派博傳思國際中心

標(biāo)題: Titlebook: Algorithms and Computation; 13th International S Prosenjit Bose,Pat Morin Conference proceedings 2002 Springer-Verlag Berlin Heidelberg 200 [打印本頁]

作者: BULB    時間: 2025-3-21 16:07
書目名稱Algorithms and Computation影響因子(影響力)




書目名稱Algorithms and Computation影響因子(影響力)學(xué)科排名




書目名稱Algorithms and Computation網(wǎng)絡(luò)公開度




書目名稱Algorithms and Computation網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Algorithms and Computation被引頻次




書目名稱Algorithms and Computation被引頻次學(xué)科排名




書目名稱Algorithms and Computation年度引用




書目名稱Algorithms and Computation年度引用學(xué)科排名




書目名稱Algorithms and Computation讀者反饋




書目名稱Algorithms and Computation讀者反饋學(xué)科排名





作者: Excise    時間: 2025-3-22 00:10

作者: incontinence    時間: 2025-3-22 01:42

作者: 為寵愛    時間: 2025-3-22 05:34

作者: LIMIT    時間: 2025-3-22 11:09
Michael Wendler,Ernst-Ulrich Huster the time to access item . is . (1 + log W/..), where . = Σ.=1...; the data structure is dynamic. We present deterministic and randomized variations, which are nearly identical; the deterministic one simply ensures the balance condition that the randomized one achieves probabilistically. We use the same method to analyze both.
作者: 草本植物    時間: 2025-3-22 13:55

作者: Limited    時間: 2025-3-22 19:24

作者: cluster    時間: 2025-3-22 21:39

作者: miniature    時間: 2025-3-23 05:18

作者: SCORE    時間: 2025-3-23 08:37
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/a/image/153124.jpg
作者: 明智的人    時間: 2025-3-23 13:42

作者: etidronate    時間: 2025-3-23 16:30
Cutting a Country for Smallest Square Fit rotation — they have the minimum possible bounding square. If we cut with a single horizontal or vertical segment, then we can compute an optimal solution for a convex polygon with . vertices in .) time. For simple polygons we give an .(..g.(.) log .) time algorithm.
作者: SEEK    時間: 2025-3-23 18:16

作者: 奇怪    時間: 2025-3-23 22:49
Improved Approximation Algorithms for Max-2SAT with Cardinality Constraint We present an approximation algorithm with polynomial running time for Max-2SAT-CC. This algorithm achieves, for any ε > 0, approximation ratio .. Furthermore, we present a greedy algorithm with running time . log . and approximation ratio 1/2. The latter algorithm even works for clauses of arbitrary length.
作者: 蓋他為秘密    時間: 2025-3-24 03:34
Michael Wendler,Ernst-Ulrich Huster the time to access item . is . (1 + log W/..), where . = Σ.=1...; the data structure is dynamic. We present deterministic and randomized variations, which are nearly identical; the deterministic one simply ensures the balance condition that the randomized one achieves probabilistically. We use the
作者: thrombus    時間: 2025-3-24 07:15

作者: 帶傷害    時間: 2025-3-24 11:12

作者: 藕床生厭倦    時間: 2025-3-24 15:39

作者: 不如屎殼郎    時間: 2025-3-24 22:39
Der K?rper als soziales Ged?chtnisdezvous occurs if there are adjacent nodes . and . such that . chooses . and . chooses .. Métivier .. (2000) asked whether it is true that the probability for a rendezvous to occur in . is at least as large as the probability of a rendezvous if the same experiment is carried out in the complete grap
作者: 虛構(gòu)的東西    時間: 2025-3-25 01:45

作者: Ambulatory    時間: 2025-3-25 05:44

作者: 聰明    時間: 2025-3-25 11:35
Scham, K?rper, Geheimnis und Ged?chtnistes between nondecreasing and nonincreasing modes a fixed number of times) operating on bounded languages (i.e., subsets of ... ...... for some nonnull words w.,..., ..) is decidable, settling an open problem in [.,.]. The proof is a rather involved reduction to the solution of a special class of Di
作者: RENIN    時間: 2025-3-25 14:45

作者: 原告    時間: 2025-3-25 16:50

作者: 萬靈丹    時間: 2025-3-25 23:41
Minas Dimitriou,Susanne Ring-Dimitrioue graphs with each vertex and edge a number in [0,1] associated. These graphs model networks in which sites and links can fail, with a given probability, independently of whether other sites or links fail or not. The number in [0,1] associated to each element is the probability that this element doe
作者: 爵士樂    時間: 2025-3-26 03:37

作者: 駕駛    時間: 2025-3-26 07:29

作者: gait-cycle    時間: 2025-3-26 09:19
Der Künstler im internationalen Steuerrecht that the number of bins that receive items of total size at least 1 is maximized. This is a dual problem to the classical bin packing problem. In this paper we present the first asymptotic fully polynomial-time approximation scheme (AFPTAS) for the bin covering problem.
作者: goodwill    時間: 2025-3-26 16:08

作者: 四溢    時間: 2025-3-26 20:16

作者: Incise    時間: 2025-3-27 01:01

作者: Exclude    時間: 2025-3-27 05:10
978-3-540-00142-3Springer-Verlag Berlin Heidelberg 2002
作者: 政府    時間: 2025-3-27 05:35
Scham, K?rper, Geheimnis und Ged?chtnisThe paper presents several results that can be helpful for deciding whether the clique-width of graphs in a certain class is bounded or not, and applies these results to a number of particular graph classes.
作者: 值得    時間: 2025-3-27 13:27

作者: Diskectomy    時間: 2025-3-27 15:11
https://doi.org/10.1007/978-3-642-33874-8In this paper, we consider the two-stage assembly scheduling problem with two machines at the first stage. The problem has been known to be strongly NP-hard and a 1.5-approximation algorithm has been obtained. We give a 1.37781-approximation algorithm that runs in .(n. log .) time for an instance with . jobs.
作者: 平庸的人或物    時間: 2025-3-27 20:42
On the Clique-Width of Graphs in Hereditary ClassesThe paper presents several results that can be helpful for deciding whether the clique-width of graphs in a certain class is bounded or not, and applies these results to a number of particular graph classes.
作者: 存心    時間: 2025-3-28 00:57

作者: etiquette    時間: 2025-3-28 03:42
A Better Approximation for the Two-Stage Assembly Scheduling Problem with Two Machines at the First In this paper, we consider the two-stage assembly scheduling problem with two machines at the first stage. The problem has been known to be strongly NP-hard and a 1.5-approximation algorithm has been obtained. We give a 1.37781-approximation algorithm that runs in .(n. log .) time for an instance with . jobs.
作者: 減震    時間: 2025-3-28 08:57
Scham, K?rper, Geheimnis und Ged?chtnise implementation, (b) efficiency — experimental performance compares favorably with Delaunay-based algorithms, (c) robustness — curves with multiple components and sharp corners are reconstructed satisfactorily, and (d) potential extension to surface reconstruction.
作者: 膠水    時間: 2025-3-28 14:04
Der K?rper im biographischen Kontextng quantum multi-prover interactive proof systems is equal to NEXP. Related to these, it is shown that, if a prover does not have his private qubits, the class of languages having quantum single-prover interactive proof systems is also equal to NEXP.
作者: Basal-Ganglia    時間: 2025-3-28 17:21
https://doi.org/10.1007/978-3-322-80424-2hich is a much weaker version of the .-conjecture. Since the .-conjecture differs from the trivial lower bound only at the coefficient, this result provides an interesting example where increasing the coefficient in a trivial lower bound of straight-line complexity is difficult and important.
作者: 迅速飛過    時間: 2025-3-28 18:53

作者: mucous-membrane    時間: 2025-3-29 02:22
https://doi.org/10.1007/978-3-642-33874-8orking set property by demonstrating that it is impossible to create a queueish binary search tree, but that many search data structures can be made almost queueish with a O(log log .) amortized extra cost per operation.
作者: bonnet    時間: 2025-3-29 07:02

作者: irreducible    時間: 2025-3-29 07:30

作者: glisten    時間: 2025-3-29 12:24

作者: synovium    時間: 2025-3-29 18:43
Quantum Multi-prover Interactive Proof Systems with Limited Prior Entanglementng quantum multi-prover interactive proof systems is equal to NEXP. Related to these, it is shown that, if a prover does not have his private qubits, the class of languages having quantum single-prover interactive proof systems is also equal to NEXP.
作者: 修改    時間: 2025-3-29 21:55

作者: Encoding    時間: 2025-3-30 03:52
Michael Wendler,Ernst-Ulrich Hustery pattern efficiently while keeping the size of the data structures moderate. The size is comparable with the text size, which is an improvement from existing methods using .(. log .) bit space for a text collection of length ..
作者: adulterant    時間: 2025-3-30 07:18

作者: 四目在模仿    時間: 2025-3-30 09:32

作者: 宣誓書    時間: 2025-3-30 15:23

作者: 我邪惡    時間: 2025-3-30 19:59
Ernst-Ulrich Huster,Johannes D. Schüttesequence where the key values are assigned arbitrarily to unordered data as fast as any offline binary search tree algorithm, within a multiplicative constant. Asymptotically tight upper and lower bounds are presented for key-independent optimality. Splay trees are shown to be key-independently optimal.
作者: Repatriate    時間: 2025-3-31 00:19

作者: 嚙齒動物    時間: 2025-3-31 04:01

作者: Extricate    時間: 2025-3-31 08:00
Scham, K?rper, Geheimnis und Ged?chtnisl words w.,..., ..) is decidable, settling an open problem in [.,.]. The proof is a rather involved reduction to the solution of a special class of Diophantine systems of degree 2 via a class of programs called two-phase programs. The result has applications to verification of infinite state systems.
作者: 細(xì)查    時間: 2025-3-31 12:44

作者: 確定的事    時間: 2025-3-31 15:49
On the Comparison-Addition Complexity of All-Pairs Shortest Pathsn approaches based on Dijkstra’s algorithm, and for graphs with .(.) edges our algorithm is within a tiny .(log .) factor of optimal. The algorithm can be implemented to run in polynomial time (though it is not a pleasing polynomial). We leave open the problem of providing an efficient implementation.
作者: overrule    時間: 2025-3-31 19:13
The Probability of a Rendezvous Is Minimal in Complete Graphslity for a rendezvous to occur in . is at least as large as the probability of a rendezvous if the same experiment is carried out in the complete graph on the same number of nodes. In this paper we show that this is the case.
作者: agitate    時間: 2025-3-31 21:45

作者: 瘋狂    時間: 2025-4-1 02:25
Biased Skip Lists the time to access item . is . (1 + log W/..), where . = Σ.=1...; the data structure is dynamic. We present deterministic and randomized variations, which are nearly identical; the deterministic one simply ensures the balance condition that the randomized one achieves probabilistically. We use the
作者: saturated-fat    時間: 2025-4-1 06:03

作者: objection    時間: 2025-4-1 13:22

作者: misanthrope    時間: 2025-4-1 17:33
On the Comparison-Addition Complexity of All-Pairs Shortest Pathse number of edges and vertices, resp., and . = .(.) is Tarjan’s inverse-Ackermann function. Our algorithm eliminates the sorting bottleneck inherent in approaches based on Dijkstra’s algorithm, and for graphs with .(.) edges our algorithm is within a tiny .(log .) factor of optimal. The algorithm ca
作者: Seminar    時間: 2025-4-1 22:32

作者: Deference    時間: 2025-4-1 22:38
Non-Delaunay-Based Curve Reconstructioned on bounding curvature to determine monotone pieces of the curve. Theoretical guarantees are established. The implemented algorithm, based heuristically on the theory, proceeds by iteratively partitioning the sample points using an octree data structure. The strengths of the approach are (a) simpl
作者: Incise    時間: 2025-4-2 06:26
Cutting a Country for Smallest Square Fit rotation — they have the minimum possible bounding square. If we cut with a single horizontal or vertical segment, then we can compute an optimal solution for a convex polygon with . vertices in .) time. For simple polygons we give an .(..g.(.) log .) time algorithm.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
天峻县| 清苑县| 嘉定区| 同江市| 襄城县| 峨边| 太和县| 偏关县| 东兴市| 乌鲁木齐县| 邹城市| 泽州县| 漳浦县| 梅州市| 太谷县| 铜山县| 宜阳县| 和平县| 廉江市| 黎平县| 苍山县| 交口县| 方山县| 普定县| 禹州市| 永定县| 大兴区| 繁昌县| 调兵山市| 霍州市| 沂水县| 南投县| 綦江县| 凤凰县| 凤山市| 磴口县| 阜阳市| 义马市| 招远市| 彩票| 长泰县|