Sciweavers

696 search results - page 16 / 140
» A class of combinatorial identities
Sort
View
SIGECOM
2008
ACM
155views ECommerce» more  SIGECOM 2008»
14 years 11 months ago
Tight information-theoretic lower bounds for welfare maximization in combinatorial auctions
We provide tight information-theoretic lower bounds for the welfare maximization problem in combinatorial auctions. In this problem, the goal is to partition m items among k bidde...
Vahab S. Mirrokni, Michael Schapira, Jan Vondr&aac...
68
Voted
INFOCOM
2009
IEEE
15 years 6 months ago
Identity Aware Sensor Networks
—In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be a...
Lorenzo Keller, Mahdi Jafari Siavoshani, Christina...
JC
2008
92views more  JC 2008»
14 years 11 months ago
Characterizing Valiant's algebraic complexity classes
Valiant introduced 20 years ago an algebraic complexity theory to study the complexity of polynomial families. The basic computation model used is the arithmetic circuit, which ma...
Guillaume Malod, Natacha Portier
CORR
2010
Springer
95views Education» more  CORR 2010»
14 years 11 months ago
Deciding the finiteness of the number of simple permutations contained in a wreath-closed class is polynomial
We present an algorithm running in time O(n log n) which decides if a wreathclosed permutation class Av(B) given by its finite basis B contains a finite number of simple permutati...
Frédérique Bassino, Mathilde Bouvel,...
CP
2008
Springer
15 years 1 months ago
Classes of Submodular Constraints Expressible by Graph Cuts
Submodular constraints play an important role both in theory and practice of valued constraint satisfaction problems (VCSPs). It has previously been shown, using results from the ...
Stanislav Zivný, Peter Jeavons