Covering problems in facility location: A review
RZ Farahani, N Asgari, N Heidari, M Hosseininia… - Computers & Industrial …, 2012 - Elsevier
In this study, we review the covering problems in facility location. Here, besides a number of
reviews on covering problems, a comprehensive review of models, solutions and …
reviews on covering problems, a comprehensive review of models, solutions and …
[BOOK][B] The algorithm design manual
SS Skiena - 1998 - Springer
This newly expanded and updated second edition of the best-selling classic continues to
take the" mystery" out of designing algorithms, and analyzing their efficacy and efficiency …
take the" mystery" out of designing algorithms, and analyzing their efficacy and efficiency …
Representation granularity enables time-efficient autonomous exploration in large, complex worlds
We propose a dual-resolution scheme to achieve time-efficient autonomous exploration with
one or many robots. The scheme maintains a high-resolution local map of the robot's …
one or many robots. The scheme maintains a high-resolution local map of the robot's …
A genetic algorithm for the set covering problem
JE Beasley, PC Chu - European journal of operational research, 1996 - Elsevier
In this paper we present a genetic algorithm-based heuristic for non-unicost set covering
problems. We propose several modifications to the basic genetic procedures including a …
problems. We propose several modifications to the basic genetic procedures including a …
The performance of query control schemes for the zone routing protocol
In this paper, we study the performance of route query control mechanisms for the recently
proposed Zone Routing Protocol (ZRP) for ad-hoc networks. The ZRP proactively maintains …
proposed Zone Routing Protocol (ZRP) for ad-hoc networks. The ZRP proactively maintains …
Impact of network density on data aggregation in wireless sensor networks
In-network data aggregation is essential for wireless sensor networks where energy
resources are limited. In a previously proposed data dissemination scheme (directed …
resources are limited. In a previously proposed data dissemination scheme (directed …
User recruitment for mobile crowdsensing over opportunistic networks
M Karaliopoulos, O Telelis… - 2015 IEEE Conference …, 2015 - ieeexplore.ieee.org
We look into the realization of mobile crowdsensing campaigns that draw on the
opportunistic networking paradigm, as practised in delay-tolerant networks but also in the …
opportunistic networking paradigm, as practised in delay-tolerant networks but also in the …
The archerfish hunting optimizer: A novel metaheuristic algorithm for global optimization
Global optimization solves real-world problems numerically or analytically by minimizing
their objective functions. Most of the analytical algorithms are greedy and computationally …
their objective functions. Most of the analytical algorithms are greedy and computationally …
A review of graph approaches to network security analytics
S Noel - From Database to Cyber Security: Essays Dedicated to …, 2018 - Springer
There is a line of research extending over the last 20+ years applying graph-based methods
for assessing and improving the security of operational computer networks, maintaining …
for assessing and improving the security of operational computer networks, maintaining …
Exact and heuristics algorithms for screen line problem in large size networks: shortest path-based column generation approach
In this study, we present exact and heuristics algorithms for a traffic sensors location problem
called the screen line problem. It is a problem of how to locate traffic sensors on a …
called the screen line problem. It is a problem of how to locate traffic sensors on a …