作者: Folklore 時間: 2025-3-21 21:37
Hyperpaths and shortest hyperpaths,eneralized for a hyperpath. In particular, the shortest hyperpath problem is studied for a subclass of hyperpaths. Shortest hyperpath properties are derived from the classical one, and efficient algorithms are presented in detail.作者: recession 時間: 2025-3-22 02:04 作者: 丑惡 時間: 2025-3-22 07:25
Natalia Chaban,Serena Kelly,Anne-Marie Bradyoblems, polynomial-time algorithms are available for special classes of graphs. In the present paper, the class of line-graphs is considered and a polynomial algorithm is proposed to solve both UGP and SMP in this class.作者: ALOFT 時間: 2025-3-22 12:22 作者: 合適 時間: 2025-3-22 15:46
https://doi.org/10.1007/BFb0083460algorithms; combinatorial optimization; combinatorics; operations research; optimization作者: 合適 時間: 2025-3-22 19:40
978-3-540-51797-9Springer-Verlag Berlin Heidelberg 1989作者: 不再流行 時間: 2025-3-22 23:13
Lecture Notes in Mathematicshttp://image.papertrans.cn/c/image/229958.jpg作者: Palter 時間: 2025-3-23 03:10 作者: 吹氣 時間: 2025-3-23 08:57
Matthew Gibbons,Serena Kelly,Martin Hollandhe incidence matrix can be represented as a bipartite graph G=(X,Y,E), with the node sets partitioned into the sets X1, X2, Y1 en Y2, such that (a) there are no edges between X1 en Y2, and (b) the cardinality of X1+Y2 is maximum. Such a partition corresponds with the detection of complete and maxima作者: Ophthalmoscope 時間: 2025-3-23 12:38
https://doi.org/10.1007/978-3-030-66203-5plier, and hence the best bound for the original problem, can be determined in at most n?1 applications of a maximum flow algorithm to a network with n+2 vertices and n+m arcs, where n and m denote the numbers of variables and of quadratic terms. A branch-and-bound algorithm using this result is pre作者: emulsify 時間: 2025-3-23 17:10 作者: 不愿 時間: 2025-3-23 20:14
Small States and the European Migrant Crisiseneralized for a hyperpath. In particular, the shortest hyperpath problem is studied for a subclass of hyperpaths. Shortest hyperpath properties are derived from the classical one, and efficient algorithms are presented in detail.作者: ciliary-body 時間: 2025-3-24 00:17
Small States and the European Migrant Crisisansportation, communication, and distribution networks. These families of NOPs include determination of optimal spanning and Steiner trees, multiconnected networks, distance bounded networks. and capacitated networks. Problems belonging to these families are formulated in an unified manner, and exac作者: 浮夸 時間: 2025-3-24 04:16
Arndís Anna Kristínardóttir GunnarsdóttirWe show that a perfect graph not containing (K.-e) as an induced subgraph, and whose clique-node incidence matrix does not belong to a restricted class of totally unimodular matrices, has a star cutset. This result yields a new proof that the Strong Perfect Graph Conjecture is true for this class of graphs.作者: 即席 時間: 2025-3-24 09:16
https://doi.org/10.1007/978-3-030-66203-5We give necessary and sufficient conditions for a graph to be a centroid of another one as well as of itself. Then, we apply these results to some particular classes of graphs: chordal, Halin, series-parallel and outerplanar.作者: 地名詞典 時間: 2025-3-24 13:44
(K4-e)-free perfect graphs and star cutsets,We show that a perfect graph not containing (K.-e) as an induced subgraph, and whose clique-node incidence matrix does not belong to a restricted class of totally unimodular matrices, has a star cutset. This result yields a new proof that the Strong Perfect Graph Conjecture is true for this class of graphs.作者: Interstellar 時間: 2025-3-24 17:22
A characterization of centroidal graphs,We give necessary and sufficient conditions for a graph to be a centroid of another one as well as of itself. Then, we apply these results to some particular classes of graphs: chordal, Halin, series-parallel and outerplanar.作者: Addictive 時間: 2025-3-24 21:28
Matthew Gibbons,Serena Kelly,Martin Holland edge cover in thebipartite graph under the assumption of no isolated vertices. The problem of finding minimal and complete subsets of structurally dependent rows or columns is shown to be NP-complete. A heuristic approach for the detection of these minimal subsets based on Hall‘s transversal algorithm has worked satisfactorily in practice.作者: frozen-shoulder 時間: 2025-3-25 01:06 作者: DRILL 時間: 2025-3-25 04:17
Conference proceedings 1989computer science and operations research, the subject draws on a variety of mathematical methods to deal with problems motivated by real-life applications. Recent research has focussed on the connections to theoretical computer science, in particular to computational complexity and algorithmic issue作者: 起草 時間: 2025-3-25 08:25 作者: Campaign 時間: 2025-3-25 13:06
0075-8434 hmic issues. The Summer School‘s activity centered on the 4 main lecture courses, the notes of which are included in this volume:978-3-540-51797-9978-3-540-46810-3Series ISSN 0075-8434 Series E-ISSN 1617-9692 作者: JAUNT 時間: 2025-3-25 17:10
0075-8434 natorics, computer science and operations research, the subject draws on a variety of mathematical methods to deal with problems motivated by real-life applications. Recent research has focussed on the connections to theoretical computer science, in particular to computational complexity and algorit作者: Muffle 時間: 2025-3-25 22:02
https://doi.org/10.1007/978-3-030-66203-5n+2 vertices and n+m arcs, where n and m denote the numbers of variables and of quadratic terms. A branch-and-bound algorithm using this result is presented and computational experience is reported on.作者: 硬化 時間: 2025-3-26 03:04
Small States and the European Migrant Crisise function, .(.), over the full unit hypercube. Using this relaxation we obtain a bound on (.*). In the special case where the off-diagonal elements of the Hessian matrix are nonnegative, we show that .(.) coincides with the concave envelope.作者: Assignment 時間: 2025-3-26 07:27
Best network flow bounds for the quadratic knapsack problem,n+2 vertices and n+m arcs, where n and m denote the numbers of variables and of quadratic terms. A branch-and-bound algorithm using this result is presented and computational experience is reported on.作者: 灰心喪氣 時間: 2025-3-26 12:02
A bound on the roof-duality gap,e function, .(.), over the full unit hypercube. Using this relaxation we obtain a bound on (.*). In the special case where the off-diagonal elements of the Hessian matrix are nonnegative, we show that .(.) coincides with the concave envelope.作者: Feature 時間: 2025-3-26 15:47
Conference proceedings 1989ions. Recent research has focussed on the connections to theoretical computer science, in particular to computational complexity and algorithmic issues. The Summer School‘s activity centered on the 4 main lecture courses, the notes of which are included in this volume:作者: 減去 時間: 2025-3-26 19:53
Small States and the European Migrant Crisist algorithms, heuristics, as well as algorithms for special cases are surveyed. Commonalities within each family as well as across family boundaries are identified. A wide range of open problems is given.作者: 不透氣 時間: 2025-3-27 00:50 作者: 控訴 時間: 2025-3-27 02:56
Combinatorial structures and combinatorial optimization,作者: evince 時間: 2025-3-27 07:06
A polynomial algorithm for partitioning line-graphs,oblems, polynomial-time algorithms are available for special classes of graphs. In the present paper, the class of line-graphs is considered and a polynomial algorithm is proposed to solve both UGP and SMP in this class.作者: 微枝末節(jié) 時間: 2025-3-27 09:44
Structural dependence and systems of equations,he incidence matrix can be represented as a bipartite graph G=(X,Y,E), with the node sets partitioned into the sets X1, X2, Y1 en Y2, such that (a) there are no edges between X1 en Y2, and (b) the cardinality of X1+Y2 is maximum. Such a partition corresponds with the detection of complete and maxima作者: 殺菌劑 時間: 2025-3-27 13:48 作者: PACT 時間: 2025-3-27 21:44 作者: hypnogram 時間: 2025-3-28 00:12 作者: mechanism 時間: 2025-3-28 04:34 作者: 情感脆弱 時間: 2025-3-28 08:35
Evolutionspsychologische Bausteine,erlying Bayesian Network, it is capable of providing a comprehensible explanation of why a prediction is made. Furthermore, the runtimes of our learning algorithm are orders of magnitude lower than those state-of-the-art methods that are based on deep neural networks.作者: Accolade 時間: 2025-3-28 13:18 作者: Expediency 時間: 2025-3-28 18:38
airs playroom the center of their lives, the place “where their meals were served and eaten while I either read to them or made up wild and humorous stories to fill them with imagination and . It was a world apart from the huge ‘bedroom-study’ on the first floor on the other end of the house which w作者: 想象 時間: 2025-3-28 22:31 作者: 流浪者 時間: 2025-3-28 23:25 作者: 權(quán)宜之計 時間: 2025-3-29 03:22 作者: 樹木心 時間: 2025-3-29 07:30
Junjie Gao,Xiangyu Zheng,DongDong Wang,Zhixiang Huang,Bangqi Zhengand design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations...?.978-981-10-1070-5Series ISSN 2367-3478 Series E-ISSN 2367-3486 作者: 貪婪地吃 時間: 2025-3-29 14:56
,Rechtlicher Rahmen des Zugangs zu fremden H?fen und Liegepl?tzen,ten. Einen seerechtlichen Rahmen finden die beim Hafenzugang fremder Schiffe auftretenden Fragen durch das vom SRü als so genannte ?Verfassung der Meere“ gespannte Dach, insbesondere durch die darin für die vom Hafenzugang betroffenen Meereszonen festgelegten Regelungs- und Durchsetzungsbefugnisse f