Results 31 to 40 of about 5,156,194 (369)
Acknowledgement to Reviewers of Algorithms in 2016
The editors of Algorithms would like to express their sincere gratitude to the following reviewers for assessing manuscripts in 2016.[...]
Algorithms Editorial Office
doaj +1 more source
Arc-Search Infeasible Interior-Point Algorithm for Linear Programming [PDF]
Mehrotra's algorithm has been the most successful infeasible interior-point algorithm for linear programming since 1990. Most popular interior-point software packages for linear programming are based on Mehrotra's algorithm. This paper proposes an alternative algorithm, arc-search infeasible interior-point algorithm.
arxiv +1 more source
Acknowledgement to Reviewers of Algorithms in 2017
Peer review is an essential part in the publication process, ensuring that Algorithms maintains high quality standards for its published papers.[...]
Algorithms Editorial Office
doaj +1 more source
Development of an early alert model for pandemic situations in Germany
The COVID-19 pandemic has pointed out the need for new technical approaches to increase the preparedness of healthcare systems. One important measure is to develop innovative early warning systems.
Danqi Wang+9 more
doaj +1 more source
A Note on the Performance of Algorithms for Solving Linear Diophantine Equations in the Naturals [PDF]
We implement four algorithms for solving linear Diophantine equations in the naturals: a lexicographic enumeration algorithm, a completion procedure, a graph-based algorithm, and the Slopes algorithm. As already known, the lexicographic enumeration algorithm and the completion procedure are slower than the other two algorithms.
arxiv
Critic Algorithms using Cooperative Networks [PDF]
An algorithm is proposed for policy evaluation in Markov Decision Processes which gives good empirical results with respect to convergence rates. The algorithm tracks the Projected Bellman Error and is implemented as a true gradient based algorithm. In this respect this algorithm differs from TD($\lambda$) class of algorithms. This algorithm tracks the
arxiv
On Cheating Immune Secret Sharing [PDF]
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong ...
Josef Pieprzyk, Xian-Mo Zhang
doaj +1 more source
Quantum Algorithms Revisited [PDF]
Quantum computers use the quantum interference of different computational paths to enhance correct outcomes and suppress erroneous outcomes of computations.
Cleve, Richard+3 more
core +5 more sources
Characterisations of Ideal Threshold Schemes [PDF]
We characterise ideal threshold schemes from different approaches. Since the characteristic properties are independent to particular descriptions of threshold schemes all ideal threshold schemes can be examined by new points of view and new results on ...
Josef Pieprzyk, Xian-Mo Zhang
doaj +1 more source
Heating the Solar Atmosphere by the Self-Enhanced Thermal Waves Caused by the Dynamo Processes
We discuss a possible mechanism for heating the solar atmosphere by the ensemble of thermal waves, generated by the photospheric dynamo and propagating upwards with increasing magnitudes.
Aschwanden+3 more
core +1 more source