SYNASC2022: 24TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

$
$r$-cyclic covering
*
*-b-enriched nonexpansive mapping
A
admissible perturbation
adversarial machine learning
Affective computing
Aho-Corasick
algebraic geometry
Algorithms
Amigos
analytic combinatorics in several variables
Ant Colony Optimization
antibiotics
artificial intelligence
artificial life
astronomy
asymptotics
augmented data
author ranking
automata
automated deduction
automated fact-checking
B
b-enriched multivalued nonexpansive mapping Krasnoselskii iterative process
b-enriched nonexpansive mapping
bacteria
Banach contraction prin-ciple
Banach space
Berenstein-Kazhdan potential
Bert
bibliometrics
big data
binding site prediction
bio-inspired dynamic systems
bioinformatics
blockchain
blood glucose
body part classification
body shape estimation
boosting
BrainMetShare
BraTS
Breast Cancer
broadcasting
C
cellular automata
centrality measures
Certification
CEUS
chatbot
Ciric type operators
Class Activation Mapping
classical first-order logic
closed-loop
closest vector problem
co-authorship
code equivalence
coextensivity
collaborator group ranking
combinatorial optimization
Combinatorial testing
COMET
common fixed point
compatible
compiler
completeness
complexity
compressed pattern matching
compression
computational complexity
computational logic
computer algebra
Computer Vision
conceptual modelling
concurrent programming language
conference analysis
Conflicting Points
consensus
Contractive condition of integral type
convergence theorem
convex metric spaces
Convolutional Neural Network (CNN)
Convolutional Neural Networks
Covering arrays
cryptanalysis
cryptocurrency
cultural heritage
cyclic contraction
D
data augmentation
data cleansing
data dependence
data distillation
data mining
data quality
dataset
Debugging
decidability
Decision Regression Forest
deducibility
deep learning
deep neural classifier
deep neural networks
Def-use chains
demicontractive operator
densest k-subgraph problem
description logics
Detection Rate
development
diffusion equation
digital twin
distance methods
distributed computing
DNA
docker
driver monitoring
dynamic models
Dynamical Systems
E
E-Health
eigenpairs
Emotion prediction
Emotional Psychology
encryption
enriched contraction
enriched nonexpansive operator
Equational Constraints
equivalence class
explainable AI
Expression explosion
extraction
extractive summarization
extreme points
eye detection
F
F-polynomials
F4 Algorithm
fake news
False Positive Rate
Fast Fourier transform
feature mining
feature selection
features
financial crime
firefly algorithm
fixed point
Fixed point theorems
food recognition
fully-adaptive
Function Extraction
G
GAN
GANs
Generative Adversarial Networks
Genetic Algorithm
Genetic Programming
genome
genomic information
GrabCut
graph neural networks
graph theory
graph-rewriting automata
Gross-Hacking-Keel-Kontsevich potential
H
H-distance space
Hagenberg
hate-speech
Hilbert space
Hill-Climbing
homotopy
HPO
HW/SW co-design
I
Image approximation
image processing
imbalanced data classification
index of coincidence
inertial iteration
information systems
infrared camera
intrusion detection
IT alerts
K
k-means
L
labeling automation
lattice basis
lattices
Lempel-Ziv
less-than-one -shot learning
licence plate recognition
linear operators
liver lesion detection
logic tensor networks
LSTM
LZW
M
machine learning
malicious code detection
malware
Malware Detection
Mammogram Classification
Markov decision processes
Maslov's inverse method
mathematical modeling
matrix
matrix computation
mean squared error
Memetic local optimization
Mental health matters.
meta-learning
metaheuristics
Metric Evaluation
metric space
mobile application
model-driven process execution
molecular docking
money laundering
multi-objective
multiple sequence alignment
N
n-gram
named entity recognition
natural language processing
natural language understanding
network analysis
network hyper-parameters
neural networks
Neural Rendering
neuro-symbolic model
Newton polytopes
NFT
non-linear regression
Non-Linear System Identification
noncommutative polynomials
Nonexpansive mapping
nonexpansive operator
Nonlinear least squares
numerical analysis
O
object detection
ODE Systems
offensive speech
optical flow
optimization
Ostrowski stability
P
parallel algorithms
Parallel computing
Parameter Identifiability
parameter optimization
parametrization
parking monitoring
partial differential equations
partially ordered
pattern matching
pattern-matching
Perceptron
Personality detection
phase kinetics
physical twin
Picard iteration
polymer processing
Polynomial Multiplication
polynomial system
porting
Power Amplifier
prediction methods
privacy
Program Analysis
proof of useful work
proof of work
protein structure prediction
Q
Quantified Boolean Formulas
quantifier elimination
quantitative programming
R
R-squared Score
random identifiers
real quantifier elimination
recipe recommendation
recommendation systems
regression analysis
Regression Model
representation
research
research and development
reservation
review study
RISC
RISC-V
Romanian
Romanian language
Root Isolation
S
SAT solving
semantic inpainting
sequent calculus
shortest vector problem
Simulated Annealing
simulation
Skolem Problem
smart fridge
smart parking
social networks
software
Soil Moisture
soundness
Space with distance
Sparse Identification
static analysis
steel
Strict Inequalities
Strong Convergence
structural biology
Support Vector Machine
supremum norm
swarm intelligence
Symbolic calculations
symbolic combinatorics
symbolic computation
symbolic regression
symmetry
synthetic training data
T
textile artefacts
textural features
texture analysis
theorem proving
traditional motifs
trajectory
U
Ulam-Hyers stability
Unet
unit ball
universal lists
V
validity
VBA obfuscation
video games
Video sprites
Visual Basic for Application
Voronoi cell
W
weak convergence
weakly Picard operator
WebAssembly
Weighted Monomial Ordering
wekly commuting
well-posedness
wound segmentation
Z
Z^n isomorphism