Results 31 to 40 of about 9,890,926 (378)

Algorithms and Speech [PDF]

open access: yes, 2013
One of the central questions in free speech jurisprudence is what activities the First Amendment encompasses. This Article considers that question in the context of an area of increasing importance – algorithm-based decisions.
Bolin, Malin, Nordin, Maria
core   +2 more sources

Constrained ear decompositions in graphs and digraphs [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2019
Ear decompositions of graphs are a standard concept related to several major problems in graph theory like the Traveling Salesman Problem. For example, the Hamiltonian Cycle Problem, which is notoriously N P-complete, is equivalent to deciding whether a ...
Frédéric Havet, Nicolas Nisse
doaj   +1 more source

Acknowledgement to Reviewers of Algorithms in 2016

open access: yesAlgorithms, 2017
The editors of Algorithms would like to express their sincere gratitude to the following reviewers for assessing manuscripts in 2016.[...]
Algorithms Editorial Office
doaj   +1 more source

Algorithms for geodesics [PDF]

open access: yes, 2012
Algorithms for the computation of geodesics on an ellipsoid of revolution are given. These provide accurate, robust, and fast solutions to the direct and inverse geodesic problems and they allow differential and integral properties of geodesics to be ...
BR Bowring   +6 more
core   +2 more sources

Quantum Algorithms Revisited [PDF]

open access: yes, 1997
Quantum computers use the quantum interference of different computational paths to enhance correct outcomes and suppress erroneous outcomes of computations.
Cleve, Richard   +3 more
core   +5 more sources

Sampling-based algorithms for optimal motion planning [PDF]

open access: yesInt. J. Robotics Res., 2011
During the last decade, sampling-based path planning algorithms, such as probabilistic roadmaps (PRM) and rapidly exploring random trees (RRT), have been shown to work well in practice and possess theoretical guarantees such as probabilistic completeness.
S. Karaman, Emilio Frazzoli
semanticscholar   +1 more source

Acknowledgement to Reviewers of Algorithms in 2017

open access: yesAlgorithms, 2018
Peer review is an essential part in the publication process, ensuring that Algorithms maintains high quality standards for its published papers.[...]
Algorithms Editorial Office
doaj   +1 more source

A Viability Algorithm

open access: yesJournal of Differential Equations, 1993
Consider the differential inclusion \((*)\) \(x'(t)\in F(t,x(t))\), where \(F\) is a given multifunction with values in finite dimensional space. A set \(K\) is called a viability set for \((*)\) if for every \(x_ 0\in K\) there exists a solution of \((*)\) starting from \(x_ 0\) which remains in \(K\).
COLOMBO, GIOVANNI, V. Krivan
openaire   +2 more sources

On Cheating Immune Secret Sharing [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong ...
Josef Pieprzyk, Xian-Mo Zhang
doaj   +1 more source

Algorithms for media

open access: yesDiscrete Applied Mathematics, 2008
12 ...
David Eppstein, Jean-Claude Falmagne
openaire   +3 more sources

Home - About - Disclaimer - Privacy