Results 21 to 30 of about 59 (59)

Modeling and optimizing the evacuation of hospitals based on the MRCPSP with resource transfers

open access: yesEURO Journal on Computational Optimization, 2016
In this paper, we consider the problem of hospital evacuation and model it as a multi-mode resource-constrained project scheduling problem (MRCPSP) with additional resource transfers and blockings.
Jens Poppenborg, Sigrid Knust
doaj   +1 more source

Postoptimal analysis of one lexicographic combinatorial problem with non-linear criteria [PDF]

open access: yesComputer Science Journal of Moldova, 2009
In this article we consider a multicriteria combinatorial problem with ordered MINMIN criteria. We obtain necessary and sufficient conditions of that type of stability to the initial data perturbations for which all lexicographic optima of the original ...
Vladimir A. Emelichev, Olga V. Karelkina
doaj  

A polyhedral approach to the generalized minimum labeling spanning tree problem

open access: yesEURO Journal on Computational Optimization, 2019
The minimum labeling spanning tree problem (MLSTP) is a combinatorial optimization problem that consists in finding a spanning tree in a simple graph G, in which each edge has one label, by using a minimum number of labels.
ThiagoGouveiada Silva   +4 more
doaj   +1 more source

The complete vertex p-center problem

open access: yesEURO Journal on Computational Optimization, 2020
The vertex p-center problem consists of locating p facilities among a set of M potential sites such that the maximum distance from any demand to its closest located facility is minimized.
F.Antonio Medrano
doaj   +1 more source

Sink location to find optimal shelters in evacuation planning

open access: yesEURO Journal on Computational Optimization, 2016
The sink location problem is a combination of network flow and location problems: from a given set of nodes in a flow network a minimum cost subset W has to be selected such that given supplies can be transported to the nodes in W.
P. Heßler, H.W. Hamacher
doaj   +1 more source

Optimal capacitated ring trees

open access: yesEURO Journal on Computational Optimization, 2016
We study a new network design model combining ring and tree structures under capacity constraints. The solution topology of this capacitated ring tree problem (CRTP) is based on ring trees which are the union of trees and 1-trees.
Alessandro Hill, Stefan Voß
doaj   +1 more source

Matching ontologies with kernel principle component analysis and evolutionary algorithm

open access: yesDemonstratio Mathematica
Ontology serves as a structured knowledge representation that models domain-specific concepts, properties, and relationships. Ontology matching (OM) aims to identify similar entities across distinct ontologies, which is essential for enabling ...
Xue Xingsi, Ye Miao, Nian Qifeng
doaj   +1 more source

The maximum flow in dynamic networks [PDF]

open access: yesComputer Science Journal of Moldova, 2005
The dynamic maximum flow problem that generalizes the static maximum flow problem is formulated and studied. We consider the problem on a network with capacities depending on time, fixed transit times on the arcs, and a given time horizon.
Maria A. Fonoberova, Dmitrii D. Lozovanu
doaj  

Intersection cuts from multiple rows: a disjunctive programming approach

open access: yesEURO Journal on Computational Optimization, 2013
We address the issue of generating cutting planes for mixed integer programs from multiple rows of the simplex tableau with the tools of disjunctive programming.
Egon Balas, Andrea Qualizza
doaj   +1 more source

Automatic boomerang attacks search on Rijndael

open access: yesJournal of Mathematical Cryptology
Boomerang attacks were introduced in 1999 by Wagner (The boomerang attack. In: Knudsen LR, editor. FSE’99. vol. 1636 of LNCS. Heidelberg: Springer; 1999. p.
Rouquette Loïc   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy