International audienceThe role of simulation keeps increasing for the sensitivity analysis and the uncertainty quantification of complex systems. Such numerical procedures are generally based on the processing of a huge amount of code evaluations. When the computational cost associated with one particular evaluation of the code is high, such direct approaches based on the computer code only, are not affordable. Surrogate models have therefore to be introduced to interpolate the information given by a fixed set of code evaluations to the whole input space. When confronted to deterministic mappings, the Gaussian process regression (GPR), or kriging, presents a good compromise between complexity , efficiency and error control. Such a method co...
International audienceRobust optimization is typically based on repeated calls to a deterministic si...
International audienceRobust optimization is typically based on repeated calls to a deterministic si...
International audienceThis paper considers the surrogate modeling of a complex numerical code in a m...
International audienceThe role of simulation keeps increasing for the sensitivity analysis and the u...
International audienceThe role of simulation keeps increasing for the sensitivity analysis and the u...
International audienceThe role of simulation keeps increasing for the sensitivity analysis and the u...
The role of simulation has kept increasing for the sensitivity analysis and the uncertainty quantifi...
The role of simulation has kept increasing for the sensitivity analysis and the uncertainty quantifi...
Three types of observations of the system exist: those of the chained code, those of the first code ...
Three types of observations of the system exist: those of the chained code, those of the first code ...
This work is on Gaussian-process based approximation of a code which can be run at different levels ...
International audienceRobust optimization is typically based on repeated calls to a deterministic si...
International audienceRobust optimization is typically based on repeated calls to a deterministic si...
International audienceRobust optimization is typically based on repeated calls to a deterministic si...
International audienceRobust optimization is typically based on repeated calls to a deterministic si...
International audienceRobust optimization is typically based on repeated calls to a deterministic si...
International audienceRobust optimization is typically based on repeated calls to a deterministic si...
International audienceThis paper considers the surrogate modeling of a complex numerical code in a m...
International audienceThe role of simulation keeps increasing for the sensitivity analysis and the u...
International audienceThe role of simulation keeps increasing for the sensitivity analysis and the u...
International audienceThe role of simulation keeps increasing for the sensitivity analysis and the u...
The role of simulation has kept increasing for the sensitivity analysis and the uncertainty quantifi...
The role of simulation has kept increasing for the sensitivity analysis and the uncertainty quantifi...
Three types of observations of the system exist: those of the chained code, those of the first code ...
Three types of observations of the system exist: those of the chained code, those of the first code ...
This work is on Gaussian-process based approximation of a code which can be run at different levels ...
International audienceRobust optimization is typically based on repeated calls to a deterministic si...
International audienceRobust optimization is typically based on repeated calls to a deterministic si...
International audienceRobust optimization is typically based on repeated calls to a deterministic si...
International audienceRobust optimization is typically based on repeated calls to a deterministic si...
International audienceRobust optimization is typically based on repeated calls to a deterministic si...
International audienceRobust optimization is typically based on repeated calls to a deterministic si...
International audienceThis paper considers the surrogate modeling of a complex numerical code in a m...