[图书][B] Handbook of approximation algorithms and metaheuristics
TF Gonzalez - 2007 - taylorfrancis.com
Delineating the tremendous growth in this area, the Handbook of Approximation Algorithms
and Metaheuristics covers fundamental, theoretical topics as well as advanced, practical …
and Metaheuristics covers fundamental, theoretical topics as well as advanced, practical …
Merlin: A language for provisioning network resources
This paper presents Merlin, a new framework for managing resources in software-defined
networks. With Merlin, administrators express high-level policies using programs in a …
networks. With Merlin, administrators express high-level policies using programs in a …
[图书][B] Iterative methods in combinatorial optimization
With the advent of approximation algorithms for NP-hard combinatorial optimization
problems, several techniques from exact optimization such as the primal-dual method have …
problems, several techniques from exact optimization such as the primal-dual method have …
Stateful serverless application placement in MEC with function and state dependencies
Serverless computing is emerging as an enabling technology for elastic and low-cost AI
applications in the edge of core networks. It allows AI developers to decompose a complex …
applications in the edge of core networks. It allows AI developers to decompose a complex …
Cost-efficient NFV-enabled mobile edge-cloud for low latency mobile applications
Mobile edge-cloud (MEC) aims to support low latency mobile services by bringing remote
cloud services nearer to mobile users. However, in order to deal with dynamic workloads …
cloud services nearer to mobile users. However, in order to deal with dynamic workloads …
Multicommodity demand flow in a tree and packing integer programs
C Chekuri, M Mydlarz, FB Shepherd - ACM Transactions on Algorithms …, 2007 - dl.acm.org
We consider requests for capacity in a given tree network T=(V, E) where each edge e of the
tree has some integer capacity u e. Each request f is a node pair with an integer demand df …
tree has some integer capacity u e. Each request f is a node pair with an integer demand df …
QoS-aware VNF placement and service chaining for IoT applications in multi-tier mobile edge networks
Mobile edge computing and network function virtualization (NFV) paradigms enable new
flexibility and possibilities of the deployment of extreme low-latency services for Internet-of …
flexibility and possibilities of the deployment of extreme low-latency services for Internet-of …
Computing Nash equilibria for scheduling on restricted parallel links
M Gairing, T Lücking, M Mavronicolas… - Proceedings of the thirty …, 2004 - dl.acm.org
We consider the problem of routing n users on m parallel links, under the restriction that
each user may only be routed on a link from a certain set of allowed links for the user. Thus …
each user may only be routed on a link from a certain set of allowed links for the user. Thus …
Managing the network with merlin
This paper presents the Merlin network management framework. With Merlin, administrators
express network policy using programs in a declarative language based on logical …
express network policy using programs in a declarative language based on logical …
Approximating disjoint-path problems using packing integer programs
SG Kolliopoulos, C Stein - Mathematical Programming, 2004 - Springer
In a packing integer program, we are given a matrix A and column vectors b,c with
nonnegative entries. We seek a vector x of nonnegative integers, which maximizes c^Tx …
nonnegative entries. We seek a vector x of nonnegative integers, which maximizes c^Tx …