Results 31 to 40 of about 5,156,194 (369)

Acknowledgement to Reviewers of Algorithms in 2016

open access: yesAlgorithms, 2017
The editors of Algorithms would like to express their sincere gratitude to the following reviewers for assessing manuscripts in 2016.[...]
Algorithms Editorial Office
doaj   +1 more source

Arc-Search Infeasible Interior-Point Algorithm for Linear Programming [PDF]

open access: yesNumerical Algorithms (2017) 74:(4) 967-996, 2014
Mehrotra's algorithm has been the most successful infeasible interior-point algorithm for linear programming since 1990. Most popular interior-point software packages for linear programming are based on Mehrotra's algorithm. This paper proposes an alternative algorithm, arc-search infeasible interior-point algorithm.
arxiv   +1 more source

Acknowledgement to Reviewers of Algorithms in 2017

open access: yesAlgorithms, 2018
Peer review is an essential part in the publication process, ensuring that Algorithms maintains high quality standards for its published papers.[...]
Algorithms Editorial Office
doaj   +1 more source

Development of an early alert model for pandemic situations in Germany

open access: yesScientific Reports, 2023
The COVID-19 pandemic has pointed out the need for new technical approaches to increase the preparedness of healthcare systems. One important measure is to develop innovative early warning systems.
Danqi Wang   +9 more
doaj   +1 more source

A Note on the Performance of Algorithms for Solving Linear Diophantine Equations in the Naturals [PDF]

open access: yesarXiv, 2021
We implement four algorithms for solving linear Diophantine equations in the naturals: a lexicographic enumeration algorithm, a completion procedure, a graph-based algorithm, and the Slopes algorithm. As already known, the lexicographic enumeration algorithm and the completion procedure are slower than the other two algorithms.
arxiv  

Critic Algorithms using Cooperative Networks [PDF]

open access: yesarXiv, 2022
An algorithm is proposed for policy evaluation in Markov Decision Processes which gives good empirical results with respect to convergence rates. The algorithm tracks the Projected Bellman Error and is implemented as a true gradient based algorithm. In this respect this algorithm differs from TD($\lambda$) class of algorithms. This algorithm tracks the
arxiv  

On Cheating Immune Secret Sharing [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong ...
Josef Pieprzyk, Xian-Mo Zhang
doaj   +1 more source

Quantum Algorithms Revisited [PDF]

open access: yes, 1997
Quantum computers use the quantum interference of different computational paths to enhance correct outcomes and suppress erroneous outcomes of computations.
Cleve, Richard   +3 more
core   +5 more sources

Characterisations of Ideal Threshold Schemes [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
We characterise ideal threshold schemes from different approaches. Since the characteristic properties are independent to particular descriptions of threshold schemes all ideal threshold schemes can be examined by new points of view and new results on ...
Josef Pieprzyk, Xian-Mo Zhang
doaj   +1 more source

Heating the Solar Atmosphere by the Self-Enhanced Thermal Waves Caused by the Dynamo Processes

open access: yes, 2012
We discuss a possible mechanism for heating the solar atmosphere by the ensemble of thermal waves, generated by the photospheric dynamo and propagating upwards with increasing magnitudes.
Aschwanden   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy