Search
Search Results
-
Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency
Polynomial commitments schemes are a powerful tool that enables one party to commit to a polynomial p of degree d , and prove that the committed...
-
The Price of Active Security in Cryptographic Protocols
We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...
-
Free disposal hull models of multicomponent technologies
Free disposal hull (FDH) is a nonparametric model of production technology based on the single assumption of free disposability of all inputs and...
-
Solutions of the functional difference Toda equation from centered Darboux transformation
By using a particular Darboux transformation which we can call centered Darboux transformation, we construct solutions of the functional difference...
-
-
A multi-objective optimization approach for resource allocation and transportation planning in institutional quarantine centres
The COVID-19 pandemic has profoundly impacted global logistics and supply chains, resulting in widespread disruptions due to outbreaks, labour...
-
On Directed and Undirected Diameters of Vertex-Transitive Graphs
A directed diameter of a directed graph is the maximum possible distance between a pair of vertices, where paths must respect edge orientations,...
-
GreenPLM: the concept of sharing community knowledge for new green product development and process planning
The issue of eco-friendliness and sustainable development is crucial in various domains of our lives. This also affects the production of products...
-
-
Tubes containing string modules in symmetric special multiserial algebras
Symmetric special multiserial algebras are algebras that correspond to decorated hypergraphs with orientation, called Brauer configurations. In this...
-
On circuit diameter bounds via circuit imbalances
We study the circuit diameter of polyhedra, introduced by Borgwardt, Finhold, and Hemmecke (SIAM J. Discrete Math. 29 (1), 113–121 (2015)) as a...
-
The Prym Variety of a Dilated Double Cover of Metric Graphs
We calculate the volume of the tropical Prym variety of a harmonic double cover of metric graphs having non-trivial dilation. We show that the...
-
Smoothed semicovariance estimation for portfolio selection
Downside risk measures, such as semivariance, are essential for evaluating investment risk. Focusing on semivariance allows investors to emphasize...
-
Monoidal strengthening and unique lifting in MIQCPs
Using the recently proposed maximal quadratic-free sets and the well-known monoidal strengthening procedure, we show how to improve intersection cuts...
-
Deep learning for derivatives pricing: a comparative study of asymptotic and quasi-process corrections
In this study, we compare two methods for using neural networks to efficiently learn the price of derivatives. The first method, proposed by...
-
Prediction of bank credit worthiness through credit risk analysis: an explainable machine learning study
The control of credit risk is an important topic in the development of supply chain finance. Financial service providers should distinguish between...
-
A Bump Statistic on Permutations Resulting from the Robinson–Schensted Correspondence
In this paper, we investigate a permutation statistic that was independently introduced by Romik (Funct Anal Appl 39(2):52–155, 2005). This statistic...