Sciweavers

1086 search results - page 119 / 218
» Points surrounding the origin
Sort
View
EOR
2006
78views more  EOR 2006»
15 years 1 months ago
A hybrid multistart heuristic for the uncapacitated facility location problem
We present a multistart heuristic for the uncapacitated facility location problem, based on a very successful method we originally developed for the p-median problem. We show exte...
Mauricio G. C. Resende, Renato Fonseca F. Werneck
FMSD
2006
103views more  FMSD 2006»
15 years 1 months ago
Cones and foci: A mechanical framework for protocol verification
We define a cones and foci proof method, which rephrases the question whether two system specifications are branching bisimilar in terms of proof obligations on relations between ...
Wan Fokkink, Jun Pang, Jaco van de Pol
IJBC
2006
80views more  IJBC 2006»
15 years 1 months ago
Return-Map Cryptanalysis Revisited
As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract secret messages masked by chaos in secure communication schemes. Recently, a simple defen...
Shujun Li, Guanrong Chen, Gonzalo Álvarez
CORR
2007
Springer
84views Education» more  CORR 2007»
15 years 1 months ago
Undirected Graphs of Entanglement Two
Entanglement is a complexity measure of directed graphs that origins in fixed point theory. This measure has shown its use in designing efficient algorithms to verify logical prop...
Walid Belkhir, Luigi Santocanale
DCG
2007
78views more  DCG 2007»
15 years 1 months ago
Convexity in Topological Affine Planes
We extend to topological affine planes the standard theorems of convexity, among them the separation theorem, the anti-exchange theorem, Radon’s, Helly’s, Carath´eodory’s,...
Raghavan Dhandapani, Jacob E. Goodman, Andreas Hol...