Academic literature on the topic 'Computation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computation"

1

Fresco, Nir. "Long-arm functional individuation of computation." Synthese 199, no. 5-6 (November 1, 2021): 13993–4016. http://dx.doi.org/10.1007/s11229-021-03407-x.

Full text
Abstract:
AbstractA single physical process may often be described equally well as computing several different mathematical functions—none of which is explanatorily privileged. How, then, should the computational identity of a physical system be determined? Some computational mechanists hold that computation is individuated only by either narrow physical or functional properties. Even if some individuative role is attributed to environmental factors, it is rather limited. The computational semanticist holds that computation is individuated, at least in part, by semantic properties. She claims that the mechanistic account lacks the resources to individuate the computations performed by some systems, thereby leaving interesting cases of computational indeterminacy unaddressed. This article examines some of these views, and claims that more cases of computational indeterminacy can be addressed, if the system-environment interaction plays a greater role in individuating computations. A new, long-arm functional strategy for individuating computation is advanced.
APA, Harvard, Vancouver, ISO, and other styles
2

Olakanmi, Oladayo Olufemi, and Adedamola Dada. "An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms." International Journal of Cloud Applications and Computing 9, no. 2 (April 2019): 79–98. http://dx.doi.org/10.4018/ijcac.2019040105.

Full text
Abstract:
In outsourcing computation models, weak devices (clients) increasingly rely on remote servers (workers) for data storage and computations. However, most of these servers are hackable or untrustworthy, which makes their computation questionable. Therefore, there is need for clients to validate the correctness of the results of their outsourced computations and ensure that servers learn nothing about their clients other than the outputs of their computation. In this work, an efficient privacy preservation validation approach is developed which allows clients to store and outsource their computations to servers in a semi-honest model such that servers' computational results could be validated by clients without re-computing the computation. This article employs a morphism approach for the client to efficiently perform the proof of correctness of its outsourced computation without re-computing the whole computation. A traceable pseudonym is employed by clients to enforce anonymity.
APA, Harvard, Vancouver, ISO, and other styles
3

Larsen, Brett W., and Shaul Druckmann. "Towards a more general understanding of the algorithmic utility of recurrent connections." PLOS Computational Biology 18, no. 6 (June 21, 2022): e1010227. http://dx.doi.org/10.1371/journal.pcbi.1010227.

Full text
Abstract:
Lateral and recurrent connections are ubiquitous in biological neural circuits. Yet while the strong computational abilities of feedforward networks have been extensively studied, our understanding of the role and advantages of recurrent computations that might explain their prevalence remains an important open challenge. Foundational studies by Minsky and Roelfsema argued that computations that require propagation of global information for local computation to take place would particularly benefit from the sequential, parallel nature of processing in recurrent networks. Such “tag propagation” algorithms perform repeated, local propagation of information and were originally introduced in the context of detecting connectedness, a task that is challenging for feedforward networks. Here, we advance the understanding of the utility of lateral and recurrent computation by first performing a large-scale empirical study of neural architectures for the computation of connectedness to explore feedforward solutions more fully and establish robustly the importance of recurrent architectures. In addition, we highlight a tradeoff between computation time and performance and construct hybrid feedforward/recurrent models that perform well even in the presence of varying computational time limitations. We then generalize tag propagation architectures to propagating multiple interacting tags and demonstrate that these are efficient computational substrates for more general computations of connectedness by introducing and solving an abstracted biologically inspired decision-making task. Our work thus clarifies and expands the set of computational tasks that can be solved efficiently by recurrent computation, yielding hypotheses for structure in population activity that may be present in such tasks.
APA, Harvard, Vancouver, ISO, and other styles
4

MACLENNAN, BRUCE J. "EMBODIED COMPUTATION: APPLYING THE PHYSICS OF COMPUTATION TO ARTIFICIAL MORPHOGENESIS." Parallel Processing Letters 22, no. 03 (July 8, 2012): 1240013. http://dx.doi.org/10.1142/s0129626412400130.

Full text
Abstract:
We discuss the problem of assembling complex physical systems that are structured from the nanoscale up through the macroscale, and argue that embryological morphogenesis provides a good model of how this can be accomplished. Morphogenesis (whether natural or artificial) is an example of embodied computation, which exploits physical processes for computational ends, or performs computations for their physical effects. Examples of embodied computation in natural morphogenesis can be found at many levels, from allosteric proteins, which perform simple embodied computations, up through cells, which act to create tissues with specific patterns, compositions, and forms. We outline a notation for describing morphogenetic programs and illustrate its use with two examples: simple diffusion and the assembly of a simple spine with attachment points for legs. While much research remains to be done — at the simulation level before we attempt physical implementations — our results to date show how we may implement the fundamental processes of morphogenesis as a practical application of embodied computation at the nano- and microscale.
APA, Harvard, Vancouver, ISO, and other styles
5

Aho, A. V. "Computation and Computational Thinking." Computer Journal 55, no. 7 (June 29, 2012): 832–35. http://dx.doi.org/10.1093/comjnl/bxs074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smolensky, Paul. "Symbolic functions from neural computation." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 370, no. 1971 (July 28, 2012): 3543–69. http://dx.doi.org/10.1098/rsta.2011.0334.

Full text
Abstract:
Is thought computation over ideas? Turing, and many cognitive scientists since, have assumed so, and formulated computational systems in which meaningful concepts are encoded by symbols which are the objects of computation. Cognition has been carved into parts, each a function defined over such symbols. This paper reports on a research program aimed at computing these symbolic functions without computing over the symbols. Symbols are encoded as patterns of numerical activation over multiple abstract neurons, each neuron simultaneously contributing to the encoding of multiple symbols. Computation is carried out over the numerical activation values of such neurons, which individually have no conceptual meaning. This is massively parallel numerical computation operating within a continuous computational medium. The paper presents an axiomatic framework for such a computational account of cognition, including a number of formal results. Within the framework, a class of recursive symbolic functions can be computed. Formal languages defined by symbolic rewrite rules can also be specified, the subsymbolic computations producing symbolic outputs that simultaneously display central properties of both facets of human language: universal symbolic grammatical competence and statistical, imperfect performance.
APA, Harvard, Vancouver, ISO, and other styles
7

Raussendorf, Robert. "Cohomological framework for contextual quantum computations." quantum Information and Computation 19, no. 13&14 (November 2019): 1141–70. http://dx.doi.org/10.26421/qic19.13-14-4.

Full text
Abstract:
We describe a cohomological framework for measurement-based quantum computation in which symmetry plays a central role. Therein, the essential information about the computation is contained in either of two topological invariants, namely two cohomology groups. One of them applies only to deterministic quantum computations, and the other to general probabilistic ones. Those invariants characterize the computational output, and at the same time witness quantumness in the form of contextuality. In result, they give rise to fundamental algebraic structures underlying quantum computation.
APA, Harvard, Vancouver, ISO, and other styles
8

SADAKANE, Kunihiko, Noriko SUGAWARA, and Takeshi TOKUYAMA. "Quantum Computation in Computational Geometry." Interdisciplinary Information Sciences 8, no. 2 (2002): 129–36. http://dx.doi.org/10.4036/iis.2002.129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Miller, Douglas A., and Steven W. Zucker. "Cliques, computation, and computational tractability." Pattern Recognition 33, no. 4 (April 2000): 535–42. http://dx.doi.org/10.1016/s0031-3203(99)00070-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Burgin, Mark, Eugene Eberbach, and Rao Mikkilineni. "Processing Information in the Clouds." Proceedings 47, no. 1 (May 7, 2020): 25. http://dx.doi.org/10.3390/proceedings2020047025.

Full text
Abstract:
Cloud computing makes the necessary resources available to the appropriate computation to improve scaling, resiliency, and the efficiency of computations. This makes cloud computing a new paradigm for computation by upgrading its artificial intelligence (AI) to a higher order. To explore cloud computing using theoretical tools, we use cloud automata as a new model for computation. Higher-level AI requires infusing features of the human brain into AI systems such as incremental learning all the time. Consequently, we propose computational models that exhibit incremental learning without stopping (sentience). These features are inherent in reflexive Turing machines, inductive Turing machines, and limit Turing machines.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computation"

1

Cattinelli, I. "INVESTIGATIONS ON COGNITIVE COMPUTATION AND COMPUTATIONAL COGNITION." Doctoral thesis, Università degli Studi di Milano, 2011. http://hdl.handle.net/2434/155482.

Full text
Abstract:
This Thesis describes our work at the boundary between Computer Science and Cognitive (Neuro)Science. In particular, (1) we have worked on methodological improvements to clustering-based meta-analysis of neuroimaging data, which is a technique that allows to collectively assess, in a quantitative way, activation peaks from several functional imaging studies, in order to extract the most robust results in the cognitive domain of interest. Hierarchical clustering is often used in this context, yet it is prone to the problem of non-uniqueness of the solution: a different permutation of the same input data might result in a different clustering result. In this Thesis, we propose a new version of hierarchical clustering that solves this problem. We also show the results of a meta-analysis, carried out using this algorithm, aimed at identifying specific cerebral circuits involved in single word reading. Moreover, (2) we describe preliminary work on a new connectionist model of single word reading, named the two-component model because it postulates a cascaded information flow from a more cognitive component that computes a distributed internal representation for the input word, to an articulatory component that translates this code into the corresponding sequence of phonemes. Output production is started when the internal code, which evolves in time, reaches a sufficient degree of clarity; this mechanism has been advanced as a possible explanation for behavioral effects consistently reported in the literature on reading, with a specific focus on the so called serial effects. This model is here discussed in its strength and weaknesses. Finally, (3) we have turned to consider how features that are typical of human cognition can inform the design of improved artificial agents; here, we have focused on modelling concepts inspired by emotion theory. A model of emotional interaction between artificial agents, based on probabilistic finite state automata, is presented: in this model, agents have personalities and attitudes that can change through the course of interaction (e.g. by reinforcement learning) to achieve autonomous adaptation to the interaction partner. Markov chain properties are then applied to derive reliable predictions of the outcome of an interaction. Taken together, these works show how the interplay between Cognitive Science and Computer Science can be fruitful, both for advancing our knowledge of the human brain and for designing more and more intelligent artificial systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Berzowska, Joanna Maria 1972. "Computational expressionism : a study of drawing with computation." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/61101.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, February 1999.
Includes bibliographical references (leaves 68-73).
This thesis presents computational expressionism, an exploration of drawing using a computer that redefines the concepts of line and composition for the digital medium. It examines the artistic process involved in computational drawing, addressing the issues of skill, algorithmic style, authorship, re-appropriation, interactivity, dynamism, and the creative/evaluative process. The computational line augments the traditional concept of line making as a direct deposit or a scratching on a surface. Digital representation is based on computation; appearance is procedurally determined. The computational line embodies not only an algorithmic construction, but also dynamic and interactive behavior. A computer allows us to construct drawing instruments that take advantage of the dynamism, interactivity, behavioral elements and other features of a programming environment. Drawing becomes a two-fold process, at two distinct levels of interaction with the computer. The artist has to program the appearance and behavior of lines and subsequently draw with these lines by dragging a mouse or gesturing with some other input device. The compositions incorporate the beauty of computation with the creative impetus of the hand, whose apparent mistakes, hesitations and inspirations form a complex and critical component of visual expression.
by Joanna Maria Berzowska.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
3

Miller, Jacob K. "Disentanglement Puzzles and Computation." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1500630352520138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bogan, Nathaniel Rockwood. "Economic allocation of computation time with computation markets." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/32603.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1994.
Includes bibliographical references (leaves 88-91).
by Nathaniel Rockwood Bogan.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
5

Giannakopoulos, Dimitrios. "Quantum computation." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA365665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brekne, Tønnes. "Encrypted Computation." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2001. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-27.

Full text
Abstract:

The ability to construct software, call it a functional ciphertext, which can be remotely executed in encrypted form as an entirely self-contained unit, has the potential for some interesting applications. One such application is the construction of autonomous mobile agents capable of entering into certain types of legally binding contracts on behalf of the sender. At a premium in such circumstances is the ability to protect secret cryptographic keys or other secret information, which typically is necessary for legally binding contracts. Also important is the ability to do powerful computations, that are more than just one-off secure function evaluations.

The problem of constructing computation systems that achieve this, has been attempted by many to little or no avail. This thesis presents three similar cryptographic systems that take a step closer to making such encrypted software a reality.

First is demonstrated how one can construct mappings from finite automata, that through iteration can do computations. A stateless storage construction, called a Turing platform, is defined and it is shown that such a platform, in conjunction with a functional representation of a finite automaton, can perform Turing universal computation.

The univariate, multivariate, and parametric ciphers for the encryption of multivariate mappings are presented and cryptanalyzed. Cryptanalysis of these ciphers shows that they must be used very carefully, in order to resist cryptanalysis. Entirely new to cryptography is the ability to remotely and securely re-encrypt functional ciphertexts made with either univariate or multivariate encryption.

Lastly it is shown how the ciphers presented can be applied to the automaton representations in the form of mappings, to do general encrypted computation. Note: many of the novel constructions in this thesis are covered by a patent application.

APA, Harvard, Vancouver, ISO, and other styles
7

Barenco, Adriano. "Quantum computation." Thesis, University of Oxford, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.360152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gourlay, Iain. "Quantum computation." Thesis, Heriot-Watt University, 2000. http://hdl.handle.net/10399/568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Fulu 1970. "Community computation." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/63016.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Materials Science and Engineering, 2009.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 171-186).
In this thesis we lay the foundations for a distributed, community-based computing environment to tap the resources of a community to better perform some tasks, either computationally hard or economically prohibitive, or physically inconvenient, that one individual is unable to accomplish efficiently. We introduce community coding, where information systems meet social networks, to tackle some of the challenges in this new paradigm of community computation. We design algorithms, protocols and build system prototypes to demonstrate the power of community computation to better deal with reliability, scalability and security issues, which are the main challenges in many emerging community-computing environments, in several application scenarios such as community storage, community sensing and community security. For example, we develop a community storage system that is based upon a distributed P2P (peer-to-peer) storage paradigm, where we take an array of small, periodically accessible, individual computers/peer nodes and create a secure, reliable and large distributed storage system. The goal is for each one of them to act as if they have immediate access to a pool of information that is larger than they could hold themselves, and into which they can contribute new stuff in a both open and secure manner. Such a contributory and self-scaling community storage system is particularly useful where reliable infrastructure is not readily available in that such a system facilitates easy ad-hoc construction and easy portability. In another application scenario, we develop a novel framework of community sensing with a group of image sensors. The goal is to present a set of novel tools in which software, rather than humans, examines the collection of images sensed by a group of image sensors to determine what is happening in the field of view. We also present several design principles in the aspects of community security. In one application example, we present community-based email spain detection approach to deal with email spams more efficiently.
by Fulu Li.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
10

Pratt, Gill. "Pulse computation." Thesis, Massachusetts Institute of Technology, 1990. http://hdl.handle.net/1721.1/14260.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1990.
Includes bibliographical references (leaves 134-135).
by Gill Andrews Pratt.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computation"

1

Kostitsyna, Irina, and Pekka Orponen, eds. Unconventional Computation and Natural Computation. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87993-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mauri, Giancarlo, Alberto Dennunzio, Luca Manzoni, and Antonio E. Porreca, eds. Unconventional Computation and Natural Computation. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39074-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Amos, Martyn, and ANNE CONDON, eds. Unconventional Computation and Natural Computation. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41312-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Patitz, Matthew J., and Mike Stannett, eds. Unconventional Computation and Natural Computation. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58187-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ibarra, Oscar H., Lila Kari, and Steffen Kopecki, eds. Unconventional Computation and Natural Computation. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-08123-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Du, Zhenyu, ed. Intelligence Computation and Evolutionary Computation. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-31656-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

McQuillan, Ian, and Shinnosuke Seki, eds. Unconventional Computation and Natural Computation. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19311-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stepney, Susan, and Sergey Verlan, eds. Unconventional Computation and Natural Computation. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92435-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Durand-Lose, Jérôme, and Nataša Jonoska, eds. Unconventional Computation and Natural Computation. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32894-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Calude, Cristian S., and Michael J. Dinneen, eds. Unconventional Computation and Natural Computation. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21819-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computation"

1

Katzenbeisser, Stefan. "Computational Complexity and Efficient Computation." In Recent Advances in RSA Cryptography, 13–24. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1431-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Colombo, Matteo. "(Mis)computation in Computational Psychiatry." In Neural Mechanisms, 427–48. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54092-0_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Segal, Lynn. "Computation." In The Dream of Reality, 73–95. New York, NY: Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4613-0115-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lloyd, J. W. "Computation." In Logic for Learning, 183–206. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-662-08406-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Troffaes, Matthias C. M., and Robert Hable. "Computation." In Introduction to Imprecise Probabilities, 329–37. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118763117.ch16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jack Copeland, B. "Computation." In The Blackwell Guide to the Philosophy of Computing and Information, 1–17. Oxford, UK: Blackwell Publishing Ltd, 2008. http://dx.doi.org/10.1002/9780470757017.ch1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ramnath, Rudrapatna V. "Computation." In SpringerBriefs in Applied Sciences and Technology, 9–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25749-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yiannoudes, Socrates. "Computation." In Architecture in Digital Culture, 89–133. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003241287-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alpsancar, Suzana. "Computation." In Mensch-Maschine-Interaktion, 244–46. Stuttgart: J.B. Metzler, 2019. http://dx.doi.org/10.1007/978-3-476-05604-7_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zadeh, Lotfi A. "Computation." In Computing with Words, 73–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-27473-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computation"

1

Jansen, Thomas, and Frank Neumann. "Computational complexity and evolutionary computation." In the 11th annual conference companion. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1570256.1570416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jansen, Thomas, and Frank Neumann. "Computational complexity and evolutionary computation." In the 2007 GECCO conference companion. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1274000.1274112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jansen, Thomas, and Frank Neumann. "Computational complexity and evolutionary computation." In the 12th annual conference comp. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1830761.1830914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jansen, Thomas, and Frank Neumann. "Computational complexity and evolutionary computation." In the 2008 GECCO conference companion. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1388969.1389062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jansen, Thomas, and Frank Neumann. "Computational complexity and evolutionary computation." In the 13th annual conference companion. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2001858.2002127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maley, Corey. "Analog Computation in Computational Cognitive Neuroscience." In 2018 Conference on Cognitive Computational Neuroscience. Brentwood, Tennessee, USA: Cognitive Computational Neuroscience, 2018. http://dx.doi.org/10.32470/ccn.2018.1178-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dhamodaran, M., and R. Dhanasekaran. "Efficient capacitance computation for computational electromagnetics." In 2014 International Conference on Communications and Signal Processing (ICCSP). IEEE, 2014. http://dx.doi.org/10.1109/iccsp.2014.6950133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bakar, Rohani binti Abu, and Junzo Watada. "Computational cluster validation in DNA-based computation." In 2009 IEEE International Symposium on Intelligent Signal Processing - (WISP 2009). IEEE, 2009. http://dx.doi.org/10.1109/wisp.2009.5286561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Salmani, Mahsa, and Timothy N. Davidson. "Multiple access computational offloading with computation constraints." In 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE, 2017. http://dx.doi.org/10.1109/spawc.2017.8227713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fadhli, Mulkan, Taufiq Abdul Gani, Melinda, and Yuwaldi Away. "Comparison on efficiency of computational efforts between cluster computation (MapReduce) and single host computation." In 2012 International Conference on Cloud Computing and Social Networking (ICCCSN). IEEE, 2012. http://dx.doi.org/10.1109/icccsn.2012.6215743.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computation"

1

Golub, Gene H. Computational Equipment for the Development of Numerical Algorithms Computation. Fort Belvoir, VA: Defense Technical Information Center, August 1990. http://dx.doi.org/10.21236/ada226702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chandy, K. M. Parallel Computation. Fort Belvoir, VA: Defense Technical Information Center, September 1994. http://dx.doi.org/10.21236/ada284831.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oldehoeft, Rodney R. Parallel Functional Computation. Fort Belvoir, VA: Defense Technical Information Center, November 1989. http://dx.doi.org/10.21236/ada214627.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Austin, Robert H. Computation by Bacteria. Fort Belvoir, VA: Defense Technical Information Center, January 2011. http://dx.doi.org/10.21236/ada535062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lawrence, Jim. Polytope volume computation. Gaithersburg, MD: National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.ir.89-4123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Traub, Joseph F. Continuous Quantum Computation. Fort Belvoir, VA: Defense Technical Information Center, March 2007. http://dx.doi.org/10.21236/ada465614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yepez, Jeffrey. New World Vistas: New Models of Computation Lattice Based Quantum Computation. Fort Belvoir, VA: Defense Technical Information Center, July 1996. http://dx.doi.org/10.21236/ada421712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Grefenstette, John. Topics in Evolutionary Computation. Fort Belvoir, VA: Defense Technical Information Center, August 2000. http://dx.doi.org/10.21236/ada398950.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Crawford, D. Computation 2013 Annual Report. Office of Scientific and Technical Information (OSTI), December 2013. http://dx.doi.org/10.2172/1129142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cristoforides, Andreas, and Aaaron Miller. Linear optical quantum computation. Web of Open Science, July 2020. http://dx.doi.org/10.37686/qrl.v1i2.58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography