Sciweavers

957 search results - page 16 / 192
» Addition Chain Heuristics
Sort
View
CORR
2007
Springer
144views Education» more  CORR 2007»
13 years 9 months ago
Heuristics for Network Coding in Wireless Networks
Multicast is a central challenge for emerging multi-hop wireless architectures such as wireless mesh networks, because of its substantial cost in terms of bandwidth. In this artic...
Song Yean Cho, Cedric Adjih, Philippe Jacquet
IJCAI
2003
13 years 11 months ago
Maximizing Flexibility: A Retraction Heuristic for Oversubscribed Scheduling Problems
In this paper we consider the solution of scheduling problems that are inherently over-subscribed. In such problems, there are always more tasks to execute within a given time fra...
Laurence A. Kramer, Stephen F. Smith
ECCC
2011
190views ECommerce» more  ECCC 2011»
13 years 1 months ago
Optimal heuristic algorithms for the image of an injective function
The existence of optimal algorithms is not known for any decision problem in NP \ P. We consider the problem of testing the membership in the image of an injective function. We co...
Edward A. Hirsch, Dmitry Itsykson, Valeria Nikolae...
EUROGP
2007
Springer
129views Optimization» more  EUROGP 2007»
14 years 4 months ago
Genetic Programming Heuristics for Multiple Machine Scheduling
In this paper we present a method for creating scheduling heuristics for parallel proportional machine scheduling environment and arbitrary performance criteria. Genetic programmin...
Domagoj Jakobovic, Leonardo Jelenkovic, Leo Budin
BWCCA
2010
13 years 5 months ago
Comments on a One-Way Hash Chain Based Authentication for FMIPv6
In this paper, we analyze a one-way hash chain based authentication scheme proposed by Haddad and Krishnan. The authentication scheme has been introduced for improving handover per...
Ilsun You, Jong-Hyouk Lee