Robinson has proposed the bundle-based decomposition algorithm to solve a class of structured large-scale convex optimization problems. In this method, the original problem is transformed (by dualization) to an uncons...
详细信息
Robinson has proposed the bundle-based decomposition algorithm to solve a class of structured large-scale convex optimization problems. In this method, the original problem is transformed (by dualization) to an unconstrained nonsmooth concave optimization problem which is in turn solved by using a modified bundle method. In this paper, we give a posteriori error estimates on the approximate primal optimal solution and on the duality gap. We describe implementation and present computational experience with a special case of this class of problems, namely, block-angular linear programming problems. We observe that the method is efficient in obtaining the approximate optimal solution and compares favorably with MINOS and an advanced implementation of the Dantzig-Wolfe decomposition method.
We present improved fast deterministic algorithm for integer sorting in linear space. Our algorithm sorts n integers in linear space in O(n log log n log log log n) time. This improves the O(n(log log n)3/2) time boun...
In this paper, we present a description of a Prolog implementation of a system (RTR) for “real-time reasoning”, similar to those discussed by Perlis (see [3] and [6]). The reasoning to be performed by the system is ...
ISBN:
(纸本)0897913477
In this paper, we present a description of a Prolog implementation of a system (RTR) for “real-time reasoning”, similar to those discussed by Perlis (see [3] and [6]). The reasoning to be performed by the system is “real-time” in two different senses. First, reasoning is considered to be a continuing process rather than an isolated calculation of the consequences of an axiom set, with such a process being analogous to that required to create a computer or robotic system with some autonomy. Secondly, our system addresses the combinatorial problems inherent in theorem proving by applying inference rules to only a small working set of observations and axioms. Such a system provides one approach to non-monotonic reasoning, allowing the derivation of inconsistent facts within the working set and then providing a means of resolving the conflict.
A new single-key-lock (SKL) mechanism used for implementing the access matrix of the computer protection system is proposed. The key selection is very flexible. The lock values are generated recursively based on the N...
详细信息
A new single-key-lock (SKL) mechanism used for implementing the access matrix of the computer protection system is proposed. The key selection is very flexible. The lock values are generated recursively based on the Newton's interpolating polynomial. The insertion of a new user/file into the system can be successfully implemented without recomputing all locks/keys. [ABSTRACT FROM AUTHOR]
Information technology, and in particular distance education technology, is becoming more prevalent across society and throughout higher education. But as information technology mediated education moves from trials to...
详细信息
A divide-and-conquer approach for the presumed minimal solution to the Reve's puzzle, the Tower of Hanoi with four pegs, leadsto a simple structure of the solution. In particular, it allows an easy, iterative algo...
详细信息
A divide-and-conquer approach for the presumed minimal solution to the Reve's puzzle, the Tower of Hanoi with four pegs, leadsto a simple structure of the solution. In particular, it allows an easy, iterative algorithm – for the three-peg problem –to be extended to four pegs.
The design, development, and maintenance of large, complex software systems has long been plagued by the imposition of artificially frozen requirements. A design and development environment which allows a continuum of...
详细信息
This paper describes a software authentication technique based on the public key cryptography for information integrity. The software provider can use a secret key to sign any released program and the user can verify ...
详细信息
The simulator designed by the author provides a new design paradigm for simulating large-scale telecommunications systems. It is based on C and CSIM and has the features of dynamic memory allocation, modular design, i...
详细信息
Group Communication describes a type of communication between human beings that takes place within a group. Group Communication, as a topic, encompasses several application areas such as conferencing or various office...
详细信息
暂无评论