Sciweavers

2560 search results - page 70 / 512
» Contributions to zero-sum problems
Sort
View
ENTCS
2007
121views more  ENTCS 2007»
13 years 9 months ago
Incremental Parametric Development of Greedy Algorithms
The event B method provides a general framework for modelling both data structures and algorithms. B models are validated by discharging proof obligations ensuring safety properti...
Dominique Cansell, Dominique Méry
AES
2005
Springer
105views Cryptology» more  AES 2005»
13 years 9 months ago
TH-collocation for the biharmonic equation
This paper is intended as a contribution to enhance orthogonal collocation methods. In this, a novel collocation method--TH-collocation--is applied to the biharmonic equation and ...
Martín Díaz, Ismael Herrera
CN
2004
102views more  CN 2004»
13 years 9 months ago
Comparing economic incentives in peer-to-peer networks
Users who join a peer-to-peer network have, in general, suboptimal incentives to contribute to the network, because of the externalities that exist between them. The result is an ...
Panayotis Antoniadis, Costas Courcoubetis, Robin M...
APPROX
2009
Springer
131views Algorithms» more  APPROX 2009»
14 years 3 months ago
An Approximation Scheme for Terrain Guarding
We obtain a polynomial time approximation scheme for the terrain guarding problem improving upon several recent constant factor approximations. Our algorithm is a local search algo...
Matt Gibson, Gaurav Kanade, Erik Krohn, Kasturi R....
RE
2007
Springer
14 years 3 months ago
On Non-Functional Requirements
Although the term ‘non-functional requirement’ has been in use for more than 20 years, there is still no consensus in the requirements engineering community what non-functiona...
Martin Glinz