We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Sublinear Algorithms in T-Interval Dynamic Networks

    We consider standard T - interval dynamic networks , under the synchronous timing model and the broadcast CONGEST model. In a T - interval dynamic network ,...

    Irvan Jahja, Haifeng Yu in Algorithmica
    Article 12 July 2024
  2. Rogers–Ramanujan type identities involving double, triple and quadruple sums

    We prove a number of new Rogers–Ramanujan type identities involving double, triple and quadruple sums. They were discovered after an extensive search...

    Zhi Li, Liuquan Wang in The Ramanujan Journal
    Article 12 July 2024
  3. Positivity and convexity in incomplete cooperative games

    Incomplete cooperative games generalize the classical model of cooperative games by omitting the values of some of the coalitions. This allows for...

    Martin Černý, Jan Bok, ... Milan Hladík in Annals of Operations Research
    Article Open access 12 July 2024
  4. Simulation-based system reliability estimation of a multi-state flow network for all possible demand levels

    The multi-state flow network (MSFN) serves as a fundamental framework for real-life network-structured systems and various applications. The system...

    **-Chen Chang, Ding-Hsiang Huang, Cheng-Fu Huang in Annals of Operations Research
    Article 12 July 2024
  5. Requirement-driven supplier selection: a multi-criteria QFD-based approach under epistemic and stochastic uncertainties

    Supplier selection (SS) has emerged as a critical challenge for companies aiming to enhance the operational management of their supply chains, a task...

    Jian-Peng Chang, Heng-**n Ren, ... Zhen-Song Chen in Annals of Operations Research
    Article 12 July 2024
  6. Queueing-inventory: analytical and simulation modeling and classical and retrial queues and inventory

    This is the PREFACE to the Special Issue “Queueing-inventory: analytical and simulation modeling and classical and retrial queues and inventory”. The...

    Achyutha Krishnamoorthy, Srinivas R. Chakravarthy, ... Viswanath C. Narayanan in Annals of Operations Research
    Article 11 July 2024
  7. Reconstruction in One Dimension from Unlabeled Euclidean Lengths

    Robert Connelly, Steven J. Gortler, Louis Theran in Combinatorica
    Article Open access 11 July 2024
  8. On the Connected Blocks Polytope

    In this paper, we study the connected blocks polytope, which, apart from its own merits, can be seen as the generalization of certain connectivity...

    Justus Bruckamp, Markus Chimani, Martina Juhnke in Discrete & Computational Geometry
    Article Open access 11 July 2024
  9. Exploring servitization in the supply chain: a review of current research via bibliometric analysis and future study prospects

    Servitization, an emerging strategy that combines product and service offerings, is gaining traction among manufacturing firms seeking a competitive...

    Samidha Thakur, Sarat Kumar Jena in Annals of Operations Research
    Article 11 July 2024
  10. On Pisier Type Theorems

    Jaroslav Nešetřil, Vojtěch Rödl, Marcelo Sales in Combinatorica
    Article Open access 11 July 2024
  11. Unavoidable Flats in Matroids Representable over Prime Fields

    Jim Geelen, Matthew E. Kroeker in Combinatorica
    Article 11 July 2024
  12. Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency

    Polynomial commitments schemes are a powerful tool that enables one party to commit to a polynomial p of degree d , and prove that the committed...

    Giacomo Fenzi, Hossein Moghaddas, Ngoc Khanh Nguyen in Journal of Cryptology
    Article Open access 10 July 2024
  13. Structural iterative rounding for generalized k-median problems

    This paper considers approximation algorithms for generalized k -median problems. These problems can be informally described as k -median with a...

    Anupam Gupta, Benjamin Moseley, Rudy Zhou in Mathematical Programming
    Article Open access 10 July 2024
  14. The Price of Active Security in Cryptographic Protocols

    We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...

    Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss in Journal of Cryptology
    Article Open access 10 July 2024
  15. Covering Array on the Cartesian Product of Hypergraphs

    Covering array (CA) on a hypergraph H is a combinatorial object used in interaction testing of a complex system modeled as H . Given a t -uniform...

    Yasmeen Akhtar, Soumen Maity in Graphs and Combinatorics
    Article 10 July 2024
  16. Free disposal hull models of multicomponent technologies

    Free disposal hull (FDH) is a nonparametric model of production technology based on the single assumption of free disposability of all inputs and...

    Grammatoula Papaioannou, Victor V. Podinovski in Annals of Operations Research
    Article Open access 09 July 2024
  17. Solutions of the functional difference Toda equation from centered Darboux transformation

    By using a particular Darboux transformation which we can call centered Darboux transformation, we construct solutions of the functional difference...

    Pierre Gaillard in Aequationes mathematicae
    Article 09 July 2024
Did you find what you were looking for? Share feedback.