Sciweavers

96
Voted
CDC
2010
IEEE
102views Control Systems» more  CDC 2010»
14 years 7 months ago
Stock market trading via stochastic network optimization
We consider the problem of dynamic buying and selling of shares from a collection of N stocks with random price fluctuations. To limit investment risk, we place an upper bound on t...
Michael J. Neely
102
Voted
IPPS
2010
IEEE
14 years 10 months ago
Varying bandwidth resource allocation problem with bag constraints
We consider the problem of scheduling jobs on a pool of machines. Each job requires multiple machines on which it executes in parallel. For each job, the input specifies release ti...
Venkatesan T. Chakaravarthy, Vinayaka Pandit, Yogi...
104
Voted
TIT
2008
105views more  TIT 2008»
15 years 4 days ago
Network Coding Capacity With a Constrained Number of Coding Nodes
Abstract-- We study network coding capacity under a constraint on the total number of network nodes that can perform coding. That is, only a certain number of network nodes can pro...
Jillian Cannons, Kenneth Zeger
95
Voted
ARSCOM
2005
92views more  ARSCOM 2005»
15 years 4 days ago
Binary Strings Without Odd Runs of Zeros
We look at binary strings of length n which contain no odd run of zeros and express the total number of such strings, the number of zeros, the number of ones, the total number of ...
Ralph Grimaldi, Silvia Heubach
ORDER
2008
61views more  ORDER 2008»
15 years 5 days ago
Partitioning Posets
Given a poset P = (X, ), a partition X1, . . . , Xk of X is called an ordered partition of P if, whenever x Xi and y Xj with x y, then i j. In this paper, we show that for ever...
Viresh Patel
86
Voted
COMBINATORICS
2007
83views more  COMBINATORICS 2007»
15 years 7 days ago
Explicit Enumeration of Triangulations with Multiple Boundaries
We enumerate rooted triangulations of a sphere with multiple holes by the total number of edges and the length of each boundary component. The proof relies on a combinatorial iden...
Maxim Krikun
105
Voted
COMCOM
2006
123views more  COMCOM 2006»
15 years 8 days ago
Modeling the performance of flooding in wireless multi-hop Ad hoc networks
One feature common to most existing routing protocols for wireless mobile ad hoc networks, or MANETs, is the need to flood control messages network-wide during the route acquisiti...
Kumar Viswanath, Katia Obraczka
111
Voted
COMBINATORICS
2006
153views more  COMBINATORICS 2006»
15 years 8 days ago
BG-Ranks and 2-Cores
We find the number of partitions of n whose BG-rank is j, in terms of pp(n), the number of pairs of partitions whose total number of cells is n, giving both bijective and generati...
William Y. C. Chen, Kathy Q. Ji, Herbert S. Wilf
91
Voted
DM
2008
103views more  DM 2008»
15 years 9 days ago
A note on lattice chains and Delannoy numbers
Fix nonnegative integers n1, . . . , nd and let L denote the lattice of integer points (a1, . . . , ad) Zd satisfying 0 ai ni for 1 i d. Let L be partially ordered by the usua...
John S. Caughman IV, Clifford R. Haithcock, J. J. ...
97
Voted
STOC
1995
ACM
108views Algorithms» more  STOC 1995»
15 years 3 months ago
A parallel repetition theorem
We show that a parallel repetition of any two-prover one-round proof system (MIP(2, 1)) decreases the probability of error at an exponential rate. No constructive bound was previou...
Ran Raz