Design and analysis of approximation algorithms
From MaRDI portal
Publication:648055
Recommendations
Cited in
(50)- Greedy approximation for the minimum connected dominating set with labeling
- A short proof for stronger version of DS decomposition in set function optimization
- Approximation algorithm for partial set multicover versus full set multicover
- Exact and approximate algorithms for discounted \(\{0\text{-}1\}\) knapsack problem
- A greedy algorithm for the fault-tolerant outer-connected dominating set problem
- scientific article; zbMATH DE number 1566497 (Why is no real title available?)
- Greedy is good: constrained non-submodular function maximization via weak submodularity
- Single machine due date assignment scheduling problem with precedence constraints and controllable processing times in fuzzy environment
- The design of approximation algorithms
- Constant approximation for the lifetime scheduling problem of \(p\)-percent coverage
- A greedy algorithm for the fault-tolerant connected dominating set in a general graph
- scientific article; zbMATH DE number 4170925 (Why is no real title available?)
- Approximation algorithms in combinatorial scientific computing
- A variation of DS decomposition in set function optimization
- Algorithms for randomized time-varying knapsack problems
- On general threshold and general cascade models of social influence
- Sensor cover and double partition
- Approximation algorithms for the submodular edge cover problem with submodular penalties
- A greedy algorithm for the minimum \(2\)-connected \(m\)-fold dominating set problem
- Semitotal domination: new hardness results and a polynomial-time algorithm for graphs of bounded mim-width
- Uncertainty in Study of Social Networks: Robust Optimization and Machine Learning
- Greedy guarantees for minimum submodular cost submodular/non-submodular cover problem
- Total (restrained) domination in unit disk graphs
- Combinatorial approximation algorithms: a comparative review
- Minimum non-submodular cover problem with applications
- Approximation for the minimum cost doubly resolving set problem
- Approximation algorithm for the minimum weight connected k-subgraph cover problem
- Handling least privilege problem and role mining in RBAC
- An approximation algorithm for the group prize-collecting Steiner tree problem with submodular penalties
- Minimizing data collection latency with unmanned aerial vehicle in wireless sensor networks
- In Memoriam: Ker-I Ko (1950–2018)
- Approximation and optimization. Algorithms, complexity and applications. Based on the conference on approximation and optimization: algorithms, complexity, and applications, National and Kapodistrian University of Athens, Athens, Greece, June 29--30, 2017
- Design, implementation, and analysis of maximum transversal algorithms
- Approximation algorithm for (connected) Italian dominating function
- Trajectory optimization of laser-charged UAV to minimize the average age of information for wireless rechargeable sensor network
- Polynomial approximation
- A Branch-and-Cut Algorithm for Submodular Interdiction Games
- New approximations for maximum lifetime coverage
- Time sensitive sweep coverage with minimum UAVs
- Nearly tight approximation algorithm for (connected) Roman dominating set
- A PTAS for minimum weighted connected vertex cover \(P_3\) problem in 3-dimensional wireless sensor networks
- A novel approach for detecting multiple rumor sources in networks with partial observations
- On positive influence dominating sets in social networks
- Maximum lifetime connected coverage with two active-phase sensors
- Greedy guarantees for non-submodular function maximization under independent system constraint with applications
- Analyzing the 3-path vertex cover problem in planar bipartite graphs
- Independent sets in Line of Sight networks
- Autour de nouvelles notions pour l'analyse des algorithmes d'approximation : formalisme unifié et classes d'approximation
- Algorithms and complexity for a class of combinatorial optimization problems with labelling
- On positive-influence target-domination
This page was built for publication: Design and analysis of approximation algorithms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q648055)