic Proxy Strategy

    Machine-learning-based proxy models are often used to replace many of the flow simulations required in optimizations of subsurface flow processes....

    Zhiwei Ma, Yong Do Kim, ... Louis J. Durlofsky in Mathematical Geosciences
    Article 26 September 2022
  2. Proxy

    The use of the proxy pattern becomes useful whenever you need a “proxy” of an object for certain reasons. This may be necessary for security reasons,...
    Chapter 2023
  3. Non-Quadratic Proxy Functions in Mirror Descent Method Applied to Designing of Robust Controllers for Nonlinear Dynamic Systems with Uncertainty

    Abstract

    We consider a class of controlled nonlinear plants, the dynamics of which are governed by a vector system of ordinary differential equations...

    Article 01 April 2024
  4. Blockchain broadcast proxy ReEncryption in cloud environment for secure data sharing

    The conditional proxy broadcast ReEncryption mechanism enables the user to periodically re-encrypt the cipher-text. When a sender generates the key,...

    Beena G Pillai, N Lal Dayanand, T Venkatesh Prasanna in Sādhanā
    Article 25 April 2024
  5. Proxy

    When we looked at the Decorator design pattern, we saw different ways of enhancing the functionality of an object. The Proxy design pattern is...
    Dmitri Nesteruk in Design Patterns in .NET 6
    Chapter 2022
  6. A Quantum Multi-proxy Blind Signature Scheme Based on D-dimensional GHZ States

    Based on the study of the nature of GHZ states in d-dimensional quantum systems, this paper proposes a quantum multi-proxy blind signature scheme...

    Yongqi Xue, Aihan Yin, Ke **ng in International Journal of Theoretical Physics
    Article 14 December 2023
  7. Composite Supply Index of Investment Products as a Proxy Indicator of Fixed Capital Investment

    Abstract—

    The need to assess timely the main indicators of the country’s socio-economic development determines the improvement in methods for...

    I. A. Kirichenko, A. V. Smirnov in Studies on Russian Economic Development
    Article 09 April 2024
  8. 3 Dynamic Proxies and Haptic Constraints

    Haptic simulations strive to provide users with realistic renditions of virtual environments but often struggle to display convincing rigid...
    Günter Niemeyer, Probal Mitra in Multi-point Interaction with Real and Virtual Objects
    Chapter
  9. Convolutional – recurrent neural network proxy for robust optimization and closed-loop reservoir management

    Production optimization under geological uncertainty is computationally expensive, as a large number of well control schedules must be evaluated over...

    Yong Do Kim, Louis J. Durlofsky in Computational Geosciences
    Article 27 January 2023
  10. A pseudoproxy emulation of the PAGES 2k database using a hierarchy of proxy system models

    Paleoclimate reconstructions are now integral to climate assessments, yet the consequences of using different methodologies and proxy data require...

    Feng Zhu, Julien Emile-Geay, ... Zilu Meng in Scientific Data
    Article Open access 14 September 2023
  11. The Nature of Proxy Relationships and Their Ethics

    This chapter examines the nature of proxy relationships and establishes the methodology for analyzing their ethical challenges. In this context of...
    Chapter 2024
  12. Mitigating the Moral Hazards of Proxy Warfare

    Moral hazards arise when sponsors and proxies can redistribute risk in ways that enable potentially harmful outcomes. This redistribution risks...
    Chapter 2024
  13. Compliance of discharge estimates from proxy parameters: a study on an ungauged station of a Himalayan river

    This research delves into the intricate process of estimating bankfull discharge using proxy parameters for the upper Murti River and Khar Khola, two...

    Article 26 March 2024
  14. Agreement between quality of life assessed using family proxy and child self-reports among children with hematologic malignancy

    Evidence-based literature recognizes that the different degrees of agreement between a child self-report and a proxy-report depend on the...

    Thu Hang Tran Thi, Chung-Ying Lin, Mei-Chih Huang in European Journal of Pediatrics
    Article 17 May 2024
  15. Liturgies of Suicide by Proxy

    The chapter sketches the contours and typical features of the practice of suicide by proxy. Early forms of suicide by proxy included self-accusation...
    Chapter 2023
  16. Multi-proxy constraints on Atlantic circulation dynamics since the last ice age

    Uncertainties persist in the understanding of the Atlantic meridional overturning circulation and its response to external perturbations such as...

    Frerk Pöppelmeier, Aurich Jeltsch-Thömmes, ... Thomas F. Stocker in Nature Geoscience
    Article Open access 03 April 2023
  17. Secure and Privacy Preserving Proxy Biometric Identities

    With large-scale adaption to biometric based applications, security and privacy of biometrics is utmost important especially when operating in...
    Harkeerat Kaur, Rishabh Shukla, ... Pritee Khanna in Advanced Information Networking and Applications
    Conference paper 2023
  18. The PhanSST global database of Phanerozoic sea surface temperature proxy data

    Paleotemperature proxy data form the cornerstone of paleoclimate research and are integral to understanding the evolution of the Earth system across...

    Emily J. Judd, Jessica E. Tierney, ... Yi Ge Zhang in Scientific Data
    Article Open access 06 December 2022
  19. Proxy measurement in paleoclimatology

    In this paper we argue that the difference between standard measurement and proxy measurement in paleoclimatology should not be understood in terms...

    Joseph Wilson, F. Garrett Boudinot in European Journal for Philosophy of Science
    Article 04 February 2022
  20. Reliable Boundary Samples-Based Proxy Pairs for Unsupervised Person Re-identification

    Contrastive learning methods based on the memory bank have shown promising results for unsupervised person re-identification. However, most methods...
    Chang Zou, Zeqi Chen, ... Chi Zhang in Pattern Recognition and Computer Vision
    Conference paper 2024
Did you find what you were looking for? Share feedback.