Sciweavers

2652 search results - page 137 / 531
» Privacy-preserving linear programming
Sort
View
MOR
2002
94views more  MOR 2002»
15 years 2 months ago
The Complexity of Generic Primal Algorithms for Solving General Integer Programs
ngly better objective function value until an optimal solution is reached. From an abstract point of view, an augmentation problem is solved in each iteration. That is, given a fea...
Andreas S. Schulz, Robert Weismantel
JCO
2000
116views more  JCO 2000»
15 years 3 months ago
Multi-phase Algorithms for Throughput Maximization for Real-Time Scheduling
We consider the problem of off-line throughput maximization for job scheduling on one or more machines, where each job has a release time, a deadline and a profit. Most of the ver...
Piotr Berman, Bhaskar DasGupta
113
Voted
ARC
2009
Springer
137views Hardware» more  ARC 2009»
15 years 10 months ago
Heterogeneous Architecture Exploration: Analysis vs. Parameter Sweep
This paper argues the case for the use of analytical models in FPGA architecture layout exploration. We show that the problem when simplified, is amenable to formal optimization t...
Asma Kahoul, George A. Constantinides, Alastair M....
VTC
2008
IEEE
173views Communications» more  VTC 2008»
15 years 9 months ago
Adaptive Call Admission Control with Dynamic Resource Reallocation for Cell-Based Multirate Wireless Systems
—This paper studies the admission control and resource allocation in a cell-based wireless system that supports singlemedia and multirate services. Utilizing the idea of adaptive...
Kai-Wei Ke, Chen-Nien Tsai, Ho-Ting Wu, Chia-Hao H...
ICC
2007
IEEE
123views Communications» more  ICC 2007»
15 years 9 months ago
A New ILP-Based p-Cycle Construction Algorithm without Candidate Cycle Enumeration
—The notion of p-cycle (Preconfigured Protection Cycle) allows capacity efficient schemes to be designed for fast span protection in WDM mesh networks. Conventional p-cycle const...
Bin Wu, Kwan Lawrence Yeung, King-Shan Lui, Shizho...