نتایج جستجو برای: combinatorial scheme

تعداد نتایج: 264394  

2001
PAULO M. FRANÇA LUCIANA BURIOL

Population based metaheuristics, such as hybrid genetic algorithms or memetic algorithms, play an important role in the solution of combinatorial optimization problems. The memetic algorithm presented here for the no-wait flowshop scheduling problem addresses a hierarchically organized complete ternary tree to represent the population that putted together with a recombination plan resembles a p...

Journal: :CoRR 2012
Srikrishna Sridhar Victor Bittorf Ji Liu Ce Zhang Christopher Ré Stephen J. Wright

The vertex cover problem Find a set of vertices that cover the graph LP rounding is a 4 step scheme to approximate combinatorial problems with theoretical guarantees on solution quality. Several problems in machine learning, computer vision and data analysis can be formulated using NP-­‐hard combinatorial optimization problems. In many of these applications, approximate solutions for these NP-­...

Journal: :Journal of the American Chemical Society 2002
Sheng Ding Nathanael S Gray Xu Wu Qiang Ding Peter G Schultz

A novel strategy for efficient synthesis of various substituted heterocycles as kinase-directed combinatorial libraries is described. The general scheme involves capture of various dichloroheterocycles onto solid support and further elaborations by aromatic substitution with amines at elevated temperature or by anilines, boronic acids, and phenols via palladium-catalyzed cross-coupling reaction...

Journal: :CoRR 2014
Mark Sh. Levin

The survey methodological paper addresses a glance to a general decision support platform technology for modular systems (modular/composite alterantives/solutions) in various applied domains. The decision support platform consists of seven basic combinatorial engineering frameworks The following is described: (1) general scheme of the decision support platform technology; (2) brief descriptions...

Journal: :SIAM J. Discrete Math. 1998
Douglas R. Stinson Ruizhong Wei

In this paper we investigate combinatorial properties and constructions of two recent topics of cryptographic interest namely frameproof codes for digital ngerprinting and traceability schemes for broadcast encryption We rst give combinatorial descriptions of these two objects in terms of set systems and also discuss the Hamming distance of frameproof codes when viewed as error correcting codes...

Journal: :bulletin of the iranian mathematical society 2011
a. abdollahi a. mohammadi hassanabadi

Journal: :Electronic Journal of Combinatorics 2021

In this paper we study the moments of polynomials from Askey scheme, and focus on Askey-Wilson polynomials. More precisely, give a combinatorial proof for case where $d=0$. Their values have already been computed by Kim Stanton in 2015, however, is not completely combinatorial, which means that an explicit bijection has exhibited yet. work, use new approach simpler Al-Salam-Carlitz, using sign ...

Journal: :bulletin of the iranian mathematical society 2012
ali tavakoli alireza abdollahi howard e. bell

let $r$ be an infinite ring. here we prove that if $0_r$ belongs to ${x_1x_2cdots x_n ;|; x_1,x_2,dots,x_nin x}$ for every infinite subset $x$ of $r$, then $r$ satisfies the polynomial identity $x^n=0$. also we prove that if $0_r$ belongs to ${x_1x_2cdots x_n-x_{n+1} ;|; x_1,x_2,dots,x_n,x_{n+1}in x}$ for every infinite subset $x$ of $r$, then $x^n=x$ for all $xin r$.

Journal: :Int. J. Comput. Geometry Appl. 2007
Stefan Kirchner

We present an FPTAS for a combinatorial optimization problem which is motivated by a problem in drug-design. The problem is as follows. One is given two finite subsets A,B of points in three-dimensional space which represent the centers of atoms of two molecules. The objective function is large if there are an appropriate rigid motion M , subsets S ⊂ A and T ⊂ B of the same size and a bijective...

2005
Sarang Aravamuthan Sachin Lodha

In broadcast networks, it is often required to encrypt data so that only a privileged set of users with access to the session key can access the data. The standard technique of transferring the session key to each user individually does not scale with the number of users typically found on a network such as cable. This method is not only time-wise inefficient, but also incurs high communication...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید