Sciweavers

2652 search results - page 276 / 531
» Privacy-preserving linear programming
Sort
View
141
Voted
SODA
2004
ACM
161views Algorithms» more  SODA 2004»
15 years 5 months ago
Approximation schemes for Metric Bisection and partitioning
We design polynomial time approximation schemes (PTASs) for Metric BISECTION, i.e. dividing a given finite metric space into two halves so as to minimize or maximize the sum of di...
Wenceslas Fernandez de la Vega, Marek Karpinski, C...
130
Voted
WSC
2004
15 years 5 months ago
Multi-Formalism Modeling Approach for Semiconductor Supply/Demand Networks
Building computational models of real world systems usually requires the interaction of decision modules and simulation modules. Given different models and algorithms, the major h...
Gary W. Godding, Hessam S. Sarjoughian, Karl G. Ke...
131
Voted
WCE
2007
15 years 4 months ago
Game Theory Using Genetic Algorithms
—In this paper we used genetic algorithms to1 find the solution of game theory. We proposed new method foe solving game theory and find the optimal strategy for player A or playe...
Ismail A. Ismail, Nabawia A. El Ramly, M. M. El Ka...
AMC
2007
168views more  AMC 2007»
15 years 3 months ago
The method of lines for the numerical solution of a mathematical model for capillary formation: The role of tumor angiogenic fac
In this paper we present the method of lines for the numerical solution of a mathematical model for capillary formation in two space dimensions x,y. We study the tumor angiogenic ...
Arzu Erdem, Serdal Pamuk
125
Voted
CN
2008
118views more  CN 2008»
15 years 3 months ago
Modeling and computing throughput capacity of wireless multihop networks
Capacity is an important property for QoS support in Mobile Ad Hoc Networks (MANETs) and has been extensively studied. However, most approaches rely on simplified models (e.g., pr...
Patrick Stuedi, Gustavo Alonso