Results 51 to 60 of about 13,098 (239)

Submodular Optimization with Contention Resolution Extensions [PDF]

open access: yes, 2019
This paper considers optimizing a submodular function subject to a set of downward closed constraints. Previous literature on this problem has often constructed solutions by (1) discovering a fractional solution to the multi-linear extension and (2 ...
Moseley, Benjamin, Sviridenko, Maxim
core   +1 more source

Symmetric Submodular Function Minimization Under Hereditary Family Constraints

open access: yes, 2010
We present an efficient algorithm to find non-empty minimizers of a symmetric submodular function over any family of sets closed under inclusion. This for example includes families defined by a cardinality constraint, a knapsack constraint, a matroid ...
Goemans, Michel X., Soto, José A.
core   +2 more sources

Near-Optimal Convergent Approach for Composed Influence Maximization Problem in Social Networks

open access: yesIEEE Access, 2019
Crowd psychology is a critical factor when considering information diffusion, which has been modeled as composed influence. The composed influence is represented as a hyperedge in a graph model.
Jianming Zhu   +3 more
doaj   +1 more source

Reconsidering Volume‐Based Drug Procurement Policy: The Consequences of Manufacturers' Optimal Production Planning and Breach Strategies

open access: yesNaval Research Logistics (NRL), EarlyView.
ABSTRACT This paper examines the impacts of Volume‐Based Procurement (VBP) policies on pharmaceutical supply chains, with a focus on the strategic behaviors of manufacturers. VBP aims to reduce costs and stabilize supplies by centralizing procurement through competition based on volumes and prices.
Nani Zhou, Tong Wang, Guohua Wan
wiley   +1 more source

Parallel Submodular Function Minimization

open access: yes, 2023
We consider the parallel complexity of submodular function minimization (SFM). We provide a pair of methods which obtain two new query versus depth trade-offs a submodular function defined on subsets of $n$ elements that has integer values between $-M$ and $M$.
Chakrabarty, Deeparnab   +3 more
openaire   +2 more sources

The Weak Core, Partition‐Based Universal Stability, and Their Risk Associations Through A Partial Order

open access: yesNaval Research Logistics (NRL), EarlyView.
ABSTRACT We are concerned with the stability of a transferable‐utility cooperative (TU) game. First, the concept of core can be weakened so that the blocking of changes is limited to only those with multilateral backings. This principle of consensual blocking, as well as the traditional core‐defining one of unilateral blocking and one straddling in ...
Jian Yang
wiley   +1 more source

Resource redeployment as an entry advantage in resource‐poor settings

open access: yesStrategic Management Journal, EarlyView.
Abstract Research Summary Scarcity of productive factors poses a challenge for firms entering underdeveloped regions. We theorize that incumbent firms can overcome scarcity of skilled human capital in local labor markets by redeploying workers from existing units.
Jasmina Chauvin   +2 more
wiley   +1 more source

A Universal Meta‐Heuristic Framework for Influence Maximisation in Hypergraphs

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Influence maximisation (IM) aims to select a small number of nodes that are able to maximise their influence in a network and covers a wide range of applications. Despite numerous attempts to provide effective solutions in simple networks, higher‐order interactions between entities in various real‐world systems are usually not taken into ...
Ming Xie   +5 more
wiley   +1 more source

Deterministic Algorithms for Submodular Maximization Problems

open access: yes, 2015
Randomization is a fundamental tool used in many theoretical and practical areas of computer science. We study here the role of randomization in the area of submodular function maximization.
Buchbinder, Niv, Feldman, Moran
core   +1 more source

Dynamic Resource Allocation Optimisation and Security‐Resilient Control for Bandwidth‐Limited Network Control Systems With Data Conflicts

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy