Sciweavers

1195 search results - page 114 / 239
» An Inventory-Location Model: Formulation, Solution Algorithm...
Sort
View
DASFAA
2007
IEEE
163views Database» more  DASFAA 2007»
14 years 3 months ago
Protecting Individual Information Against Inference Attacks in Data Publishing
In many data-publishing applications, the data owner needs to protect sensitive information pertaining to individuals. Meanwhile, certain information is required to be published. T...
Chen Li, Houtan Shirani-Mehr, Xiaochun Yang
ECCV
2010
Springer
13 years 10 months ago
Fast Optimization for Mixture Prior Models
Abstract. We consider the minimization of a smooth convex function regularized by the mixture of prior models. This problem is generally difficult to solve even each simpler regula...
Junzhou Huang, Shaoting Zhang, Dimitris N. Metaxas
GECCO
2006
Springer
137views Optimization» more  GECCO 2006»
14 years 19 days ago
Inside a predator-prey model for multi-objective optimization: a second study
In this article, new variation operators for evolutionary multiobjective algorithms (EMOA) are proposed. On the basis of a predator-prey model theoretical considerations as well a...
Christian Grimme, Karlheinz Schmitt
NETWORKS
2008
13 years 9 months ago
Reformulation and sampling to solve a stochastic network interdiction problem
The Network Interdiction Problem involves interrupting an adversary's ability to maximize flow through a capacitated network by destroying portions of the network. A budget c...
Udom Janjarassuk, Jeff Linderoth
CMA
2010
196views more  CMA 2010»
13 years 6 months ago
Numerical analysis of Leray-Tikhonov deconvolution models of fluid motion
This report develops and studies a new family of NSE-regularizations, Tikhonov Leray Regularization with Time Relaxation Models. This new family of turbulence models is based on a...
Iuliana Stanculescu, Carolina C. Manica