[图书][B] Combinatorial optimization

BH Korte, J Vygen, B Korte, J Vygen - 2011 - Springer
Let us start with two examples. A company has a machine which drills holes into printed
circuit boards. Since it produces many of these boards it wants the machine to complete one …

[图书][B] Handbook of approximation algorithms and metaheuristics

TF Gonzalez - 2007 - taylorfrancis.com
Delineating the tremendous growth in this area, the Handbook of Approximation Algorithms
and Metaheuristics covers fundamental, theoretical topics as well as advanced, practical …

Mobile ad hoc networking: an essential technology for pervasive computing

JZ Sun - 2001 International Conferences on Info-Tech and Info …, 2001 - ieeexplore.ieee.org
In the near future, a pervasive computing environment can be expected based on the recent
progress and advances in computing and communication technologies. The next generation …

Delay-sensitive multi-source multicast resource optimization in NFV-enabled networks: A column generation approach

A Muhammad, I Sorkhoh, L Qu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Telecommunication networks are currently realizing more-huge-than-ever data demands
from subscribers all over the world. Due to the ongoing pandemic, nearly all businesses …

[HTML][HTML] The edge-disjoint paths problem is NP-complete for series–parallel graphs

T Nishizeki, J Vygen, X Zhou - Discrete Applied Mathematics, 2001 - Elsevier
Many combinatorial problems are NP-complete for general graphs. However, when
restricted to series–parallel graphs or partial k-trees, many of these problems can be solved …

Parameterized tractability of edge-disjoint paths on directed acyclic graphs

A Slivkins - SIAM Journal on Discrete Mathematics, 2010 - SIAM
Given a graph and terminal pairs (s_i,t_i), i∈k, the edge-disjoint paths problem is to
determine whether there exist s_it_i paths, i∈k, that do not share any edges. We consider …

Overlay protection against link failures using network coding

AE Kamal, A Ramamoorthy, L Long… - IEEE/ACM transactions …, 2010 - ieeexplore.ieee.org
This paper introduces a network coding-based protection scheme against single-and
multiple-link failures. The proposed strategy ensures that in a connection, each node …

AGORA: assembly guided by optical restriction alignment

HC Lin, S Goldstein, L Mendelowitz, S Zhou, J Wetzel… - BMC …, 2012 - Springer
Background Genome assembly is difficult due to repeated sequences within the genome,
which create ambiguities and cause the final assembly to be broken up into many separate …

Robustly disjoint paths with segment routing

F Aubry, S Vissicchio, O Bonaventure… - Proceedings of the 14th …, 2018 - dl.acm.org
Motivated by conversations with operators and by possibilities to unlock future Internet-
based applications, we study how to enable Internet Service Providers (ISPs) to reliably offer …

[HTML][HTML] Irrelevant vertices for the planar disjoint paths problem

I Adler, SG Kolliopoulos, PK Krause… - Journal of Combinatorial …, 2017 - Elsevier
Abstract The Disjoint Paths Problem asks, given a graph G and a set of pairs of terminals (s
1, t 1),…,(sk, tk), whether there is a collection of k pairwise vertex-disjoint paths linking si and …