Results 31 to 40 of about 9,890,926 (378)
One of the central questions in free speech jurisprudence is what activities the First Amendment encompasses. This Article considers that question in the context of an area of increasing importance – algorithm-based decisions.
Bolin, Malin, Nordin, Maria
core +2 more sources
Constrained ear decompositions in graphs and digraphs [PDF]
Ear decompositions of graphs are a standard concept related to several major problems in graph theory like the Traveling Salesman Problem. For example, the Hamiltonian Cycle Problem, which is notoriously N P-complete, is equivalent to deciding whether a ...
Frédéric Havet, Nicolas Nisse
doaj +1 more source
Acknowledgement to Reviewers of Algorithms in 2016
The editors of Algorithms would like to express their sincere gratitude to the following reviewers for assessing manuscripts in 2016.[...]
Algorithms Editorial Office
doaj +1 more source
Algorithms for geodesics [PDF]
Algorithms for the computation of geodesics on an ellipsoid of revolution are given. These provide accurate, robust, and fast solutions to the direct and inverse geodesic problems and they allow differential and integral properties of geodesics to be ...
BR Bowring+6 more
core +2 more sources
Quantum Algorithms Revisited [PDF]
Quantum computers use the quantum interference of different computational paths to enhance correct outcomes and suppress erroneous outcomes of computations.
Cleve, Richard+3 more
core +5 more sources
Sampling-based algorithms for optimal motion planning [PDF]
During the last decade, sampling-based path planning algorithms, such as probabilistic roadmaps (PRM) and rapidly exploring random trees (RRT), have been shown to work well in practice and possess theoretical guarantees such as probabilistic completeness.
S. Karaman, Emilio Frazzoli
semanticscholar +1 more source
Acknowledgement to Reviewers of Algorithms in 2017
Peer review is an essential part in the publication process, ensuring that Algorithms maintains high quality standards for its published papers.[...]
Algorithms Editorial Office
doaj +1 more source
Consider the differential inclusion \((*)\) \(x'(t)\in F(t,x(t))\), where \(F\) is a given multifunction with values in finite dimensional space. A set \(K\) is called a viability set for \((*)\) if for every \(x_ 0\in K\) there exists a solution of \((*)\) starting from \(x_ 0\) which remains in \(K\).
COLOMBO, GIOVANNI, V. Krivan
openaire +2 more sources
On Cheating Immune Secret Sharing [PDF]
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong ...
Josef Pieprzyk, Xian-Mo Zhang
doaj +1 more source
12 ...
David Eppstein, Jean-Claude Falmagne
openaire +3 more sources