Search results for " Programming"

showing 10 items of 1616 documents

Improving Interpolants for Linear Arithmetic

2015

Craig interpolation for satisfiability modulo theory formulas have come more into focus for applications of formal verification. In this paper we, introduce a method to reduce the size of linear constraints used in the description of already computed interpolant in the theory of linear arithmetic with respect to the number of linear constraints. We successfully improve interpolants by combining satisfiability modulo theory and linear programming in a local search heuristic. Our experimental results suggest a lower running time and a larger reduction compared to other methods from the literature.

AlgebraReduction (complexity)Linear programmingHeuristicModuloCraig interpolationArithmeticFormal verificationSatisfiabilityLocal search (constraint satisfaction)Mathematics
researchProduct

Elliptic convolution operators on non-quasianalytic classes

2001

For those nonquasianalytic classes in which an extension of the classical Borel's theorem holds we show that every elliptic convolution operator is the composition of a translation and an invertible ultradifferential operator. This answers a question asked by Chou in: La transformation de Fourier complexe et l'equation de convolution, LNM 325, Berlin-Heidelberg-New York (1973).

AlgebraSemi-elliptic operatorsymbols.namesakeOperator (computer programming)Fourier transformGeneral MathematicssymbolsConvolution theoremConvolution powerShift operatorCircular convolutionConvolutionMathematicsArchiv der Mathematik
researchProduct

Ancestral Reconstruction and Investigations of Genomic Recombination on some Pentapetalae Chloroplasts

2019

Abstract In this article, we propose a semi-automated method to rebuild genome ancestors of chloroplasts by taking into account gene duplication. Two methods have been used in order to achieve this work: a naked eye investigation using homemade scripts, whose results are considered as a basis of knowledge, and a dynamic programming based approach similar to Needleman-Wunsch. The latter fundamentally uses the Gestalt pattern matching method of sequence matcher to evaluate the occurrences probability of each gene in the last common ancestor of two given genomes. The two approaches have been applied on chloroplastic genomes from Apiales, Asterales, and Fabids orders, the latter belonging to Pe…

Ancestral reconstructionMost recent common ancestor0206 medical engineeringGenomic recombination02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Dynamic programmingGenome[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingEvolution Molecular[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]AsteralesGene duplication0202 electrical engineering electronic engineering information engineeringPattern matchingGenome ChloroplastRosaceaeResearch ArticlesPhylogenySequence (medicine)Recombination GeneticbiologyGeneral Medicinebiology.organism_classification[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationAncestral genome reconstructionApialesEvolutionary biology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Pentapetalae chloroplasts020602 bioinformaticsTP248.13-248.65BiotechnologyJournal of Integrative Bioinformatics
researchProduct

Scenario optimization asset and liability modelling for individual investors

2006

We develop a scenario optimization model for asset and liability management of individual investors. The individual has a given level of initial wealth and a target goal to be reached within some time horizon. The individual must determine an asset allocation strategy so that the portfolio growth rate will be sufficient to reach the target. A scenario optimization model is formulated which maximizes the upside potential of the portfolio, with limits on the downside risk. Both upside and downside are measured vis- `a-vis the goal. The stochastic behavior of asset returns is captured through bootstrap simulation, and the simulation is embedded in the model to determine the optimal portfolio. …

Application portfolio managementComputer scienceLiabilityDownside riskGeneral Decision SciencesAsset allocationAsset and liability managementTime horizonManagement Science and Operations ResearchAsset returnBlack–Litterman modelMicroeconomicsReplicating portfolioPortfolioCapital asset pricing modelPost-modern portfolio theoryPortfolio optimizationPersonal asset allocation stochastic programmingBeta (finance)Upside potential ratio
researchProduct

Sampling methods for low-frequency electromagnetic imaging

2007

For the detection of hidden objects by low-frequency electromagnetic imaging the linear sampling method works remarkably well despite the fact that the rigorous mathematical justification is still incomplete. In this work, we give an explanation for this good performance by showing that in the low-frequency limit the measurement operator fulfils the assumptions for the fully justified variant of the linear sampling method, the so-called factorization method. We also show how the method has to be modified in the physically relevant case of electromagnetic imaging with divergence-free currents. We present numerical results to illustrate our findings, and to show that similar performance can b…

Applied MathematicsMathematical analysis510 MathematikLow frequencyComputer Science ApplicationsTheoretical Computer ScienceOperator (computer programming)510 MathematicsSignal ProcessingFactorization methodLimit (mathematics)AlgorithmMathematical PhysicsMathematics
researchProduct

The factorization method for real elliptic problems

2006

The Factorization Method localizes inclusions inside a body from mea- surements on its surface. Without a priori knowing the physical parameters inside the inclusions, the points belonging to them can be characterized using the range of an auxiliary operator. The method relies on a range characterization that relates the range of the auxiliary operator to the measurements and is only known for very particular applications. In this work we develop a general framework for the method by considering sym- metric and coercive operators between abstract Hilbert spaces. We show that the important range characterization holds if the difference between the inclusions and the background medium satisfi…

Applied MathematicsMathematical analysisHilbert space510 MathematikInverse problemLenstra elliptic curve factorizationSemi-elliptic operatorRange (mathematics)symbols.namesakeOperator (computer programming)510 MathematicsElliptic partial differential equationMetric (mathematics)symbolsAnalysisMathematics
researchProduct

External labeling and algorithms for hierarchic networks

1988

Algorithms for generating internal data structures for networks are given. Data bases for networks can be partitioned hierarchically. Nodes of lower class networks may also be in the interior of a higher class arc which will be split if it is included into the final network. Naming is based either on nodes or on arcs.

Arc (geometry)Class (computer programming)Computer scienceHierarchical network modelData structureAlgorithm
researchProduct

A comparison of two different formulations for Arc Routing Problems on Mixed graphs

2006

[EN] Arc routing problems on mixed graphs have been modelled in the literature either using just one variable per edge or associating to each edge two variables, each one representing its traversal in the corresponding direction. In this paper, and using the mixed general routing problem as an example, we compare theoretical and computationally both formulations as well as the lower bounds obtained from them using Linear Programming based methods. Extensive computational experiments, including some big and newly generated random instances, are presented.

Arc routingGeneral Computer ScienceLinear programmingMixed Chinese postman problemMixed graphMixed rural postman problemManagement Science and Operations ResearchRoute inspection problemTree traversalModeling and SimulationEnhanced Data Rates for GSM EvolutionRouting (electronic design automation)Mixed general routing problemMATEMATICA APLICADAAlgorithmArc routingMathematicsVariable (mathematics)
researchProduct

The Windy clustered prize-collecting arc-routing problem

2011

This paper introduces the windy clustered prize-collecting arc-routing problem. It is an arc-routing problem where each demand edge is associated with a profit that is collected once if the edge is serviced, independent of the number of times the edge is traversed. It is further required that if a demand edge is serviced, then all the demand edges of its component are also serviced. A mathematical programming formulation is given and some polyhedral results including several facet-defining and valid inequalities are presented. The separation problem for the different families of inequalities is studied. Numerical results from computational experiments are analyzed. © 2011 INFORMS.

Arc routingMathematical optimizationMathematical programmingTransportation68W AlgorithmsSeparation problemsCutting plane algorithmsArc routing problems:Informàtica::Informàtica teòrica [Àrees temàtiques de la UPC]Prize-collectingPolyhedral modellingNumerical resultsProfitability indexProfitabilityPolyhedral analysisComputational experimentMATEMATICA APLICADAArc routingCutting plane algorithmValid inequalityAlgorithmsCivil and Structural EngineeringSeparation problemMathematicsMathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

The ius liberorum of non-Roman citizens in Egypt. Some notes on an old Taubenschlag’s hypothesis

2019

Abstract Normally the ius liberorum is associated with Roman citizens, but in the lex Irnitana we have evidence of non-Roman members of the curial class of Baetica who took advantage of this privilege. In Roman Egypt, the constitution of the boulai in the nome capitals could have provided a similar context for the selection of local elites in which Romanized Egyptians obtained that privilege.

ArcheologyHistoryClass (computer programming)HistoryConstitutionNomemedia_common.quotation_subjectSelection (linguistics)Context (language use)Privilege (social inequality)GenealogyRomanizationmedia_commonArchiv für Papyrusforschung und verwandte Gebiete
researchProduct