1
2
Ochoa, Gabriela.
2015
Table of Contents:
“... and Lower Bounds on Unrestricted Black-Box Complexity of JUMPn,l -- Using Local Search to Evaluate Dispatching Rules in Dynamic Job Shop Scheduling....”2015
Full text
3
Table of Contents:
“... of the Minimum Error Correction Problem -- Fast String Dictionary Lookup with One Error -- On the Readability of Overlap Digraphs -- Improved Algorithms for the Boxed-Mesh Permutation Pattern Matching Problem -- Range Minimum Query Indexes in Higher Dimensions...”
Full text
Full text
4
Hong, Hoon.
2014
Table of Contents:
“... System for Mathematical Theory Exploration -- New Approaches in Black Box Group Theory -- A GAP Package for Computing with Real Semisimple Lie Algebras -- Bacterial Genomics and Computational Group Theory: The BioGAP Package for GAP -- SgpDec: Cascade (De...”2014
Full text
5
Lindell, Yehuda.
2014
Table of Contents:
“...Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding -- Obfuscation for Evasive Functions -- On Extractability Obfuscation -- Two-Round Secure MPC from Indistinguishability Obfuscation -- Chosen Ciphertext Security via Point...”2014
Full text
6
Nicosia, Giuseppe.
2013
Table of Contents:
“... Theory Induction -- Features for Exploiting Black-Box Optimization Problem Structure -- MOCA-I: Discovering Rules and Guiding Decision Maker in the Context of Partial Classification in Large and Imbalanced Datasets -- Sharing Information in Parallel Search...”2013
Full text
7
Bonifaci, Vincenzo.
2013
Table of Contents:
“... with Non-modular Regions.-Â Telling Stories Fast: Via Linear-Time Delay Pitch Enumeration -- Undercover Branching.-Â Quadratic Outer Approximation for Convex Integer Programming with Box Constraints -- Separable Non-convex Underestimators for Binary Quadratic...”2013
Full text
8
Hamadi, Youssef.
2012
Table of Contents:
“... on Large Population MOEA Using Adaptive ε-Box Dominance and Neighborhood Recombination for Many -- Objective Optimization -- A Non-adaptive Stochastic Local Search Algorithm High-Dimensional Model-Based Optimization Based on Noisy Evaluations of Computer Games...”2012
Full text
9
Manulis, Mark.
2012
Table of Contents:
“...Cryptanalysis -- Network security -- Cryptographic protocols -- Encryption -- S-box theory....”2012
Full text