Knapsack problem

Results: 111



#Item
11CS364B: Frontiers in Mechanism Design Lecture #8: MIR and MIDR Mechanisms∗ Tim Roughgarden† January 29,

CS364B: Frontiers in Mechanism Design Lecture #8: MIR and MIDR Mechanisms∗ Tim Roughgarden† January 29,

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2014-02-19 21:14:11
12Introduction to Algorithms Massachusetts Institute of Technology Professors Erik Demaine, Piotr Indyk, and Manolis Kellis May 19, Spring 2011

Introduction to Algorithms Massachusetts Institute of Technology Professors Erik Demaine, Piotr Indyk, and Manolis Kellis May 19, Spring 2011

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2011-05-20 09:43:49
13Public Key Cryptography  Public Key Cryptography • Symmetric Key: – Same key used for encryption and decrypiton – Same key used for message integrity and validation

Public Key Cryptography Public Key Cryptography • Symmetric Key: – Same key used for encryption and decrypiton – Same key used for message integrity and validation

Add to Reading List

Source URL: bioinfo.ict.ac.cn

Language: English - Date: 2014-11-28 11:05:21
14Revenue Maximization in the Dynamic Knapsack Problem Deniz Dizdar, Alex Gershkov and Benny MoldovanuAbstract

Revenue Maximization in the Dynamic Knapsack Problem Deniz Dizdar, Alex Gershkov and Benny MoldovanuAbstract

Add to Reading List

Source URL: www.econ2.uni-bonn.de

Language: English - Date: 2014-03-26 06:49:17
15CS264: Homework #8 Due by midnight on Wednesday, November 19, 2014 Instructions: (1) Students taking the course pass-fail should complete the exercises. Students taking the course for a letter grade should also complete

CS264: Homework #8 Due by midnight on Wednesday, November 19, 2014 Instructions: (1) Students taking the course pass-fail should complete the exercises. Students taking the course for a letter grade should also complete

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2014-11-14 09:53:16
16May 19, Spring 2011 Final Exam Introduction to Algorithms Massachusetts Institute of Technology

May 19, Spring 2011 Final Exam Introduction to Algorithms Massachusetts Institute of Technology

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2011-05-20 09:47:26
17arXiv:1511.07147v1 [cs.LG] 23 NovA PAC Approach to Application-Specific Algorithm Selection∗ Rishi Gupta  Tim Roughgarden

arXiv:1511.07147v1 [cs.LG] 23 NovA PAC Approach to Application-Specific Algorithm Selection∗ Rishi Gupta Tim Roughgarden

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-11-23 20:51:24
18CS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms∗ Tim Roughgarden† November 5, 2014

CS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms∗ Tim Roughgarden† November 5, 2014

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2014-12-24 22:57:16
19Competitive Multi-Dimensional Dynamic Bin Packing via L-Shape Bin Packing ⋆  Prudence W.H. Wong and Fencol C.C. Yung

Competitive Multi-Dimensional Dynamic Bin Packing via L-Shape Bin Packing ⋆ Prudence W.H. Wong and Fencol C.C. Yung

Add to Reading List

Source URL: cgi.csc.liv.ac.uk

Language: English - Date: 2009-10-29 07:57:39
20Scheduling Black-box Mutational Fuzzing Maverick Woo Sang Kil Cha  Samantha Gottlieb

Scheduling Black-box Mutational Fuzzing Maverick Woo Sang Kil Cha Samantha Gottlieb

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01