—Problems formulated in terms of logarithmic or exponential equations often use the Lambert W function in their solutions. Expansions, approximations and bounds on W have been de...
—WiFi multicast to very large groups has gained attention as a solution for multimedia delivery in crowded areas. Yet, most recently proposed schemes do not provide performance g...
Varun Gupta, Craig Gutterman, Yigal Bejerano, Gil ...
Sight distance along the highway plays a significant role in road safety and in particular, has a clear impact on the choice of speed limits. Visibility distance is thus of import...
Pierre Charbonnier, Jean-Philippe Tarel, Fran&cced...
Being a volunteer-run, distributed anonymity network, Tor is vulnerable to Sybil attacks. Little is known about real-world Sybils in the Tor network, and we lack practical tools a...
Philipp Winter, Roya Ensafi, Karsten Loesing, Nick...
This report provides an (updated) overview of Grafalgo, an opensource library of graph algorithms and the data structures used to implement them. The programs in this library were...
This paper explores the classic single-item newsvendor problem under a novel setting which combines temporal dependence and tractable robust optimization. First, the demand is mod...
Emilio Carrizosa, Alba V. Olivares-Nadal, Pepa Ram...
Constrained sampling and counting are two fundamental problems arising in domains ranging from artificial intelligence and security, to hardware and software testing. Recent appro...
Alexander Ivrii, Sharad Malik, Kuldeep S. Meel, Mo...
A wide range of problems can be modelled as constraint satisfaction problems (CSPs), that is, a set of constraints that must be satisfied simultaneously. Constraints can either b...
Abstract We present an original approach to compute efficient mid-term fleet configurations, at the request of a Queensland-based long-haul trucking carrier. Our approach conside...