Sciweavers

14084 search results - page 2783 / 2817
» A Theory for Game Theories
Sort
View
HEURISTICS
2010
13 years 6 months ago
A shift sequence based approach for nurse scheduling and a new benchmark dataset
This paper investigates an adaptive constructive method for solving nurse rostering problems. The constraints considered in the problems are categorised into three classes: those t...
Peter Brucker, Edmund K. Burke, Timothy Curtois, R...
IJBIS
2010
82views more  IJBIS 2010»
13 years 6 months ago
Simulation discounted cash flow valuation for internet companies
Discounted cash flow (DCF) is the most accepted approach for company valuation. It is well grounded in theory and practice. However, the DCF approach, which is commonly used for t...
Maged Ali, Ramzi El-Haddadeh, Tillal Eldabi, Ebrah...
CN
2010
121views more  CN 2010»
13 years 5 months ago
Probabilistic flooding for efficient information dissemination in random graph topologies
Probabilistic flooding has been frequently considered as a suitable dissemination information approach for limiting the large message overhead associated with traditional (full) f...
Konstantinos Oikonomou, Dimitrios Kogias, Ioannis ...
AML
2011
204views Mathematics» more  AML 2011»
13 years 4 months ago
A note on propositional proof complexity of some Ramsey-type statements
Any valid Ramsey statement n −→ (k)2 2 can be encoded into a DNF formula RAM(n, k) of size O(nk) and with terms of size k 2 . Let rk be the minimal n for which the statement h...
Jan Krajícek
AOSD
2011
ACM
13 years 4 months ago
Closure joinpoints: block joinpoints without surprises
Block joinpoints allow programmers to explicitly mark regions of base code as “to be advised”, thus avoiding the need to extract the block into a method just for the sake of c...
Eric Bodden
« Prev « First page 2783 / 2817 Last » Next »