We propose a linear programming relaxation scheme for the class of multiple object tracking problems where the inter-object interaction metric is convex and the intraobject term q...
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Abstract. We study in this lecture the literature on mixed integer programming models and formulations for a specific problem class, namely deterministic production planning probl...
Correlated or discriminative pattern mining is concerned with finding the highest scoring patterns w.r.t. a correlation measure (such as information gain). By reinterpreting corre...
—1 In this paper, we consider an amplify-and-forward (AF) wireless relay system where multiple source nodes communicate with their corresponding destination nodes with the help o...
Khoa T. Phan, Tho Le-Ngoc, Sergiy A. Vorobyov, Chi...