Nothing Special   »   [go: up one dir, main page]

skip to main content
Skip header Section
Approximation algorithmsAugust 2001
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-3-540-65367-7
Published:01 August 2001
Pages:
378
Skip Bibliometrics Section
Reflects downloads up to 12 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

This book will be of interest to the scientific community at large and, in particular, to students and researchers in Computer Science, Operation Research, and Discrete Mathematics. It can be used both as a text in a graduate course on approximation algorithms and as a supplementary text in basic undergraduate and graduate courses on algorithms.

Cited By

  1. ACM
    Jing Y and Mohar B (2024). Efficient polynomial-time approximation scheme for the genus of dense graphs, Journal of the ACM, 71:6, (1-33), Online publication date: 31-Dec-2025.
  2. Guo J, Su L, Liu J, Ding J, Liu X, Huang B and Li L (2024). Auction-based client selection for online Federated Learning, Information Fusion, 112:C, Online publication date: 1-Dec-2024.
  3. ACM
    Menis Mastromichalakis O, Filandrianos G, Liartis J, Dervakos E and Stamou G Semantic Prototypes: Enhancing Transparency without Black Boxes Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, (1680-1688)
  4. Samadi M, Ghassemi F and Khosravi R (2024). Decentralized deadlock-free enforcement of message orderings in message-based systems, Journal of Computer and System Sciences, 144:C, Online publication date: 1-Sep-2024.
  5. McKay M and Manlove D (2024). Packing K rs in bounded degree graphs, Discrete Applied Mathematics, 352:C, (20-32), Online publication date: 31-Jul-2024.
  6. ACM
    Liu M and Tang X Brief Announcement: Tight bounds for Dynamic Bin Packing with Predictions Proceedings of the 36th ACM Symposium on Parallelism in Algorithms and Architectures, (297-299)
  7. ACM
    Zuo T, Tang X and Lee B Cost-Driven Data Replication with Predictions Proceedings of the 36th ACM Symposium on Parallelism in Algorithms and Architectures, (309-320)
  8. Cordasco G, Gargano L and Rescigno A (2024). Parameterized complexity for iterated type partitions and modular-width, Discrete Applied Mathematics, 350:C, (100-122), Online publication date: 15-Jun-2024.
  9. ACM
    Zhang Y, Liang W, Xu W, Xu Z and Jia X (2024). Cost Minimization of Digital Twin Placements in Mobile Edge Computing, ACM Transactions on Sensor Networks, 20:3, (1-26), Online publication date: 31-May-2024.
  10. ACM
    An S and Cao Y (2024). Counterfactual Explanation at Will, with Zero Privacy Leakage, Proceedings of the ACM on Management of Data, 2:3, (1-29), Online publication date: 29-May-2024.
  11. ACM
    Makhija N and Gatterbauer W (2024). Minimally Factorizing the Provenance of Self-join Free Conjunctive Queries, Proceedings of the ACM on Management of Data, 2:2, (1-24), Online publication date: 10-May-2024.
  12. Schlotter I (2024). Recognizing when a preference system is close to admitting a master list, Theoretical Computer Science, 994:C, Online publication date: 1-May-2024.
  13. Jana S and Mandal P (2024). Approximation algorithms for drone delivery scheduling with a fixed number of drones, Theoretical Computer Science, 991:C, Online publication date: 12-Apr-2024.
  14. Acharyya A, Keikha V, Majumdar D and Pandit S (2024). Constrained hitting set problem with intervals, Theoretical Computer Science, 990:C, Online publication date: 1-Apr-2024.
  15. Chintapalli V, Partani R, Tamma B and C. S (2024). Energy efficient and delay aware deployment of parallelized service function chains in NFV-based networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 243:C, Online publication date: 1-Apr-2024.
  16. ACM
    Shi T, Cai Z, Li J and Gao H (2024). Optimize the Age of Useful Information in Edge-assisted Energy-harvesting Sensor Networks, ACM Transactions on Sensor Networks, 20:2, (1-26), Online publication date: 31-Mar-2024.
  17. Liu Y, Zhi J, Xia X, Han Y, Zhang C and Zhang B (2024). QoE-aware budgeted edge data caching online, Computer Networks: The International Journal of Computer and Telecommunications Networking, 241:C, Online publication date: 1-Mar-2024.
  18. Laber E (2024). The computational complexity of some explainable clustering problems, Information Processing Letters, 184:C, Online publication date: 1-Feb-2024.
  19. Tu C, Bai R, Aickelin U, Zhang Y and Du H (2023). A deep reinforcement learning hyper-heuristic with feature fusion for online packing problems, Expert Systems with Applications: An International Journal, 230:C, Online publication date: 15-Nov-2023.
  20. Ni W, Chen P, Chen L, Cheng P, Zhang C and Lin X (2023). Utility-Aware Payment Channel Network Rebalance, Proceedings of the VLDB Endowment, 17:2, (184-196), Online publication date: 1-Oct-2023.
  21. Agarwal P, Geft T, Halperin D and Taylor E (2023). Multi-robot motion planning for unit discs with revolving areas, Computational Geometry: Theory and Applications, 114:C, Online publication date: 1-Oct-2023.
  22. Khonji M (2023). Approximability and efficient algorithms for constrained fixed-horizon POMDPs with durative actions, Artificial Intelligence, 323:C, Online publication date: 1-Oct-2023.
  23. ACM
    Dai W, Foerster K, Fuchssteiner D and Schmid S (2023). Load-optimization in Reconfigurable Data-center Networks: Algorithms and Complexity of Flow Routing, ACM Transactions on Modeling and Performance Evaluation of Computing Systems, 8:3, (1-30), Online publication date: 30-Sep-2023.
  24. Elkind E, Faliszewski P, Igarashi A, Manurangsi P, Schmidt-Kraepelin U and Suksompong W (2023). Justifying groups in multiwinner approval voting, Theoretical Computer Science, 969:C, Online publication date: 21-Aug-2023.
  25. Song D, Park J and Kim Y (2023). SSK: Robotic Pen-Art System for Large, Nonplanar Canvas, IEEE Transactions on Robotics, 39:4, (3106-3119), Online publication date: 1-Aug-2023.
  26. Ma W (2023). Order-Optimal Correlated Rounding for Fulfilling Multi-Item E-Commerce Orders, Manufacturing & Service Operations Management, 25:4, (1324-1337), Online publication date: 1-Jul-2023.
  27. ACM
    Laufer B, Gilbert T and Nissenbaum H Optimization’s Neglected Normative Commitments Proceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency, (50-63)
  28. Dey S, Dubey Y and Molinaro M (2023). Branch-and-bound solves random binary IPs in poly(n)-time, Mathematical Programming: Series A and B, 200:1, (569-587), Online publication date: 1-Jun-2023.
  29. Fotakis D and Gourvès L On the Distortion of Single Winner Elections with Aligned Candidates Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, (1409-1411)
  30. Zhao X, Yan B and Zhang P (2023). New algorithms for a simple measure of network partitioning, Theoretical Computer Science, 957:C, Online publication date: 12-May-2023.
  31. Cheng G, Liu Q and Qu Y (2023). Generating Characteristic Summaries for Entity Descriptions, IEEE Transactions on Knowledge and Data Engineering, 35:5, (4825-4837), Online publication date: 1-May-2023.
  32. Lei C, Quamar A, Efthymiou V, Özcan F and Alotaibi R (2023). HERMES: data placement and schema optimization for enterprise knowledge bases, The VLDB Journal — The International Journal on Very Large Data Bases, 32:3, (549-574), Online publication date: 1-May-2023.
  33. Asudeh A, Berger-Wolf T, DasGupta B and Sidiropoulos A (2023). Maximizing Coverage While Ensuring Fairness: A Tale of Conflicting Objectives, Algorithmica, 85:5, (1287-1331), Online publication date: 1-May-2023.
  34. ACM
    Ganesh A, Maggs B and Panigrahi D (2022). Robust Algorithms for TSP and Steiner Tree, ACM Transactions on Algorithms, 19:2, (1-37), Online publication date: 30-Apr-2023.
  35. Zhou G, Tian W and Buyya R (2023). Multi-search-routes-based methods for minimizing makespan of homogeneous and heterogeneous resources in Cloud computing, Future Generation Computer Systems, 141:C, (414-432), Online publication date: 1-Apr-2023.
  36. ACM
    Wu S, Shen H, Weld D, Heer J and Ribeiro M ScatterShot: Interactive In-context Example Curation for Text Transformation Proceedings of the 28th International Conference on Intelligent User Interfaces, (353-367)
  37. Schlotter I Recognizing When a Preference System is Close to Admitting a Master List WALCOM: Algorithms and Computation, (317-329)
  38. Demaine E, Löffler M and Schmidt C (2023). Rectangular Spiral Galaxies are still hard, Computational Geometry: Theory and Applications, 110:C, Online publication date: 1-Mar-2023.
  39. Carr R, Haddadan A and Phillips C (2023). Fractional Decomposition Tree Algorithm, Discrete Optimization, 47:C, Online publication date: 1-Feb-2023.
  40. Xu X, Wang Y, Zhang Y and Li D (2023). A fault diagnosis method to defend scapegoating attack in network tomography, Theoretical Computer Science, 939:C, (237-249), Online publication date: 4-Jan-2023.
  41. Chen W, Liu Y, Liu F, Dai Y and Luo Z (2023). Towards Efficient Large-Scale Network Slicing: An LP Dynamic Rounding-and-Refinement Approach, IEEE Transactions on Signal Processing, 71, (615-630), Online publication date: 1-Jan-2023.
  42. Borhani M, Avgouleas I, Liyanage M and Gurtov A (2023). KDC Placement Problem in Secure VPLS Networks, IEEE Transactions on Information Forensics and Security, 18, (1951-1962), Online publication date: 1-Jan-2023.
  43. Pan S and Wei H (2023). A global generalized maximum coverage-based solution to the non-model-based view planning problem for object reconstruction, Computer Vision and Image Understanding, 226:C, Online publication date: 1-Jan-2023.
  44. Hernández C, Yeoh W, Baier J, Zhang H, Suazo L, Koenig S and Salzman O (2023). Simple and efficient bi-objective search algorithms via fast dominance checks, Artificial Intelligence, 314:C, Online publication date: 1-Jan-2023.
  45. Li J, Pan P, Lichen J, Cai L, Wang W and Liu S (2023). Approximation algorithms for solving the heterogeneous Chinese postman problem, Journal of Combinatorial Optimization, 45:1, Online publication date: 1-Jan-2023.
  46. Hao S, Zheng J, Yang J, Liang T, Liu Y and Zhang L (2022). Reward optimization of spatial crowdsourcing for coalition‐based maintenance task, International Journal of Intelligent Systems, 37:12, (11382-11406), Online publication date: 29-Dec-2022.
  47. ACM
    Mhaisen N, Sinha A, Paschos G and Iosifidis G (2022). Optimistic No-regret Algorithms for Discrete Caching, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 6:3, (1-28), Online publication date: 1-Dec-2022.
  48. ACM
    Liu M and Tang X (2022). Dynamic Bin Packing with Predictions, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 6:3, (1-24), Online publication date: 1-Dec-2022.
  49. Li J, Wang W, Lichen J, Liu S and Pan P (2022). Approximation algorithms for solving the line-capacitated minimum Steiner tree problem, Journal of Global Optimization, 84:3, (687-714), Online publication date: 1-Nov-2022.
  50. Shalu M, Vijayakumar S, Sandhya T and Mondal J (2022). Induced star partition of graphs, Discrete Applied Mathematics, 319:C, (81-91), Online publication date: 15-Oct-2022.
  51. ACM
    Chen X, Minutoli M, Tian J, Halappanavar M, Kalyanaraman A and Tao D HBMax Proceedings of the International Conference on Parallel Architectures and Compilation Techniques, (412-425)
  52. ACM
    Juárez J, Santos C and Brizuela C (2021). A Comprehensive Review and a Taxonomy Proposal of Team Formation Problems, ACM Computing Surveys, 54:7, (1-33), Online publication date: 30-Sep-2022.
  53. ACM
    Zhang L, Zhu T, Xiong P, Zhou W and Yu P (2021). More than Privacy, ACM Computing Surveys, 54:7, (1-37), Online publication date: 30-Sep-2022.
  54. Hernández Mira F, Parra Inza E, Sigarreta Almira J and Vakhania N (2022). A polynomial-time approximation to a minimum dominating set in a graph, Theoretical Computer Science, 930:C, (142-156), Online publication date: 21-Sep-2022.
  55. Liang W and Zhang Z (2022). Approximation algorithm for prize-collecting sweep cover with base stations, Theoretical Computer Science, 929:C, (1-10), Online publication date: 11-Sep-2022.
  56. Li S, Zhang Y, Tan Z and Ma S (2022). Diversifying repairs of Denial constraint violations, Information Systems, 108:C, Online publication date: 1-Sep-2022.
  57. Zhao X and Zhang Y (2022). Reviewer assignment algorithms for peer review automation, Information Processing and Management: an International Journal, 59:5, Online publication date: 1-Sep-2022.
  58. Olague G (2022). Commentary on “On the optimal placement of cameras for surveillance and the underlying set cover problem” [Applied Soft Computing, vol. 74, 2019, pages 133–153], Applied Soft Computing, 126:C, Online publication date: 1-Sep-2022.
  59. ACM
    Buwaya J and Rolim J NoiseBay: A Real-World Study on Transparent Data Collection Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing, (493-501)
  60. Jin Z, Shang J, Ni W, Zhao L, Liu D, Qiang B, Xie W and Min G (2022). IM2Vec, Information Sciences: an International Journal, 604:C, (170-196), Online publication date: 1-Aug-2022.
  61. Feldman J and Segev D (2022). Technical Note—The Multinomial Logit Model with Sequential Offerings, Operations Research, 70:4, (2162-2184), Online publication date: 1-Jul-2022.
  62. ACM
    Liu Q, Shen Y and Chen L HAP: An Efficient Hamming Space Index Based on Augmented Pigeonhole Principle Proceedings of the 2022 International Conference on Management of Data, (917-930)
  63. Liang Y, Zhang S and Ge J (2022). Joint optimization of collaborative interactive charging and charging lane placement for cyclic electric vehicles, Computer Communications, 190:C, (166-177), Online publication date: 1-Jun-2022.
  64. Ou H, Siebenbrunner C, Killian J, Brooks M, Kempe D, Vorobeychik Y and Tambe M Networked Restless Multi-Armed Bandits for Mobile Interventions Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, (1001-1009)
  65. Dumitrescu A and Tóth C (2022). Online Unit Clustering and Unit Covering in Higher Dimensions, Algorithmica, 84:5, (1213-1231), Online publication date: 1-May-2022.
  66. Agarwal P, Ezra E and Fox K Geometric Optimization Revisited Computing and Software Science, (66-84)
  67. Dahan M, Sela L and Amin S (2022). Network Inspection for Detecting Strategic Attacks, Operations Research, 70:2, (1008-1024), Online publication date: 1-Mar-2022.
  68. Eisenbrand F and Venzin M (2022). Approximate CVP in time 20.802 , Journal of Computer and System Sciences, 124:C, (129-139), Online publication date: 1-Mar-2022.
  69. Zhang Y, Zhang Z, Liu Z and Chen Q (2022). An asymptotically tight online algorithm for m-Steiner Traveling Salesman Problem, Information Processing Letters, 174:C, Online publication date: 1-Mar-2022.
  70. Liu Z, Li K, Zhou X, Zhu N, Gao Y and Li K (2022). Multi-stage complex task assignment in spatial crowdsourcing, Information Sciences: an International Journal, 586:C, (119-139), Online publication date: 1-Mar-2022.
  71. ACM
    Patil S, Banerjee D and Sural S (2021). A Graph Theoretic Approach for Multi-Objective Budget Constrained Capsule Wardrobe Recommendation, ACM Transactions on Information Systems, 40:1, (1-33), Online publication date: 31-Jan-2022.
  72. Hosseinian S and Butenko S (2022). An improved approximation for Maximum k-dependent Set on bipartite graphs, Discrete Applied Mathematics, 307:C, (95-101), Online publication date: 30-Jan-2022.
  73. ACM
    Garg V A Lattice Linear Predicate Parallel Algorithm for the Dynamic Programming Problems Proceedings of the 23rd International Conference on Distributed Computing and Networking, (72-76)
  74. Li J, Cai L, Lichen J, Pan P, Wang W and Liu S An Approximation Algorithm for Solving the Heterogeneous Chinese Postman Problem Algorithmic Aspects in Information and Management, (38-46)
  75. Yuan Y, Ma D, Wen Z, Zhang Z and Wang G (2022). Subgraph matching over graph federation, Proceedings of the VLDB Endowment, 15:3, (437-450), Online publication date: 1-Nov-2021.
  76. Averbakh I (2021). The pairwise flowtime network construction problem, Operations Research Letters, 49:6, (902-907), Online publication date: 1-Nov-2021.
  77. ACM
    Gottlob G, Lanzinger M, Pichler R and Razgon I (2021). Complexity Analysis of Generalized and Fractional Hypertree Decompositions, Journal of the ACM, 68:5, (1-50), Online publication date: 31-Oct-2021.
  78. Battistini J, Rathinam S and Tatum R Min-Max Task Assignment and Sequencing with Heterogeneous Unmanned Vehicles 2021 IEEE 17th International Conference on Automation Science and Engineering (CASE), (619-624)
  79. Dong J, Goebel R, Hu J, Lin G and Su B (2021). Minimizing total job completion time in MapReduce scheduling, Computers and Industrial Engineering, 158:C, Online publication date: 1-Aug-2021.
  80. ACM
    Galhotra S, Saisubramanian S and Zilberstein S Learning to Generate Fair Clusters from Demonstrations Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society, (491-501)
  81. ACM
    Liu M and Tang X Analysis of Busy-Time Scheduling on Heterogeneous Machines Proceedings of the 33rd ACM Symposium on Parallelism in Algorithms and Architectures, (340-350)
  82. ACM
    Bossek J, Neumann A and Neumann F Breeding diverse packings for the knapsack problem by means of diversity-tailored evolutionary algorithms Proceedings of the Genetic and Evolutionary Computation Conference, (556-564)
  83. ACM
    Wang Y, Yu S, Gu Y and Shun J Fast Parallel Algorithms for Euclidean Minimum Spanning Tree and Hierarchical Spatial Clustering Proceedings of the 2021 International Conference on Management of Data, (1982-1995)
  84. ACM
    Chitnis R, Feldmann A and Manurangsi P (2021). Parameterized Approximation Algorithms for Bidirected Steiner Network Problems, ACM Transactions on Algorithms, 17:2, (1-68), Online publication date: 1-Jun-2021.
  85. Chiu C and He T (2021). Stealthy DGoS Attack: DeGrading of Service Under the Watch of Network Tomography, IEEE/ACM Transactions on Networking, 29:3, (1294-1307), Online publication date: 1-Jun-2021.
  86. ACM
    Stanley-Marbell P, Alaghi A, Carbin M, Darulova E, Dolecek L, Gerstlauer A, Gillani G, Jevdjic D, Moreau T, Cacciotti M, Daglis A, Jerger N, Falsafi B, Misailovic S, Sampson A and Zufferey D (2020). Exploiting Errors for Efficiency, ACM Computing Surveys, 53:3, (1-39), Online publication date: 31-May-2021.
  87. Dey P, Maity S, Medya S and Silva A Network Robustness via Global k-cores Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems, (438-446)
  88. Buchbinder N, Schwartz R and Weizman B (2021). Simplex Transformations and the Multiway Cut Problem, Mathematics of Operations Research, 46:2, (757-771), Online publication date: 1-May-2021.
  89. Disser Y, Feldmann A, Klimm M and Könemann J (2021). Travelling on Graphs with Small Highway Dimension, Algorithmica, 83:5, (1352-1370), Online publication date: 1-May-2021.
  90. ACM
    Scott J and Tůma M (2020). Strengths and Limitations of Stretching for Least-squares Problems with Some Dense Rows, ACM Transactions on Mathematical Software, 47:1, (1-25), Online publication date: 31-Mar-2021.
  91. ACM
    Dai W, Foerster K, Fuchssteiner D and Schmid S (2021). Load-Optimization in Reconfigurable Networks, ACM SIGMETRICS Performance Evaluation Review, 48:3, (39-44), Online publication date: 5-Mar-2021.
  92. Pentelas A, Papathanail G, Fotoglou I and Papadimitriou P (2021). Network Service Embedding Across Multiple Resource Dimensions, IEEE Transactions on Network and Service Management, 18:1, (209-223), Online publication date: 1-Mar-2021.
  93. Dütting P, Kesselheim T and Tardos É (2021). Algorithms as Mechanisms, Mathematics of Operations Research, 46:1, (317-335), Online publication date: 1-Feb-2021.
  94. Pandit S (2021). Dominating set of rectangles intersecting a straight line, Journal of Combinatorial Optimization, 41:2, (414-432), Online publication date: 1-Feb-2021.
  95. Dey S, Dubey Y and Molinaro M Branch-and-bound solves random binary IPs in polytime Proceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, (579-591)
  96. Lokshtanov D, Misra P, Ramanujan M, Saurabh S and Zehavi M FPT-approximation for FPT problems Proceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, (199-218)
  97. ACM
    Ma S and Huai J (2021). Approximate computation for big data analytics, ACM SIGWEB Newsletter, 2021:Winter, (1-8), Online publication date: 1-Jan-2021.
  98. Hisham A, Yuan D, Ström E and Brännström F (2020). Adjacent Channel Interference Aware Joint Scheduling and Power Control for V2V Broadcast Communication, IEEE Transactions on Intelligent Transportation Systems, 22:1, (443-456), Online publication date: 1-Jan-2021.
  99. Cicalese F and Laber E (2020). Information Theoretical Clustering Is Hard to Approximate, IEEE Transactions on Information Theory, 67:1, (586-597), Online publication date: 1-Jan-2021.
  100. Chiu C and He T Stealthy DGoS Attack under Passive and Active Measurements GLOBECOM 2020 - 2020 IEEE Global Communications Conference, (1-6)
  101. ACM
    Lee E and Singla S (2020). Maximum Matching in the Online Batch-arrival Model, ACM Transactions on Algorithms, 16:4, (1-31), Online publication date: 31-Oct-2020.
  102. Ren C, Xu D, Du D and Li M A Primal-Dual Algorithm for Euclidean k-Means Problem with Penalties Theory and Applications of Models of Computation, (377-389)
  103. ACM
    Cavezza D, Alrajeh D and György A Minimal Assumptions Refinement for Realizable Specifications Proceedings of the 8th International Conference on Formal Methods in Software Engineering, (66-76)
  104. Majumdar D, Ramanujan M and Saurabh S (2020). On the Approximate Compressibility of Connected Vertex Cover, Algorithmica, 82:10, (2902-2926), Online publication date: 1-Oct-2020.
  105. Giannakopoulos Y, Hammerl A and Poças D A New Lower Bound for Deterministic Truthful Scheduling Algorithmic Game Theory, (226-240)
  106. Dlask T and Werner T Bounding Linear Programs by Constraint Propagation: Application to Max-SAT Principles and Practice of Constraint Programming, (177-193)
  107. Zhou Y, Han Y, Liu A, Li Z, Yin H, Chen W and Zhao L (2020). Extracting representative user subset of social networks towards user characteristics and topological features, World Wide Web, 23:5, (2903-2931), Online publication date: 1-Sep-2020.
  108. Zhang S, Liang Y, Ge J, Xiao M and Wu J (2020). Provably Efficient Resource Allocation for Edge Service Entities Using Hermes, IEEE/ACM Transactions on Networking, 28:4, (1684-1697), Online publication date: 1-Aug-2020.
  109. ACM
    Bar-Yehuda R, Censor-Hillel K, Maus Y, Pai S and Pemmaraju S Distributed Approximation on Power Graphs Proceedings of the 39th Symposium on Principles of Distributed Computing, (501-510)
  110. Chiu C and He T Stealthy DGoS Attack: DeGrading of Service under the Watch of Network Tomography IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, (367-376)
  111. Feldmann A and Marx D (2020). The Parameterized Hardness of the k-Center Problem in Transportation Networks, Algorithmica, 82:7, (1989-2005), Online publication date: 1-Jul-2020.
  112. DasGupta B, Janardhanan M and Yahyanejad F (2020). Why Did the Shape of Your Network Change? (On Detecting Network Anomalies via Non-local Curvatures), Algorithmica, 82:7, (1741-1783), Online publication date: 1-Jul-2020.
  113. ACM
    Minutoli M, Drocco M, Halappanavar M, Tumeo A and Kalyanaraman A cuRipples Proceedings of the 34th ACM International Conference on Supercomputing, (1-11)
  114. ACM
    Fomin F, Lokshtanov D, Panolan F, Saurabh S and Zehavi M Hitting topological minors is FPT Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, (1317-1326)
  115. ACM
    Console M, Hofer M and Libkin L Queries with Arithmetic on Incomplete Databases Proceedings of the 39th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (179-189)
  116. ACM
    Cao Y, Fan W, Wang Y and Yi K Querying Shared Data with Security Heterogeneity Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, (575-585)
  117. Mitev M, Chorti A, Reed M and Musavian L (2020). Authenticated secret key generation in delay-constrained wireless systems, EURASIP Journal on Wireless Communications and Networking, 2020:1, Online publication date: 9-Jun-2020.
  118. Mkrtchyan V, Petrosyan G, Subramani K and Wojciechowski P Parameterized Algorithms for Partial Vertex Covers in Bipartite Graphs Combinatorial Algorithms, (395-408)
  119. Bredereck R, Faliszewski P, Niedermeier R, Skowron P and Talmon N (2020). Mixed integer programming with convex/concave constraints, Theoretical Computer Science, 814:C, (86-105), Online publication date: 24-Apr-2020.
  120. Galby E, Munaro A and Ries B (2020). Semitotal Domination, Theoretical Computer Science, 814:C, (28-48), Online publication date: 24-Apr-2020.
  121. Ding X, Wang Y, Sun G, Luo C, Li D, Chen W and Hu Q (2020). Optimal charger placement for wireless power transfer, Computer Networks: The International Journal of Computer and Telecommunications Networking, 170:C, Online publication date: 7-Apr-2020.
  122. Censor-Hillel K, Paz A and Perry M (2020). Approximate proof-labeling schemes, Theoretical Computer Science, 811:C, (112-124), Online publication date: 2-Apr-2020.
  123. Manukyan A and Ceyhan E (2020). Classification using proximity catch digraphs, Machine Language, 109:4, (761-811), Online publication date: 1-Apr-2020.
  124. ACM
    Zhang B, Dong B, Sun H and Wang W AuthPDB Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, (121-132)
  125. Xie W and Ahmed S (2020). Bicriteria Approximation of Chance-Constrained Covering Problems, Operations Research, 68:2, (516-533), Online publication date: 1-Mar-2020.
  126. Chen Y, Qu Q, Ying Y, Li H and Shen J (2020). Semantics-aware influence maximization in social networks, Information Sciences: an International Journal, 513:C, (442-464), Online publication date: 1-Mar-2020.
  127. Bentz C and Le Bodic P (2020). Complexity of the multicut problem, in its vanilla, partial and generalized versions, in graphs of bounded treewidth, Theoretical Computer Science, 809:C, (239-249), Online publication date: 24-Feb-2020.
  128. Page D, Solis-Oba R and Maack M (2020). Makespan minimization on unrelated parallel machines with simple job-intersection structure and bounded job assignments, Theoretical Computer Science, 809:C, (204-217), Online publication date: 24-Feb-2020.
  129. ACM
    Nikolić S, Zgheib G and Ienne P Straight to the Point Proceedings of the 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, (150-160)
  130. Wu G, Chen J and Wang J (2020). Improved approximation algorithms for two-stage flowshops scheduling problem, Theoretical Computer Science, 806:C, (509-515), Online publication date: 2-Feb-2020.
  131. Kim S, Lee K, Kim Y, Shin J, Shin S and Chong S (2020). Dynamic Control for On-Demand Interference-Managed WLAN Infrastructures, IEEE/ACM Transactions on Networking, 28:1, (84-97), Online publication date: 1-Feb-2020.
  132. Akrida E, Mertzios G, Spirakis P and Zamaraev V (2020). Temporal vertex cover with a sliding time window, Journal of Computer and System Sciences, 107:C, (108-123), Online publication date: 1-Feb-2020.
  133. Li J, Liu S, Lichen J, Wang W and Zheng Y (2019). Approximation algorithms for solving the 1-line Euclidean minimum Steiner tree problem, Journal of Combinatorial Optimization, 39:2, (492-508), Online publication date: 1-Feb-2020.
  134. Kamali S, Miller A and Zhang K Burning Two Worlds SOFSEM 2020: Theory and Practice of Computer Science, (113-124)
  135. Yu W, Liu Z and Bao X (2020). New LP relaxations for Minimum Cycle/Path/Tree Cover Problems, Theoretical Computer Science, 803:C, (71-81), Online publication date: 10-Jan-2020.
  136. Liu B, Li X, Wang H, Fang Q, Dong J and Wu W (2020). Profit Maximization problem with Coupons in social networks, Theoretical Computer Science, 803:C, (22-35), Online publication date: 10-Jan-2020.
  137. Sung Y, Budhiraja A, Williams R and Tokekar P (2019). Distributed assignment with limited communication for multi-robot multi-target tracking, Autonomous Robots, 44:1, (57-73), Online publication date: 1-Jan-2020.
  138. ACM
    Chen J, Liu H, Yang Y and He J (2019). Effective Selection of a Compact and High-Quality Review Set with Information Preservation, ACM Transactions on Management Information Systems, 10:4, (1-22), Online publication date: 31-Dec-2020.
  139. Sato R, Yamada M and Kashima H Approximation ratios of graph neural networks for combinatorial problems Proceedings of the 33rd International Conference on Neural Information Processing Systems, (4081-4090)
  140. ACM
    Shi T, Cheng S, Li J, Gao H and Cai Z (2019). Dominating Sets Construction in RF-based Battery-free Sensor Networks with Full Coverage Guarantee, ACM Transactions on Sensor Networks, 15:4, (1-29), Online publication date: 30-Nov-2019.
  141. ACM
    Liu J, Yue X and Chen Z A Note on Polynomial-time Solvability for Edge Packing on Graphs Proceedings of the 2019 9th International Conference on Communication and Network Security, (118-122)
  142. ACM
    Yue X, Gao J and Chen Z A Polynomial Time Algorithm for Scheduling on Processing Time Constraints Proceedings of the 2019 9th International Conference on Communication and Network Security, (109-113)
  143. Liang Y, Ge J, Zhang S, Wu J, Tang Z and Luo B (2019). A Utility-Based Optimization Framework for Edge Service Entity Caching, IEEE Transactions on Parallel and Distributed Systems, 30:11, (2384-2395), Online publication date: 1-Nov-2019.
  144. Buchbinder N, Schwartz R and Weizman B (2022). A simple algorithm for the multiway cut problem, Operations Research Letters, 47:6, (587-593), Online publication date: 1-Nov-2019.
  145. Torra V and Senavirathne N (2019). Maximal c consensus meets, Information Fusion, 51:C, (58-66), Online publication date: 1-Nov-2019.
  146. Angel E, Nguyen Kim T and Singh S (2019). Approximating k-forest with resource augmentation, Theoretical Computer Science, 788:C, (12-20), Online publication date: 8-Oct-2019.
  147. Ryzhikov A (2019). Synchronization problems in automata without non-trivial cycles, Theoretical Computer Science, 787:C, (77-88), Online publication date: 1-Oct-2019.
  148. ACM
    Bonab H, Allan J and Sitaraman R Simulating CLIR Translation Resource Scarcity using High-resource Languages Proceedings of the 2019 ACM SIGIR International Conference on Theory of Information Retrieval, (129-136)
  149. Beynier A, Chevaleyre Y, Gourvès L, Harutyunyan A, Lesca J, Maudet N and Wilczynski A (2019). Local envy-freeness in house allocation problems, Autonomous Agents and Multi-Agent Systems, 33:5, (591-627), Online publication date: 1-Sep-2019.
  150. da Silva M, Schouery R and Pedrosa L (2019). A Polynomial-time Approximation Scheme for the MAXSPACE Advertisement Problem, Electronic Notes in Theoretical Computer Science (ENTCS), 346:C, (699-710), Online publication date: 30-Aug-2019.
  151. Cechlárová K, Gourvès L and Lesca J On the problem of assigning PhD grants Proceedings of the 28th International Joint Conference on Artificial Intelligence, (130-136)
  152. ACM
    Guan S, Ma H and Wu Y Attribute-Driven Backbone Discovery Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (187-195)
  153. ACM
    Kobren A, Saha B and McCallum A Paper Matching with Local Fairness Constraints Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (1247-1257)
  154. ACM
    Bacrach N, Censor-Hillel K, Dory M, Efron Y, Leitersdorf D and Paz A Hardness of Distributed Optimization Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, (238-247)
  155. Katsikarelis I, Lampis M and Paschos V (2019). Structural parameters, tight bounds, and approximation for ( k , r )-center, Discrete Applied Mathematics, 264:C, (90-117), Online publication date: 15-Jul-2019.
  156. Chatterjee T, DasGupta B, Mobasheri N, Srinivasan V and Yero I (2019). On the computational complexities of three problems related to a privacy measure for large networks under active attack, Theoretical Computer Science, 775:C, (53-67), Online publication date: 5-Jul-2019.
  157. Eisenach C and Liu H (2019). Efficient, certifiably optimal clustering with applications to latent variable graphical models, Mathematical Programming: Series A and B, 176:1-2, (137-173), Online publication date: 1-Jul-2019.
  158. ACM
    Tang J, Huang K, Xiao X, Lakshmanan L, Tang X, Sun A and Lim A Efficient Approximation Algorithms for Adaptive Seed Minimization Proceedings of the 2019 International Conference on Management of Data, (1096-1113)
  159. Disser Y, Feldmann A, Klimm M and Könemann J Travelling on Graphs with Small Highway Dimension Graph-Theoretic Concepts in Computer Science, (175-189)
  160. ACM
    Li Y, Shan C, Chen R, Tang X, Cai W, Tang S, Liu X, Wang G, Gong X and Zhang Y GAugur Proceedings of the 28th International Symposium on High-Performance Parallel and Distributed Computing, (231-242)
  161. Honda H and Saito H (2019). Nation-Wide Disaster Avoidance Control Against Heavy Rain, IEEE/ACM Transactions on Networking, 27:3, (1084-1097), Online publication date: 1-Jun-2019.
  162. Zick Y, Chalkiadakis G, Elkind E and Markakis E (2019). Cooperative games with overlapping coalitions, Artificial Intelligence, 271:C, (74-97), Online publication date: 1-Jun-2019.
  163. López J, Kushik N and Zeghlache D (2019). Virtual machine placement quality estimation in cloud infrastructures using integer linear programming, Software Quality Journal, 27:2, (731-755), Online publication date: 1-Jun-2019.
  164. Ladányi Á and Cinkler T (2019). Resilience---throughput---power trade-off in future 5G photonic networks, Photonic Network Communications, 37:3, (296-310), Online publication date: 1-Jun-2019.
  165. Bae J, Lee J and Chung W A Heuristic for Task Allocation and Routing of Heterogeneous Robots while Minimizing Maximum Travel Cost 2019 International Conference on Robotics and Automation (ICRA), (4531-4537)
  166. Davoodi M (2019). k-Balanced Center Location problem, Computers and Operations Research, 105:C, (68-84), Online publication date: 1-May-2019.
  167. ACM
    Mäkinen V, Tomescu A, Kuosmanen A, Paavilainen T, Gagie T and Chikhi R (2019). Sparse Dynamic Programming on DAGs with Small Width, ACM Transactions on Algorithms, 15:2, (1-21), Online publication date: 30-Apr-2019.
  168. ACM
    Devasia J, Chandran P, Soman A, Mathew A and Jharwal J Graph sparsification with parallelization to optimize the identification of causal genes and dysregulated pathways Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (747-753)
  169. Madhja A, Nikoletseas S and Voudouris A (2019). Adaptive wireless power transfer in mobile ad hoc networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 152:C, (87-97), Online publication date: 7-Apr-2019.
  170. Că?Linescu G and Wang X (2019). Client assignment problems for latency minimization, Journal of Combinatorial Optimization, 37:3, (889-900), Online publication date: 1-Apr-2019.
  171. Feldmann A (2019). Fixed-Parameter Approximations for k-Center Problems in Low Highway Dimension Graphs, Algorithmica, 81:3, (1031-1052), Online publication date: 1-Mar-2019.
  172. Han K, Gui F, Xiao X, Tang J, He Y, Cao Z and Huang H (2019). Efficient and effective algorithms for clustering uncertain graphs, Proceedings of the VLDB Endowment, 12:6, (667-680), Online publication date: 1-Feb-2019.
  173. ACM
    Hirai H (2018). A Dual Descent Algorithm for Node-capacitated Multiflow Problems and Its Applications, ACM Transactions on Algorithms, 15:1, (1-24), Online publication date: 31-Jan-2019.
  174. Chen L, Xu L, Xu S, Gao Z and Shi W Election with bribed voter uncertainty Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence and Thirty-First Innovative Applications of Artificial Intelligence Conference and Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, (2572-2579)
  175. ACM
    Kuhnle A, Crawford V and Thai M (2018). Network Resilience and the Length-Bounded Multicut Problem, ACM SIGMETRICS Performance Evaluation Review, 46:1, (81-83), Online publication date: 17-Jan-2019.
  176. Friggstad Z, Khodamoradi K and Salavatipour M Exact algorithms and lower bounds for stable instances of euclidean k-means Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, (2958-2972)
  177. Bauer U and Rathod A Hardness of approximation for morse matching Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, (2663-2674)
  178. Chen Y, Ye Y and Wang M (2021). Approximation hardness for a class of sparse optimization problems, The Journal of Machine Learning Research, 20:1, (1407-1433), Online publication date: 1-Jan-2019.
  179. Chatzieleftheriou L, Karaliopoulos M and Koutsopoulos I (2018). Jointly Optimizing Content Caching and Recommendations in Small Cell Networks, IEEE Transactions on Mobile Computing, 18:1, (125-138), Online publication date: 1-Jan-2019.
  180. Ito T, Kakimura N, Kamiyama N, Kobayashi Y and Okamoto Y (2019). Minimum-Cost b-Edge Dominating Sets on Trees, Algorithmica, 81:1, (343-366), Online publication date: 1-Jan-2019.
  181. ACM
    Dumitrescu A (2018). Computational Geometry Column 68, ACM SIGACT News, 49:4, (46-54), Online publication date: 15-Dec-2018.
  182. Molkaraie M and Gómez V (2018). Monte Carlo Methods for the Ferromagnetic Potts Model Using Factor Graph Duality, IEEE Transactions on Information Theory, 64:12, (7449-7464), Online publication date: 1-Dec-2018.
  183. Briheche Y, Barbaresco F, Bennis F and Chablat D (2018). Theoretical Complexity of Grid Cover Problems Used in Radar Applications, Journal of Optimization Theory and Applications, 179:3, (1086-1106), Online publication date: 1-Dec-2018.
  184. Heinen T, Nguyen N, Nguyen T and Rothe J (2018). Approximation and complexity of the optimization and existence problems for maximin share, proportional share, and minimax share allocation of indivisible goods, Autonomous Agents and Multi-Agent Systems, 32:6, (741-778), Online publication date: 1-Nov-2018.
  185. Alavi S and Jabbarzadeh A (2018). Supply chain network design using trade credit and bank credit, Computers and Industrial Engineering, 125:C, (69-86), Online publication date: 1-Nov-2018.
  186. Maini P, Gupta G, Tokekar P and Sujit P Visibility-Based Monitoring of a Path Using a Heterogeneous Robot Team 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (3765-3770)
  187. ACM
    Thapper J and Živný S (2018). The Limits of SDP Relaxations for General-Valued CSPs, ACM Transactions on Computation Theory, 10:3, (1-22), Online publication date: 30-Sep-2018.
  188. Bachrach Y, Elkind E, Malizia E, Meir R, Pasechnik D, Rosenschein J, Rothe J and Zuckerman M (2019). Bounds on the cost of stabilizing a cooperative game, Journal of Artificial Intelligence Research, 63:1, (987-1023), Online publication date: 1-Sep-2018.
  189. Bhattacharya S, Henzinger M and Italiano G (2018). Dynamic algorithms via the primal-dual method, Information and Computation, 261:P2, (219-239), Online publication date: 1-Aug-2018.
  190. Ben-Ameur W, Glorieux A and Neto J (2018). Complete formulations of polytopes related to extensions of assignment matrices, Discrete Optimization, 29:C, (133-147), Online publication date: 1-Aug-2018.
  191. Sarkar K, Colbourn C, Bonis A and Vaccaro U (2018). Partial Covering Arrays, Theory of Computing Systems, 62:6, (1470-1489), Online publication date: 1-Aug-2018.
  192. Rouhani S, Rahman T and Gogate V Algorithms for the nearest assignment problem Proceedings of the 27th International Joint Conference on Artificial Intelligence, (5096-5102)
  193. ACM
    Harvey N, Liaw C and Liu P Greedy and Local Ratio Algorithms in the MapReduce Model Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures, (43-52)
  194. Beynier A, Chevaleyre Y, Gourvès L, Lesca J, Maudet N and Wilczynski A Local Envy-Freeness in House Allocation Problems Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (292-300)
  195. Ueda S, Iwasaki A, Conitzer V, Ohta N, Sakurai Y and Yokoo M (2018). Coalition structure generation in cooperative games with compact representations, Autonomous Agents and Multi-Agent Systems, 32:4, (503-533), Online publication date: 1-Jul-2018.
  196. ACM
    Zhang J, Wu W and Lui J On the Theory of Function Placement and Chaining for Network Function Virtualization Proceedings of the Eighteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, (91-100)
  197. ACM
    Gorgi A, El Ouali M, Hachimi M and Krit S Randomized algorithm for the partial set multicover problem Proceedings of the Fourth International Conference on Engineering & MIS 2018, (1-8)
  198. ACM
    Grochow J and Wolpert D (2018). Beyond Number of Bit Erasures, ACM SIGACT News, 49:2, (33-56), Online publication date: 13-Jun-2018.
  199. ACM
    Kuhnle A, Crawford V and Thai M Network Resilience and the Length-Bounded Multicut Problem Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems, (81-83)
  200. ACM
    Chakaravarthy V, Choi J, Joseph D, Murali P, Pandian S, Sabharwal Y and Sreedhar D On Optimizing Distributed Tucker Decomposition for Sparse Tensors Proceedings of the 2018 International Conference on Supercomputing, (374-384)
  201. Chodpathumwan Y, Vakilian A, Termehchy A and Nayyeri A (2018). Cost-effective conceptual design using taxonomies, The VLDB Journal — The International Journal on Very Large Data Bases, 27:3, (369-394), Online publication date: 1-Jun-2018.
  202. Asahiro Y, Doi Y, Miyano E, Samizo K and Shimizu H (2018). Optimal Approximation Algorithms for Maximum Distance-Bounded Subgraph Problems, Algorithmica, 80:6, (1834-1856), Online publication date: 1-Jun-2018.
  203. ACM
    Morse J, Kerrison S and Eder K (2018). On the Limitations of Analyzing Worst-Case Dynamic Energy of Processing, ACM Transactions on Embedded Computing Systems, 17:3, (1-22), Online publication date: 31-May-2018.
  204. ACM
    Calautti M, Libkin L and Pieris A An Operational Approach to Consistent Query Answering Proceedings of the 37th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (239-251)
  205. ACM
    Tang J, Tang X, Xiao X and Yuan J Online Processing Algorithms for Influence Maximization Proceedings of the 2018 International Conference on Management of Data, (991-1005)
  206. Yang F and Chakraborty N Algorithm for Optimal Chance Constrained Knapsack Problem with Applications to Multi-Robot Teaming 2018 IEEE International Conference on Robotics and Automation (ICRA), (1043-1049)
  207. Sung Y, Budhiraja A, Williams R and Tokekar P Distributed Simultaneous Action and Target Assignment for Multi-Robot Multi-Target Tracking 2018 IEEE International Conference on Robotics and Automation (ICRA), (1-9)
  208. Fotakis D, Krysta P and Ventre C (2019). The power of verification for greedy mechanism design, Journal of Artificial Intelligence Research, 62:1, (459-488), Online publication date: 1-May-2018.
  209. Abdi A, Fukasawa R and Sanità L (2018). Opposite Elements in Clutters, Mathematics of Operations Research, 43:2, (428-459), Online publication date: 1-May-2018.
  210. Li S, Markarian C and Meyer Auf Der Heide F (2018). Towards Flexible Demands in Online Leasing Problems, Algorithmica, 80:5, (1556-1574), Online publication date: 1-May-2018.
  211. Zhang P, Xu Y, Jiang T, Li A, Lin G and Miyano E (2018). Improved Approximation Algorithms for the Maximum Happy Vertices and Edges Problems, Algorithmica, 80:5, (1412-1438), Online publication date: 1-May-2018.
  212. Ren X, London P, Ziani J, Wierman A, London P, Ziani J, Wierman A and Ren X (2018). Datum, IEEE/ACM Transactions on Networking, 26:2, (893-905), Online publication date: 1-Apr-2018.
  213. Gong W, Liu H, Liu J, Fan X, Liu K, Ma Q, Ji X, Liu K, Liu J, Fan X, Ma Q, Liu H, Gong W and Ji X (2018). Channel-Aware Rate Adaptation for Backscatter Networks, IEEE/ACM Transactions on Networking, 26:2, (751-764), Online publication date: 1-Apr-2018.
  214. Ogino N, Kitahara T, Arakawa S, Hasegawa G and Murata M (2018). Lightweight Boolean Network Tomography Based on Partition of Managed Networks, Journal of Network and Systems Management, 26:2, (284-313), Online publication date: 1-Apr-2018.
  215. Das A, Fleszar K, Kobourov S, Spoerhase J, Veeramoni S and Wolff A (2018). Approximating the Generalized Minimum Manhattan Network Problem, Algorithmica, 80:4, (1170-1190), Online publication date: 1-Apr-2018.
  216. ACM
    Boyar J, Favrholdt L, Kudahl C, Larsen K and Mikkelsen J (2017). Online Algorithms with Advice, ACM Computing Surveys, 50:2, (1-34), Online publication date: 31-Mar-2018.
  217. Das Gupta B, Karpinski M, Mobasheri N and Yahyanejad F (2018). Effect of Gromov-Hyperbolicity Parameter on Cuts and Expansions in Graphs and Some Algorithmic Implications, Algorithmica, 80:2, (772-800), Online publication date: 1-Feb-2018.
  218. Mansour Y, Patt-Shamir B and Vardi S (2018). Constant-Time Local Computation Algorithms, Theory of Computing Systems, 62:2, (249-267), Online publication date: 1-Feb-2018.
  219. (2018). Domination parameters with number 2, Discrete Applied Mathematics, 235:C, (23-50), Online publication date: 30-Jan-2018.
  220. Zhang P, Fu B and Tang L (2018). Simpler and Better Approximation Algorithms for the Unweighted Minimum Label s-t Cut Problem, Algorithmica, 80:1, (398-409), Online publication date: 1-Jan-2018.
  221. ACM
    Pham C, Dinh H, Nguyen H, Dang H and Hoang H Limiting the Spread of Epidemics within Time Constraint on Online Social Networks Proceedings of the 8th International Symposium on Information and Communication Technology, (262-269)
  222. ACM
    Hall L, Harris B, Tomes E and Altiparmak N Big Data Aware Virtual Machine Placement in Cloud Data Centers Proceedings of the Fourth IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, (209-218)
  223. Ceccarello M, Fantozzi C, Pietracaprina A, Pucci G and Vandin F (2017). Clustering uncertain graphs, Proceedings of the VLDB Endowment, 11:4, (472-484), Online publication date: 1-Dec-2017.
  224. Ceccarello M, Fantozzi C, Pietracaprina A, Pucci G and Vandin F (2018). Clustering uncertain graphs, Proceedings of the VLDB Endowment, 11:4, (472-484), Online publication date: 1-Dec-2017.
  225. Skowron P (2017). FPT approximation schemes for maximizing submodular functions, Information and Computation, 257:C, (65-78), Online publication date: 1-Dec-2017.
  226. Ge D, He R and He S (2017). An improved algorithm for the $$L_2$$L2---$$L_p$$Lp minimization problem, Mathematical Programming: Series A and B, 166:1-2, (131-158), Online publication date: 1-Nov-2017.
  227. Tu J (2017). Efficient algorithm for the vertex cover Pk problem on cacti, Applied Mathematics and Computation, 311:C, (217-222), Online publication date: 15-Oct-2017.
  228. Li J, Zhu Y, Hua Y and Yu J (2017). Crowdsourcing Sensing to Smartphones: A Randomized Auction Approach, IEEE Transactions on Mobile Computing, 16:10, (2764-2777), Online publication date: 1-Oct-2017.
  229. Zhang S, Qian Z, Wu J, Kong F and Lu S (2017). Optimizing Itinerary Selection and Charging Association for Mobile Chargers, IEEE Transactions on Mobile Computing, 16:10, (2833-2846), Online publication date: 1-Oct-2017.
  230. Garcia-Diaz J, Sanchez-Hernandez J, Menchaca-Mendez R and Menchaca-Mendez R (2017). When a worse approximation factor gives better performance, Journal of Heuristics, 23:5, (349-366), Online publication date: 1-Oct-2017.
  231. ACM
    Kuhnle A, Pan T, Crawford V, Alim M and Thai M (2017). Pseudo-Separation for Assessment of Structural Vulnerability of a Network, ACM SIGMETRICS Performance Evaluation Review, 45:1, (13-14), Online publication date: 18-Sep-2017.
  232. ACM
    Nguyen H, Ghosh P, Mayo M and Dinh T (2017). Social Influence Spectrum at Scale, ACM Transactions on Information Systems, 36:2, (1-26), Online publication date: 15-Sep-2017.
  233. Chaturvedi M and Srivastava S (2017). Multi-Modal Design of an Intelligent Transportation System, IEEE Transactions on Intelligent Transportation Systems, 18:8, (2017-2027), Online publication date: 1-Aug-2017.
  234. Evrendilek C, Toroslu I and Hashemikhabir S (2017). Task assignment in tree-like hierarchical structures, Journal of Combinatorial Optimization, 34:2, (631-655), Online publication date: 1-Aug-2017.
  235. Bonato A, Pérez-Giménez X, Prałat P and Reiniger B (2017). The Game of Overprescribed Cops and Robbers Played on Graphs, Graphs and Combinatorics, 33:4, (801-815), Online publication date: 1-Jul-2017.
  236. ACM
    Qin C and Rusu F Dot-Product Join Proceedings of the 29th International Conference on Scientific and Statistical Database Management, (1-12)
  237. ACM
    Kuhnle A, Pan T, Crawford V, Alim M and Thai M Pseudo-Separation for Assessment of Structural Vulnerability of a Network Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, (13-14)
  238. (2017). Mining smartphone data for app usage prediction and recommendations, Pervasive and Mobile Computing, 37:C, (1-22), Online publication date: 1-Jun-2017.
  239. Stamoulis G (2017). The multi-budgeted and weighted bounded degree metric Steiner network problem, Journal of Parallel and Distributed Computing, 104:C, (36-48), Online publication date: 1-Jun-2017.
  240. Schmiedl F (2017). Computational Aspects of the Gromov---Hausdorff Distance and its Application in Non-rigid Shape Matching, Discrete & Computational Geometry, 57:4, (854-880), Online publication date: 1-Jun-2017.
  241. Chepoi V, Estellon B and Naves G (2017). Packing and Covering with Balls on Busemann Surfaces, Discrete & Computational Geometry, 57:4, (985-1011), Online publication date: 1-Jun-2017.
  242. ACM
    Li Y, Fan J, Zhang D and Tan K Discovering Your Selling Points Proceedings of the 2017 ACM International Conference on Management of Data, (619-634)
  243. ACM
    Arora A, Galhotra S and Ranu S Debunking the Myths of Influence Maximization Proceedings of the 2017 ACM International Conference on Management of Data, (651-666)
  244. Huang K, Wang S, Bevilacqua G, Xiao X and Lakshmanan L (2017). Revisiting the stop-and-stare algorithms for influence maximization, Proceedings of the VLDB Endowment, 10:9, (913-924), Online publication date: 1-May-2017.
  245. Zhu F, Xiao B, Liu J, Wang B, Pan Q and Chen L (2017). Exploring Tag Distribution in Multi-Reader RFID Systems, IEEE Transactions on Mobile Computing, 16:5, (1300-1314), Online publication date: 1-May-2017.
  246. Champati J and Liang B (2017). Semi-Online Algorithms for Computational Task Offloading with Communication Delay, IEEE Transactions on Parallel and Distributed Systems, 28:4, (1189-1201), Online publication date: 1-Apr-2017.
  247. Xu W, Liang W, Peng J, Liu Y and Wang Y (2017). Maximizing Charging Satisfaction of Smartphone Users via Wireless Energy Transfer, IEEE Transactions on Mobile Computing, 16:4, (990-1004), Online publication date: 1-Apr-2017.
  248. Le T and Duan Y (2017). A primitive-based 3D segmentation algorithm for mechanical CAD models, Computer Aided Geometric Design, 52:C, (231-246), Online publication date: 1-Mar-2017.
  249. Xu H, Qiao C, Deng H, Lin N and Huang L (2017). Shared relay assignment in cooperative communications for bandwidth maximization, Wireless Networks, 23:2, (553-566), Online publication date: 1-Feb-2017.
  250. Ran Y, Zhang Z, Du H and Zhu Y (2017). Approximation algorithm for partial positive influence problem in social network, Journal of Combinatorial Optimization, 33:2, (791-802), Online publication date: 1-Feb-2017.
  251. Agrawal A, Lokshtanov D, Misra P, Saurabh S and Zehavi M Feedback vertex set inspired kernel for chordal vertex deletion Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, (1383-1398)
  252. Průša D and Werner T LP relaxations of some NP-hard problems are as hard as any LP Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, (1372-1382)
  253. Dütting P and Kesselheim T Best-response dynamics in combinatorial auctions with item bidding Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, (521-533)
  254. Wang X, Chen X, Yuen C, Wu W, Zhang M and Zhan C (2017). Delay-cost tradeoff for virtual machine migration in cloud data centers, Journal of Network and Computer Applications, 78:C, (62-72), Online publication date: 15-Jan-2017.
  255. ACM
    Pourhassan M, Friedrich T and Neumann F On the Use of the Dual Formulation for Minimum Weighted Vertex Cover in Evolutionary Algorithms Proceedings of the 14th ACM/SIGEVO Conference on Foundations of Genetic Algorithms, (37-44)
  256. ACM
    Parter M and Peleg D (2016). Sparse Fault-Tolerant BFS Structures, ACM Transactions on Algorithms, 13:1, (1-24), Online publication date: 21-Dec-2016.
  257. ACM
    Emek Y and Rosén A (2016). Semi-Streaming Set Cover, ACM Transactions on Algorithms, 13:1, (1-22), Online publication date: 21-Dec-2016.
  258. Skowron P FPT Approximation Schemes for Maximizing Submodular Functions Proceedings of the 12th International Conference on Web and Internet Economics - Volume 10123, (324-338)
  259. San Felice M, Williamson D and Lee O (2016). A Randomized $$\mathrm {O}(\log n)$$O(logn)-Competitive Algorithm for the Online Connected Facility Location Problem, Algorithmica, 76:4, (1139-1157), Online publication date: 1-Dec-2016.
  260. ACM
    Popa B Innovative Computing Systems in Volume Rendering for the Medical Images Proceedings of the 20th Pan-Hellenic Conference on Informatics, (1-4)
  261. ACM
    De Matteis T and Mencagli G (2016). Keep calm and react with foresight, ACM SIGPLAN Notices, 51:8, (1-12), Online publication date: 9-Nov-2016.
  262. ACM
    Chan S, Lee J, Raghavendra P and Steurer D (2016). Approximate Constraint Satisfaction Requires Large LP Relaxations, Journal of the ACM, 63:4, (1-22), Online publication date: 8-Nov-2016.
  263. Farhad S, Nayeem M, Rahman M and Rahman M (2016). Mapping stream programs onto multicore platforms by local search and genetic algorithm, Computer Languages, Systems and Structures, 46:C, (182-205), Online publication date: 1-Nov-2016.
  264. ACM
    Song C, Hsu W and Lee M Targeted Influence Maximization in Social Networks Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, (1683-1692)
  265. Sela Perelman L, Abbas W, Koutsoukos X and Amin S (2016). Sensor placement for fault location identification in water networks, Automatica (Journal of IFAC), 72:C, (166-176), Online publication date: 1-Oct-2016.
  266. Tang Y, Richard J and Smith J (2016). A class of algorithms for mixed-integer bilevel min---max optimization, Journal of Global Optimization, 66:2, (225-262), Online publication date: 1-Oct-2016.
  267. Gharib M, Yousefi’zadeh H and Movaghar A (2016). Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach, IEEE Transactions on Mobile Computing, 15:9, (2333-2344), Online publication date: 1-Sep-2016.
  268. Tan H, Liang H, Wang R and Zhou J (2016). Computing Roman domatic number of graphs, Information Processing Letters, 116:9, (554-559), Online publication date: 1-Sep-2016.
  269. Gørtz I and Nagarajan V (2016). Locating depots for capacitated vehicle routing, Networks, 68:2, (94-103), Online publication date: 1-Sep-2016.
  270. ACM
    Gál A, Jang J, Limaye N, Mahajan M and Sreenivasaiah K (2016). Space-Efficient Approximations for Subset Sum, ACM Transactions on Computation Theory, 8:4, (1-28), Online publication date: 26-Jul-2016.
  271. Bhatt H, Rajkumar A and Roy S Multi-source iterative adaptation for cross-domain classification Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (3691-3697)
  272. Gopalakrishnan R, Biswas A, Lightwala A, Vasudevan S, Dutta P and Tripathi A Demand prediction and placement optimization for electric vehicle charging stations Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (3117-3123)
  273. Taylor R (2016). Approximation of the Quadratic Knapsack Problem, Operations Research Letters, 44:4, (495-497), Online publication date: 1-Jul-2016.
  274. Liu Y, Ma S, Dai Y and Zhang S (2016). A smoothing SQP framework for a class of composite $$L_q$$Lq minimization over polyhedron, Mathematical Programming: Series A and B, 158:1-2, (467-500), Online publication date: 1-Jul-2016.
  275. Kincaid R, Kunkler S, Lamar M and Phillips D (2016). Algorithms and complexity results for finding graphs with extremal Randić index, Networks, 67:4, (338-347), Online publication date: 1-Jul-2016.
  276. ACM
    Song S, Zhu H and Wang J Constraint-Variance Tolerant Data Repairing Proceedings of the 2016 International Conference on Management of Data, (877-892)
  277. ACM
    Huang W and Chen J Utilization bounds on allocating rate-monotonic scheduled multi-mode tasks on multiprocessor systems Proceedings of the 53rd Annual Design Automation Conference, (1-6)
  278. Bansal N and Nagarajan V Approximation-Friendly Discrepancy Rounding Proceedings of the 18th International Conference on Integer Programming and Combinatorial Optimization - Volume 9682, (375-386)
  279. ACM
    Wu F, Hsu H, Shen C and Tseng Y (2016). Range-Free Mobile Actor Relocation in a Two-Tiered Wireless Sensor and Actor Network, ACM Transactions on Sensor Networks, 12:2, (1-40), Online publication date: 12-May-2016.
  280. Xie Q, Zhang X, Li Z and Zhou X (2016). Optimizing Cost of Continuous Overlapping Queries over Data Streams by Filter Adaption, IEEE Transactions on Knowledge and Data Engineering, 28:5, (1258-1271), Online publication date: 1-May-2016.
  281. Fukunaga T (2016). Covering problems in edge- and node-weighted graphs, Discrete Optimization, 20:C, (40-61), Online publication date: 1-May-2016.
  282. Mikhailyuk V (2016). Hardness of Reoptimization of the Problem of Calculating the Chromatic Number of a Graph with a Given Set of Optimal Solutions, Cybernetics and Systems Analysis, 52:3, (371-378), Online publication date: 1-May-2016.
  283. ACM
    Wu R, Xiao X, Cheung S, Zhang H and Zhang C (2016). Casper: an efficient approach to call trace collection, ACM SIGPLAN Notices, 51:1, (678-690), Online publication date: 8-Apr-2016.
  284. Shin D, He S and Zhang J (2016). Robust and cost-effective design of cyber-physical systems, IEEE/ACM Transactions on Networking, 24:2, (1081-1094), Online publication date: 1-Apr-2016.
  285. Ruan Z, Luo H and Chen Z (2016). Improving reliability of erasure codes-based storage paradigm under correlated failures for wireless sensor networks, International Journal of Communication Systems, 29:5, (992-1011), Online publication date: 25-Mar-2016.
  286. ACM
    Dütting P, Kesselheim T and Tardos É (2016). Algorithms as mechanisms, ACM SIGecom Exchanges, 14:2, (22-25), Online publication date: 16-Mar-2016.
  287. ACM
    Jatana N, Suri B, Kumar P and Wadhwa B Test Suite Reduction by Mutation Testing Mapped to Set Cover Problem Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, (1-6)
  288. Stein O (2016). Error bounds for mixed integer linear optimization problems, Mathematical Programming: Series A and B, 156:1-2, (101-123), Online publication date: 1-Mar-2016.
  289. ACM
    De Matteis T and Mencagli G Keep calm and react with foresight Proceedings of the 21st ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, (1-12)
  290. Kamei S, Izumi T and Yamauchi Y (2016). An asynchronous self-stabilizing approximation for the minimum CDS with safe convergence in UDGs, Theoretical Computer Science, 615:C, (102-119), Online publication date: 15-Feb-2016.
  291. ACM
    Babaei M, Grabowicz P, Valera I, Gummadi K and Gomez-Rodriguez M On the Efficiency of the Information Networks in Social Media Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, (83-92)
  292. Fan W, Wang X and Wu Y (2016). Answering Pattern Queries Using Views, IEEE Transactions on Knowledge and Data Engineering, 28:2, (326-341), Online publication date: 1-Feb-2016.
  293. ACM
    Wu R, Xiao X, Cheung S, Zhang H and Zhang C Casper: an efficient approach to call trace collection Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, (678-690)
  294. Chen A, Harris D and Srinivasan A Partial resampling to approximate covering integer programs Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (1984-2003)
  295. Chakrabarti A and Wirth A Incidence geometries and the pass complexity of semi-streaming set cover Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (1365-1373)
  296. Chekuri C and Madan V Simple and fast rounding algorithms for directed and node-weighted multiway cut Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (797-807)
  297. Driemel A, Krivošija A and Sohler C Clustering time series under the fréachet distance Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (766-785)
  298. Sharpnack J, Rinaldo A and Singh A (2015). Detecting Anomalous Activity on Networks With the Graph Fourier Scan Statistic, IEEE Transactions on Signal Processing, 64:2, (364-379), Online publication date: 1-Jan-2016.
  299. Shi Y, Zhang Y, Zhang Z and Wu W (2016). A greedy algorithm for the minimum $$2$$2-connected $$m$$m-fold dominating set problem, Journal of Combinatorial Optimization, 31:1, (136-151), Online publication date: 1-Jan-2016.
  300. Sen A, Mazumder A, Banerjee S, Das A, Zhou C and Shirazipourazad S (2015). Region-based fault-tolerant distributed file storage system design in networks, Networks, 66:4, (380-395), Online publication date: 1-Dec-2015.
  301. ACM
    Yan M, Sun H and Liu X Efficient Testing of Web Services with Mobile Crowdsourcing Proceedings of the 7th Asia-Pacific Symposium on Internetware, (157-165)
  302. ACM
    Zhou Y, Yin K, Huang H, Zhang H, Gong M and Cohen-Or D (2015). Generalized cylinder decomposition, ACM Transactions on Graphics, 34:6, (1-14), Online publication date: 4-Nov-2015.
  303. Mazumdar A (2015). Storage Capacity of Repairable Networks, IEEE Transactions on Information Theory, 61:11, (5810-5821), Online publication date: 1-Nov-2015.
  304. Bujtás C and Tuza Z (2015). Approximability of the upper chromatic number of hypergraphs, Discrete Mathematics, 338:10, (1714-1721), Online publication date: 6-Oct-2015.
  305. Kloudas K, Mamede M, Preguiça N and Rodrigues R (2015). Pixida, Proceedings of the VLDB Endowment, 9:2, (72-83), Online publication date: 1-Oct-2015.
  306. Sadoghi M, Jergler M, Jacobsen H, Hull R and Vaculin R (2015). Safe Distribution and Parallel Execution of Data-Centric Workflows over the Publish/Subscribe Abstraction, IEEE Transactions on Knowledge and Data Engineering, 27:10, (2824-2838), Online publication date: 1-Oct-2015.
  307. Hanying Zheng and Xueyan Tang (2015). Analysis of Server Provisioning for Distributed Interactive Applications, IEEE Transactions on Computers, 64:10, (2752-2766), Online publication date: 1-Oct-2015.
  308. Zhang S, Liu X, Wang J, Cao J and Min G (2015). Energy-efficient active tag searching in large scale RFID systems, Information Sciences: an International Journal, 317:C, (143-156), Online publication date: 1-Oct-2015.
  309. Worah P (2015). Rank bounds for a hierarchy of Lovász and Schrijver, Journal of Combinatorial Optimization, 30:3, (689-709), Online publication date: 1-Oct-2015.
  310. Nehama I Complexity of Optimal Lobbying in Threshold Aggregation Proceedings of the 4th International Conference on Algorithmic Decision Theory - Volume 9346, (379-395)
  311. Pagani S, Jian-Jia Chen and Henkel J (2015). Energy and Peak Power Efficiency Analysis for the Single Voltage Approximation (SVA) Scheme, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34:9, (1415-1428), Online publication date: 1-Sep-2015.
  312. Arslan M, Singh I, Singh S, Madhyastha H, Sundaresan K and Krishnamurthy S (2015). CWC: A Distributed Computing Infrastructure Using Smartphones, IEEE Transactions on Mobile Computing, 14:8, (1587-1600), Online publication date: 1-Aug-2015.
  313. Krysta P, Telelis O and Ventre C Near-optimal approximation mechanisms for multi-unit combinatorial auctions Proceedings of the 24th International Conference on Artificial Intelligence, (4275-4281)
  314. Xia Y, Li H, Qin T, Yu N and Liu T Thompson sampling for budgeted multi-armed bandits Proceedings of the 24th International Conference on Artificial Intelligence, (3960-3966)
  315. Wu X, Sheldon D and Zilberstein S FAST combinatorial algorithm for optimizing the spread of cascades Proceedings of the 24th International Conference on Artificial Intelligence, (2655-2661)
  316. Oliehoek F, Spaan M and Witwicki S Factored upper bounds for multiagent planning problems under uncertainty with non-factored value functions Proceedings of the 24th International Conference on Artificial Intelligence, (1645-1651)
  317. ACM
    Parter M Dual Failure Resilient BFS Structure Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, (481-490)
  318. Stamoulis G Approximation Algorithms for Multi-budgeted Network Design Problems Post-Proceedings of the 22nd International Colloquium on Structural Information and Communication Complexity - Volume 9439, (135-148)
  319. ACM
    Gao W, Pourhassan M and Neumann F Runtime Analysis of Evolutionary Diversity Optimization and the Vertex Cover Problem Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1395-1396)
  320. Feldmann A Fixed Parameter Approximations for k-Center Problems in Low Highway Dimension Graphs Proceedings, Part II, of the 42nd International Colloquium on Automata, Languages, and Programming - Volume 9135, (588-600)
  321. Chattopadhyay A and Rudra A The Range of Topological Effects on Communication Proceedings, Part II, of the 42nd International Colloquium on Automata, Languages, and Programming - Volume 9135, (540-551)
  322. Sadi Y and Coleri Ergen S (2015). Energy and Delay Constrained Maximum Adaptive Schedule for Wireless Networked Control Systems, IEEE Transactions on Wireless Communications, 14:7, (3738-3751), Online publication date: 1-Jul-2015.
  323. Arora C, Banerjee S, Kalra P and Maheshwari S (2015). Generalized Flows for Optimal Inference in Higher Order MRF-MAP, IEEE Transactions on Pattern Analysis and Machine Intelligence, 37:7, (1323-1335), Online publication date: 1-Jul-2015.
  324. Meng Zhang , Hongbin Luo and Hongke Zhang (2015). A Survey of Caching Mechanisms in Information-Centric Networking, IEEE Communications Surveys & Tutorials, 17:3, (1473-1499), Online publication date: 1-Jul-2015.
  325. ACM
    Avigdor-Elgrabli N and Rabani Y (2015). An Improved Competitive Algorithm for Reordering Buffer Management, ACM Transactions on Algorithms, 11:4, (1-15), Online publication date: 23-Jun-2015.
  326. ACM
    Azar Y, Kalp-Shaltiel I, Lucier B, Menache I, Naor J and Yaniv J Truthful Online Scheduling with Commitments Proceedings of the Sixteenth ACM Conference on Economics and Computation, (715-732)
  327. ACM
    Dütting P, Kesselheim T and Tardos E Algorithms as Mechanisms Proceedings of the Sixteenth ACM Conference on Economics and Computation, (187-201)
  328. ACM
    Lee J, Raghavendra P and Steurer D Lower Bounds on the Size of Semidefinite Programming Relaxations Proceedings of the forty-seventh annual ACM symposium on Theory of Computing, (567-576)
  329. ACM
    Ceccarello M, Pietracaprina A, Pucci G and Upfal E Space and Time Efficient Parallel Graph Decomposition, Clustering, and Diameter Approximation Proceedings of the 27th ACM symposium on Parallelism in Algorithms and Architectures, (182-191)
  330. ACM
    Venkataramani S, Chakradhar S, Roy K and Raghunathan A Approximate computing and the quest for computing efficiency Proceedings of the 52nd Annual Design Automation Conference, (1-6)
  331. Li Y, Zhang D and Tan K (2015). Real-time targeted influence maximization for online advertisements, Proceedings of the VLDB Endowment, 8:10, (1070-1081), Online publication date: 1-Jun-2015.
  332. ACM
    Tang Y, Shi Y and Xiao X Influence Maximization in Near-Linear Time Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (1539-1554)
  333. ACM
    Feldman M, Lewin-Eytan L and Naor J (2015). Hedonic Clustering Games, ACM Transactions on Parallel Computing, 2:1, (1-48), Online publication date: 21-May-2015.
  334. Baeza-Yates R, Boldi P and Chierichetti F Essential Web Pages Are Easy to Find Proceedings of the 24th International Conference on World Wide Web, (97-107)
  335. Oliehoek F, Spaan M and Witwicki S Influence-Optimistic Local Values for Multiagent Planning Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (1703-1704)
  336. Kao M, Chen H and Lee D (2015). Capacitated Domination, Algorithmica, 72:1, (1-43), Online publication date: 1-May-2015.
  337. ACM
    Chaudhry M, Ling T, Manzoor A, Hussain S and Kim J (2015). Thermal-Aware Scheduling in Green Data Centers, ACM Computing Surveys, 47:3, (1-48), Online publication date: 16-Apr-2015.
  338. Thanh-Son Nguyen , Lauw H and Tsaparas P (2015). Review Selection Using Micro-Reviews, IEEE Transactions on Knowledge and Data Engineering, 27:4, (1098-1111), Online publication date: 1-Apr-2015.
  339. Lerman G, Mccoy M, Tropp J and Zhang T (2015). Robust Computation of Linear Models by Convex Relaxation, Foundations of Computational Mathematics, 15:2, (363-410), Online publication date: 1-Apr-2015.
  340. ACM
    Anagnostopoulos A, Becchetti L, Bordino I, Leonardi S, Mele I and Sankowski P (2015). Stochastic Query Covering for Fast Approximate Document Retrieval, ACM Transactions on Information Systems, 33:3, (1-35), Online publication date: 23-Mar-2015.
  341. Venkataramani S, Chakradhar S, Roy K and Raghunathan A Computing approximately, and efficiently Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, (748-751)
  342. ACM
    Singh M and Lau L (2015). Approximating Minimum Bounded Degree Spanning Trees to within One of Optimal, Journal of the ACM, 62:1, (1-19), Online publication date: 2-Mar-2015.
  343. Sheng Zhang , Jie Wu and Sanglu Lu (2015). Collaborative Mobile Charging, IEEE Transactions on Computers, 64:3, (654-667), Online publication date: 1-Mar-2015.
  344. Wenzheng Xu , Weifa Liang and Xiaola Lin (2015). Approximation Algorithms for Min-Max Cycle Cover Problems, IEEE Transactions on Computers, 64:3, (600-613), Online publication date: 1-Mar-2015.
  345. Kuhlman C, Anil Kumar V, Marathe M, Ravi S and Rosenkrantz D (2015). Inhibiting diffusion of complex contagions in social networks: theoretical and experimental results, Data Mining and Knowledge Discovery, 29:2, (423-465), Online publication date: 1-Mar-2015.
  346. ACM
    Grandl R, Ananthanarayanan G, Kandula S, Rao S and Akella A (2014). Multi-resource packing for cluster schedulers, ACM SIGCOMM Computer Communication Review, 44:4, (455-466), Online publication date: 25-Feb-2015.
  347. ACM
    Moshref M, Yu M, Govindan R and Vahdat A (2014). DREAM, ACM SIGCOMM Computer Communication Review, 44:4, (419-430), Online publication date: 25-Feb-2015.
  348. Lambert T, Marchal L and Uçar B (2015). Comments on the hierarchically structured bin packing problem, Information Processing Letters, 115:2, (306-309), Online publication date: 1-Feb-2015.
  349. Agustí-Torra A, Raspall F, Remondo D, Rincón D and Giuliani G (2015). On the feasibility of collaborative green data center ecosystems, Ad Hoc Networks, 25:PB, (565-580), Online publication date: 1-Feb-2015.
  350. Feldmann A and Foschini L (2015). Balanced Partitions of Trees and Applications, Algorithmica, 71:2, (354-376), Online publication date: 1-Feb-2015.
  351. ACM
    Awasthi P, Bandeira A, Charikar M, Krishnaswamy R, Villar S and Ward R Relax, No Need to Round Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, (191-200)
  352. ACM
    Feige U and Jozeph S Separation between Estimation and Approximation Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, (271-276)
  353. Wu C, Du D and Xu D (2015). Primal-dual approximation algorithm for the two-level facility location problem via a dual quasi-greedy approach, Theoretical Computer Science, 562:C, (213-226), Online publication date: 11-Jan-2015.
  354. Di Summa M, Pritchard D and Sanità L (2015). Finding the closest ultrametric, Discrete Applied Mathematics, 180:C, (70-80), Online publication date: 10-Jan-2015.
  355. Guruganesh G, Sanità L and Swamy C Improved region-growing and combinatorial algorithms for k-route cut problems Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (676-695)
  356. ACM
    Mukherjee J and Gupta A Mobility Aware Event Dissemination in VANET Proceedings of the 16th International Conference on Distributed Computing and Networking, (1-9)
  357. Li P, Huang C and Liu Q (2015). Delay bounded roadside unit placement in vehicular ad hoc networks, International Journal of Distributed Sensor Networks, 2015, (77-77), Online publication date: 1-Jan-2015.
  358. Hoque E, Potharaju R, Nita-Rotaru C, Sarkar S and Venkatesh S (2015). Taming epidemic outbreaks in mobile adhoc networks, Ad Hoc Networks, 24:PA, (57-72), Online publication date: 1-Jan-2015.
  359. Nguyen T and Rothe J (2014). Minimizing envy and maximizing average Nash social welfare in the allocation of indivisible goods, Discrete Applied Mathematics, 179:C, (54-68), Online publication date: 31-Dec-2015.
  360. Ventresca M and Aleman D A Region Growing Algorithm for Detecting Critical Nodes Combinatorial Optimization and Applications, (593-602)
  361. Mishra S, Li X, Thai M and Seo J Cascading Critical Nodes Detection with Load Redistribution in Complex Systems Combinatorial Optimization and Applications, (379-394)
  362. Shen Y, Li X and Thai M Approximation Algorithms for Optimization Problems in Random Power-Law Graphs Combinatorial Optimization and Applications, (343-355)
  363. Rocha L and Cardozo E A Hybrid Optimization Model for Green Cloud Computing Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, (11-20)
  364. ACM
    Hu R, Li H, Zhang H and Cohen-Or D (2014). Approximate pyramidal shape decomposition, ACM Transactions on Graphics, 33:6, (1-12), Online publication date: 19-Nov-2014.
  365. ACM
    Yan M, Sun H and Liu X iTest: testing software with mobile crowdsourcing Proceedings of the 1st International Workshop on Crowd-based Software Development Methods and Technologies, (19-24)
  366. ACM
    Gundecha P, Barbier G, Tang J and Liu H (2014). User Vulnerability and Its Reduction on a Social Networking Site, ACM Transactions on Knowledge Discovery from Data, 9:2, (1-25), Online publication date: 17-Nov-2014.
  367. ACM
    Bolzoni P, Helmer S, Wellenzohn K, Gamper J and Andritsos P Efficient itinerary planning with category constraints Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (203-212)
  368. ACM
    Anand A, Mele I, Bedathur S and Berberich K Phrase Query Optimization on Inverted Indexes Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, (1807-1810)
  369. Gupta A and Nagarajan V (2014). Approximating Sparse Covering Integer Programs Online, Mathematics of Operations Research, 39:4, (998-1011), Online publication date: 1-Nov-2014.
  370. Levin A and Yovel U (2014). Local search algorithms for multiple-depot vehicle routing and for multiple traveling salesman problems with proved performance guarantees, Journal of Combinatorial Optimization, 28:4, (726-747), Online publication date: 1-Nov-2014.
  371. ACM
    Eftekhar M, Thirumuruganathan S, Das G and Koudas N Price trade-offs in social media advertising Proceedings of the second ACM conference on Online social networks, (169-176)
  372. Hirai H and Pap G (2014). Tree metrics and edge-disjoint $$S$$S-paths, Mathematical Programming: Series A and B, 147:1-2, (81-123), Online publication date: 1-Oct-2014.
  373. Gollub T, Völske M, Hagen M and Stein B Dynamic taxonomy composition via keyqueries Proceedings of the 14th ACM/IEEE-CS Joint Conference on Digital Libraries, (39-48)
  374. ACM
    Zong B, Wu Y, Song J, Singh A, Cam H, Han J and Yan X Towards scalable critical alert mining Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, (1057-1066)
  375. ACM
    Sintos S and Tsaparas P Using strong triadic closure to characterize ties in social networks Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, (1466-1475)
  376. ACM
    Grandl R, Ananthanarayanan G, Kandula S, Rao S and Akella A Multi-resource packing for cluster schedulers Proceedings of the 2014 ACM conference on SIGCOMM, (455-466)
  377. ACM
    Moshref M, Yu M, Govindan R and Vahdat A DREAM Proceedings of the 2014 ACM conference on SIGCOMM, (419-430)
  378. Ito T, Nakano S, Okamoto Y, Otachi Y, Uehara R, Uno T and Uno Y (2014). A 4.31-approximation for the geometric unique coverage problem on unit disks, Theoretical Computer Science, 544, (14-31), Online publication date: 1-Aug-2014.
  379. Fujita S (2014). Approximation scheme for burst scheduling with minimum overhead in time slicing mobile TV, The Journal of Supercomputing, 69:2, (561-575), Online publication date: 1-Aug-2014.
  380. ACM
    Chai M, Zheng C and Zhou K (2014). A reduced model for interactive hairs, ACM Transactions on Graphics, 33:4, (1-11), Online publication date: 27-Jul-2014.
  381. ACM
    Tang Y, Xiao X and Shi Y Influence maximization Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, (75-86)
  382. Segev D (2014). An Approximate Dynamic-Programming Approach to the Joint Replenishment Problem, Mathematics of Operations Research, 39:2, (432-444), Online publication date: 1-May-2014.
  383. Kumar M, Mishra S, Safina Devi N and Saurabh S (2014). Approximation algorithms for node deletion problems on bipartite graphs with finite forbidden subgraph characterization, Theoretical Computer Science, 526, (90-96), Online publication date: 1-Mar-2014.
  384. ACM
    Caragiannis I, Kaklamanis C, Karanikolas N and Procaccia A (2014). Socially desirable approximations for dodgson’s voting rule, ACM Transactions on Algorithms, 10:2, (1-28), Online publication date: 1-Feb-2014.
  385. Chakravorty A, George T and Sabharwal Y Multicore Parallelization of the PTAS Dynamic Program for the Bin-Packing Problem Proceedings of the 15th International Conference on Distributed Computing and Networking - Volume 8314, (81-95)
  386. Hauser K (2014). The minimum constraint removal problem with three robotics applications, International Journal of Robotics Research, 33:1, (5-17), Online publication date: 1-Jan-2014.
  387. Alamdari S, Fata E and Smith S (2014). Persistent monitoring in discrete environments, International Journal of Robotics Research, 33:1, (138-154), Online publication date: 1-Jan-2014.
  388. ACM
    Bansal N, Friggstad Z, Khandekar R and Salavatipour M (2014). A logarithmic approximation for unsplittable flow on line graphs, ACM Transactions on Algorithms, 10:1, (1-15), Online publication date: 1-Jan-2014.
  389. ACM
    Kang N, Liu Z, Rexford J and Walker D Optimizing the "one big switch" abstraction in software-defined networks Proceedings of the ninth ACM conference on Emerging networking experiments and technologies, (13-24)
  390. Einzinger P, Popper N, Breitenecker F, Pfeffer N, Jung R and Endel G The GAP-DRG model Proceedings of the 2013 Winter Simulation Conference: Simulation: Making Decisions in a Complex World, (2299-2308)
  391. Liang H (2013). On the k-edge-incident subgraph problem and its variants, Discrete Applied Mathematics, 161:18, (2985-2991), Online publication date: 1-Dec-2013.
  392. ACM
    Bellur U Online, deviation-constrained capacitated vehicle routing Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (416-419)
  393. ACM
    Xu W, Chow C and Zhang J CALBA Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (364-373)
  394. ACM
    Hillar C and Lim L (2013). Most Tensor Problems Are NP-Hard, Journal of the ACM, 60:6, (1-39), Online publication date: 1-Nov-2013.
  395. ACM
    Ganu G and Marian A One size does not fit all Proceedings of the 22nd ACM international conference on Information & Knowledge Management, (9-18)
  396. ACM
    Lee W, Kuo Y and Hsu W City-view image retrieval leveraging check-in data Proceedings of the 2nd ACM international workshop on Geotagging and its applications in multimedia, (13-18)
  397. Cidon I, Kantor E and Kutten S Prudent Opportunistic Cognitive Radio Access Protocols Proceedings of the 27th International Symposium on Distributed Computing - Volume 8205, (462-476)
  398. ACM
    Hammar M, Karlsson R and Nilsson B Using maximum coverage to optimize recommendation systems in e-commerce Proceedings of the 7th ACM conference on Recommender systems, (265-272)
  399. Wu Y, Yang S, Srivatsa M, Iyengar A and Yan X (2013). Summarizing answer graphs induced by keyword queries, Proceedings of the VLDB Endowment, 6:14, (1774-1785), Online publication date: 1-Sep-2013.
  400. Nanongkai D (2013). Simple FPTAS for the subset-sums ratio problem, Information Processing Letters, 113:19-21, (750-753), Online publication date: 1-Sep-2013.
  401. Punnen A, Sripratak P and Karapetyan D Domination analysis of algorithms for bipartite boolean quadratic programs Proceedings of the 19th international conference on Fundamentals of Computation Theory, (271-282)
  402. Mohaisen A, Alrawi O, Larson M and Mcpherson D Towards a Methodical Evaluation of Antivirus Scans and Labels Revised Selected Papers of the 14th International Workshop on Information Security Applications - Volume 8267, (231-241)
  403. ACM
    Fan W, Wang X and Wu Y (2013). Incremental graph pattern matching, ACM Transactions on Database Systems, 38:3, (1-47), Online publication date: 1-Aug-2013.
  404. Besold T and Robere R When almost is not even close Proceedings of the 6th international conference on Artificial General Intelligence, (11-20)
  405. ACM
    Zhang S, Wu J and Lu S Minimum makespan workload dissemination in DTNs Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing, (293-296)
  406. ACM
    Han K, Xiang L, Luo J, Xiao M and Huang L Energy-efficient reliable data dissemination in duty-cycled wireless sensor networks Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing, (287-292)
  407. Fan W Querying big social data Proceedings of the 29th British National conference on Big Data, (14-28)
  408. ACM
    Lee E and Ligett K Improved bounds on the price of stability in network cost sharing games Proceedings of the fourteenth ACM conference on Electronic commerce, (607-620)
  409. ACM
    Lee E and Ligett K Improved bounds on the price of stability in network cost sharing games Proceedings of the fourteenth ACM conference on Electronic commerce, (607-620)
  410. ACM
    Gu A, Gupta A and Kumar A The power of deferral Proceedings of the forty-fifth annual ACM symposium on Theory of Computing, (525-534)
  411. Nehama I Complexity of optimal lobbying in threshold aggregation Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (1197-1198)
  412. ACM
    Klein D, Venkateswaran S, Isaacs J, Burman J, Pham T, Hespanha J and Madhow U (2013). Localization with sparse acoustic sensor network using UAVs as information-seeking data mules, ACM Transactions on Sensor Networks, 9:3, (1-29), Online publication date: 1-May-2013.
  413. ACM
    Fomin F and Kaski P (2013). Exact exponential algorithms, Communications of the ACM, 56:3, (80-88), Online publication date: 1-Mar-2013.
  414. Dasgupta B and Muthukrishnan S (2013). Stochastic Budget Optimization in Internet Advertising, Algorithmica, 65:3, (634-661), Online publication date: 1-Mar-2013.
  415. ACM
    Byrka J, Grandoni F, Rothvoss T and Sanità L (2013). Steiner Tree Approximation via Iterative Randomized Rounding, Journal of the ACM, 60:1, (1-33), Online publication date: 1-Feb-2013.
  416. ACM
    Suomela J (2013). Survey of local algorithms, ACM Computing Surveys, 45:2, (1-40), Online publication date: 1-Feb-2013.
  417. Ito T, Miyamoto Y, Ono H, Tamaki H and Uehara R (2013). Route-Enabling Graph Orientation Problems, Algorithmica, 65:2, (317-338), Online publication date: 1-Feb-2013.
  418. ACM
    Nallaperuma S, Wagner M, Neumann F, Bischl B, Mersmann O and Trautmann H A feature-based comparison of local search and the christofides algorithm for the travelling salesperson problem Proceedings of the twelfth workshop on Foundations of genetic algorithms XII, (147-160)
  419. Pancerz K and Suraj Z (2013). A Rough Set Approach to Information Systems Decomposition, Fundamenta Informaticae, 127:1-4, (257-272), Online publication date: 1-Jan-2013.
  420. ACM
    Arslan M, Singh I, Singh S, Madhyastha H, Sundaresan K and Krishnamurthy S Computing while charging Proceedings of the 8th international conference on Emerging networking experiments and technologies, (193-204)
  421. Lenzner P Greedy selfish network creation Proceedings of the 8th international conference on Internet and Network Economics, (142-155)
  422. ACM
    Chekuri C, Clarkson K and Har-Peled S (2012). On the set multicover problem in geometric settings, ACM Transactions on Algorithms, 9:1, (1-17), Online publication date: 1-Dec-2012.
  423. Wang J, Wang L, Chan K and Constable M A linear programming based method for joint object region matching and labeling Proceedings of the 11th Asian conference on Computer Vision - Volume Part II, (66-78)
  424. ACM
    Athavale V, Hertz S, Jetly D, Ganesan V, Krysl J and Vasudevan S Using static analysis for coverage extraction fromemulation/prototyping platforms Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis, (207-214)
  425. ACM
    Chang C, Chen J, Munawar W, Kuo T and Falk H Partitioned scheduling for real-time tasks on multiprocessor embedded systems with programmable shared srams Proceedings of the tenth ACM international conference on Embedded software, (153-162)
  426. Babenko M and Karzanov A (2012). Min-cost multiflows in node-capacitated undirected networks, Journal of Combinatorial Optimization, 24:3, (202-228), Online publication date: 1-Oct-2012.
  427. ACM
    Heller B, Sherwood R and McKeown N (2012). The controller placement problem, ACM SIGCOMM Computer Communication Review, 42:4, (473-478), Online publication date: 24-Sep-2012.
  428. ACM
    Heller B, Sherwood R and McKeown N The controller placement problem Proceedings of the first workshop on Hot topics in software defined networks, (7-12)
  429. ACM
    Gionis A, Lappas T and Terzi E Estimating entity importance via counting set covers Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, (687-695)
  430. Amini O, Peleg D, Pérennes S, Sau I and Saurabh S (2012). On the approximability of some degree-constrained subgraph problems, Discrete Applied Mathematics, 160:12, (1661-1679), Online publication date: 1-Aug-2012.
  431. Dereniowski D and Kubiak W (2012). Routing equal-size messages on a slotted ring, Journal of Scheduling, 15:4, (473-486), Online publication date: 1-Aug-2012.
  432. Fellows M, Kulik A, Rosamond F and Shachnai H Parameterized approximation via fidelity preserving transformations Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I, (351-362)
  433. Deshpande A, Kannan R and Srivastava N Zero-one rounding of singular vectors Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I, (278-289)
  434. ACM
    Feldman M, Lewin-Eytan L and Naor J Hedonic clustering games Proceedings of the twenty-fourth annual ACM symposium on Parallelism in algorithms and architectures, (267-276)
  435. ACM
    Farhad S, Ko Y, Burgstaller B and Scholz B Profile-guided deployment of stream programs on multicores Proceedings of the 13th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, Tools and Theory for Embedded Systems, (79-88)
  436. ACM
    Liu Z, Chen Y, Bash C, Wierman A, Gmach D, Wang Z, Marwah M and Hyser C Renewable and cooling aware workload management for sustainable data centers Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems, (175-186)
  437. ACM
    Leconte M, Lelarge M and Massoulié L Bipartite graph structures for efficient balancing of heterogeneous loads Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems, (41-52)
  438. ACM
    Liu Z, Chen Y, Bash C, Wierman A, Gmach D, Wang Z, Marwah M and Hyser C (2012). Renewable and cooling aware workload management for sustainable data centers, ACM SIGMETRICS Performance Evaluation Review, 40:1, (175-186), Online publication date: 7-Jun-2012.
  439. ACM
    Leconte M, Lelarge M and Massoulié L (2012). Bipartite graph structures for efficient balancing of heterogeneous loads, ACM SIGMETRICS Performance Evaluation Review, 40:1, (41-52), Online publication date: 7-Jun-2012.
  440. ACM
    Kong J, Chung S and Skadron K (2012). Recent thermal management techniques for microprocessors, ACM Computing Surveys, 44:3, (1-42), Online publication date: 1-Jun-2012.
  441. ACM
    Mahoney M Approximate computation and implicit regularization for very large-scale data analysis Proceedings of the 31st ACM SIGMOD-SIGACT-SIGAI symposium on Principles of Database Systems, (143-154)
  442. ACM
    Farhad S, Ko Y, Burgstaller B and Scholz B (2012). Profile-guided deployment of stream programs on multicores, ACM SIGPLAN Notices, 47:5, (79-88), Online publication date: 18-May-2012.
  443. Faenza Y, Fiorini S, Grappe R and Tiwary H Extended formulations, nonnegative factorizations, and randomized communication protocols Proceedings of the Second international conference on Combinatorial Optimization, (129-140)
  444. ACM
    Ma S, Cao Y, Huai J and Wo T Distributed graph pattern matching Proceedings of the 21st international conference on World Wide Web, (949-958)
  445. ACM
    Anagnostopoulos A, Becchetti L, Castillo C, Gionis A and Leonardi S Online team formation in social networks Proceedings of the 21st international conference on World Wide Web, (839-848)
  446. Chin K, Soh S and Meng C (2012). Novel scheduling algorithms for concurrent transmit/receive wireless mesh networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 56:4, (1200-1214), Online publication date: 1-Mar-2012.
  447. Liao K and Shen H Approximating the reliable resource allocation problem using inverse dual fitting Proceedings of the Eighteenth Computing: The Australasian Theory Symposium - Volume 128, (75-82)
  448. Cheriyan J, Laekhanukit B, Naves G and Vetta A Approximating rooted Steiner networks Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (1499-1511)
  449. Rothvoß T The entropy rounding method in approximation algorithms Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (356-372)
  450. Mersmann O, Bischl B, Bossek J, Trautmann H, Wagner M and Neumann F Local Search and the Traveling Salesman Problem Revised Selected Papers of the 6th International Conference on Learning and Intelligent Optimization - Volume 7219, (115-129)
  451. ACM
    Mahdian M, Nazerzadeh H and Saberi A (2012). Online Optimization with Uncertain Information, ACM Transactions on Algorithms, 8:1, (1-29), Online publication date: 1-Jan-2012.
  452. ACM
    Chen X, Chen M, Li B, Zhao Y, Wu Y and Li J Celerity Proceedings of the 19th ACM international conference on Multimedia, (493-502)
  453. Wang J, Chen X, Liao C and Hu S The approximation scheme for peak power driven voltage partitioning Proceedings of the International Conference on Computer-Aided Design, (736-741)
  454. ACM
    Cledat R, Kumar T and Pande S Efficiently speeding up sequential computation through the n-way programming model Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications, (537-554)
  455. ACM
    Cledat R, Kumar T and Pande S (2011). Efficiently speeding up sequential computation through the n-way programming model, ACM SIGPLAN Notices, 46:10, (537-554), Online publication date: 18-Oct-2011.
  456. ACM
    Shakarian P, Subrahmanian V and Sapino M (2011). GAPs, ACM Transactions on Intelligent Systems and Technology, 3:1, (1-27), Online publication date: 1-Oct-2011.
  457. Bourgeois N, Escoffier B and Paschos V (2011). Approximation of max independent set, min vertex cover and related problems by moderately exponential algorithms, Discrete Applied Mathematics, 159:17, (1954-1970), Online publication date: 1-Oct-2011.
  458. Berral J, Gavalda R and Torres J Adaptive Scheduling on Power-Aware Managed Data-Centers Using Machine Learning Proceedings of the 2011 IEEE/ACM 12th International Conference on Grid Computing, (66-73)
  459. Bar-Noy A, Basu P, Johnson M and Ramanathan R Minimum-Cost broadcast through varying-size neighborcast Proceedings of the 7th international conference on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, (173-187)
  460. Dondi R, Mauri G and Zoppis I On the complexity of the l-diversity problem Proceedings of the 36th international conference on Mathematical foundations of computer science, (266-277)
  461. Snir S and Yuster R A linear time approximation scheme for maximum quartet consistency on sparse sampled inputs Proceedings of the 14th international workshop and 15th international conference on Approximation, randomization, and combinatorial optimization: algorithms and techniques, (339-350)
  462. Borradaile G, Heeringa B and Wilfong G The 1-neighbour knapsack problem Proceedings of the 22nd international conference on Combinatorial Algorithms, (71-84)
  463. ACM
    Borodin A, Cashman D and Magen A (2011). How well can primal-dual and local-ratio algorithms perform?, ACM Transactions on Algorithms, 7:3, (1-26), Online publication date: 1-Jul-2011.
  464. Tu J and Zhou W (2011). A factor 2 approximation algorithm for the vertex cover P3 problem, Information Processing Letters, 111:14, (683-686), Online publication date: 1-Jul-2011.
  465. Eisenbrand F, Kakimura N, Rothvoß T and Sanità L Set covering with ordered replacement Proceedings of the 15th international conference on Integer programming and combinatoral optimization, (170-182)
  466. Carrabs F, Cerulli R, Gentili M and Parlato G A Tabu search heuristic based on k-diamonds for the weighted feedback vertex set problem Proceedings of the 5th international conference on Network optimization, (589-602)
  467. ACM
    Fan W, Li J, Luo J, Tan Z, Wang X and Wu Y Incremental graph pattern matching Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, (925-936)
  468. ACM
    Svensson O Santa Claus schedules jobs on unrelated machines Proceedings of the forty-third annual ACM symposium on Theory of computing, (617-626)
  469. ACM
    Das Sarma A, Holzer S, Kor L, Korman A, Nanongkai D, Pandurangan G, Peleg D and Wattenhofer R Distributed verification and hardness of distributed approximation Proceedings of the forty-third annual ACM symposium on Theory of computing, (363-372)
  470. ACM
    Blelloch G, Peng R and Tangwongsan K Linear-work greedy parallel approximate set cover and variants Proceedings of the twenty-third annual ACM symposium on Parallelism in algorithms and architectures, (23-32)
  471. Chen J and Thiele L (2011). Platform synthesis and partitioning of real-time tasks for energy efficiency, Journal of Systems Architecture: the EUROMICRO Journal, 57:6, (573-583), Online publication date: 1-Jun-2011.
  472. He J and Liang H On variants of the spanning star forest problem Proceedings of the 5th joint international frontiers in algorithmics, and 7th international conference on Algorithmic aspects in information and management, (70-81)
  473. Garg D, Sundararajan S and Shevade S A game theoretic approach for feature clustering and its application to feature selection Proceedings of the 15th Pacific-Asia conference on Advances in knowledge discovery and data mining - Volume Part I, (13-25)
  474. Ito T and Demaine E Approximability of the subset sum reconfiguration problem Proceedings of the 8th annual conference on Theory and applications of models of computation, (58-69)
  475. ACM
    Balasubramanian S, Desmarais R, Müller H, Stege U and Venkatesh S Characterizing problems for realizing policies in self-adaptive and self-managing systems Proceedings of the 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, (70-79)
  476. Szabó G, Turányi Z, Toka L, Molnár S and Santos A Automatic protocol signature generation framework for deep packet inspection Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (291-299)
  477. Mann V, Kumar A, Dutta P and Kalyanaraman S VMFlow Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part I, (198-211)
  478. Buchbinder N, Jain N and Menache I Online job-migration for reducing the electricity bill in the cloud Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part I, (172-185)
  479. Yan L and Chrobak M (2011). Approximation algorithms for the Fault-Tolerant Facility Placement problem, Information Processing Letters, 111:11, (545-549), Online publication date: 1-May-2011.
  480. Tan Z and Zhang L Improving XML data quality with functional dependencies Proceedings of the 16th international conference on Database systems for advanced applications - Volume Part I, (450-465)
  481. De Francisci Morales G, Gionis A and Sozio M (2011). Social content matching in MapReduce, Proceedings of the VLDB Endowment, 4:7, (460-469), Online publication date: 1-Apr-2011.
  482. ACM
    Chen J, Huang K and Thiele L Power management schemes for heterogeneous clusters under quality of service requirements Proceedings of the 2011 ACM Symposium on Applied Computing, (546-553)
  483. ACM
    Sarma A, Dong X and Halevy A Data integration with dependent sources Proceedings of the 14th International Conference on Extending Database Technology, (401-412)
  484. ACM
    Farhad S, Ko Y, Burgstaller B and Scholz B (2011). Orchestration by approximation, ACM SIGPLAN Notices, 46:3, (357-368), Online publication date: 17-Mar-2011.
  485. ACM
    Farhad S, Ko Y, Burgstaller B and Scholz B (2011). Orchestration by approximation, ACM SIGARCH Computer Architecture News, 39:1, (357-368), Online publication date: 17-Mar-2011.
  486. ACM
    Farhad S, Ko Y, Burgstaller B and Scholz B Orchestration by approximation Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems, (357-368)
  487. Niu F, Ré C, Doan A and Shavlik J (2011). Tuffy, Proceedings of the VLDB Endowment, 4:6, (373-384), Online publication date: 1-Mar-2011.
  488. ACM
    Chekuri C, Even G, Gupta A and Segev D (2011). Set connectivity problems in undirected graphs and the directed steiner network problem, ACM Transactions on Algorithms, 7:2, (1-17), Online publication date: 1-Mar-2011.
  489. Kumar M, Mishra S, Devi N and Saurabh S Approximation algorithms for minimum chain vertex deletion Proceedings of the 5th international conference on WALCOM: algorithms and computation, (21-32)
  490. Trushkowsky B, Bodík P, Fox A, Franklin M, Jordan M and Patterson D The SCADS director Proceedings of the 9th USENIX conference on File and stroage technologies, (12-12)
  491. ACM
    Anagnostopoulos A, Becchetti L, Leonardi S, Mele I and Sankowski P Stochastic query covering Proceedings of the fourth ACM international conference on Web search and data mining, (725-734)
  492. ACM
    Krause A, Guestrin C, Gupta A and Kleinberg J (2011). Robust sensor placements at informative and communication-efficient locations, ACM Transactions on Sensor Networks, 7:4, (1-33), Online publication date: 1-Feb-2011.
  493. Bhawalkar K and Roughgarden T Welfare guarantees for combinatorial auctions with item bidding Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms, (700-709)
  494. Costello K, Shapira A and Tetali P Randomized greedy Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms, (647-655)
  495. Dinneen M and Khosravani M Hardness of approximation and integer programming frameworks for searching for caterpillar trees Proceedings of the Seventeenth Computing on The Australasian Theory Symposium - Volume 119, (145-150)
  496. Dinneen M and Khosravani M Hardness of approximation and integer programming frameworks for searching for caterpillar trees Proceedings of the Seventeenth Computing: The Australasian Theory Symposium - Volume 119, (145-150)
  497. Böckenhauer H, Hromkovič J and Mömke T Improved approximations for hard optimization problems via problem instance classification Rainbow of computer science, (3-19)
  498. He J and Liang H An improved approximation algorithm for spanning star forest in dense graphs Proceedings of the 4th international conference on Combinatorial optimization and applications - Volume Part II, (160-169)
  499. Huang F, Khan M and Ravindran B On minimizing average end-to-end delay in P2P live streaming systems Proceedings of the 14th international conference on Principles of distributed systems, (459-474)
  500. Syrgkanis V The complexity of equilibria in cost sharing games Proceedings of the 6th international conference on Internet and network economics, (366-377)
  501. Friedrich T, He J, Hebbinghaus N, Neumann F and Witt C (2010). Approximating covering problems by randomized search heuristics using multi-objective models*, Evolutionary Computation, 18:4, (617-633), Online publication date: 1-Dec-2010.
  502. ACM
    Qi X, Yin D, Xue Z and Davison B Choosing your own adventure Proceedings of the 19th ACM international conference on Information and knowledge management, (1853-1856)
  503. ACM
    Anagnostopoulos A, Becchetti L, Castillo C, Gionis A and Leonardi S Power in unity Proceedings of the 19th ACM international conference on Information and knowledge management, (599-608)
  504. Meir R, Bachrach Y and Rosenschein J Minimal subsidies in expense sharing games Proceedings of the Third international conference on Algorithmic game theory, (347-358)
  505. ACM
    Xie M, Lakshmanan L and Wood P Breaking out of the box of recommendations Proceedings of the fourth ACM conference on Recommender systems, (151-158)
  506. Kolahi S and Lakshmanan L Exploiting conflict structures in inconsistent databases Proceedings of the 14th east European conference on Advances in databases and information systems, (320-335)
  507. Bar-Yehuda R, Hermelin D and Rawitz D Minimum vertex cover in rectangle graphs Proceedings of the 18th annual European conference on Algorithms: Part I, (255-266)
  508. Gibson M and Pirwani I Algorithms for dominating set in disk graphs Proceedings of the 18th annual European conference on Algorithms: Part I, (243-254)
  509. Davies J, Cho J and Bacchus F Using learnt clauses in MAXSAT Proceedings of the 16th international conference on Principles and practice of constraint programming, (176-190)
  510. Chlamtac E, Krauthgamer R and Raghavendra P Approximating sparsest cut in graphs of bounded treewidth Proceedings of the 13th international conference on Approximation, and 14 the International conference on Randomization, and combinatorial optimization: algorithms and techniques, (124-137)
  511. Fan W, Li J, Ma S, Wang H and Wu Y (2010). Graph homomorphism revisited for graph matching, Proceedings of the VLDB Endowment, 3:1-2, (1161-1172), Online publication date: 1-Sep-2010.
  512. Fan W, Li J, Ma S, Tang N and Yu W (2010). Towards certain fixes with editing rules and master data, Proceedings of the VLDB Endowment, 3:1-2, (173-184), Online publication date: 1-Sep-2010.
  513. Sarkar S, Altman E and Vaidyanathan P (2010). Information concealing games, IEEE Transactions on Information Theory, 56:9, (4608-4630), Online publication date: 1-Sep-2010.
  514. ACM
    Ramadan E, Perincheri S and Tuck D A hyper-graph approach for analyzing transcriptional networks in breast cancer Proceedings of the First ACM International Conference on Bioinformatics and Computational Biology, (556-562)
  515. ACM
    Chen W, Wang C and Wang Y Scalable influence maximization for prevalent viral marketing in large-scale social networks Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (1029-1038)
  516. Zhu B Efficient exact and approximate algorithms for the complement of maximal strip recovery Proceedings of the 6th international conference on Algorithmic aspects in information and management, (325-333)
  517. Dai W Some results on incremental vertex cover problem Proceedings of the 6th international conference on Algorithmic aspects in information and management, (112-118)
  518. ACM
    Kötzing T, Lehre P, Neumann F and Oliveto P Ant colony optimization and the minimum cut problem Proceedings of the 12th annual conference on Genetic and evolutionary computation, (1393-1400)
  519. Mertzios G, Sau I, Shalom M and Zaks S Placing regenerators in optical networks to satisfy multiple sets of requests Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II, (333-344)
  520. ACM
    Hu H, Xu J, On S, Du J and Ng J (2010). Privacy-aware location data publishing, ACM Transactions on Database Systems, 35:3, (1-42), Online publication date: 1-Jul-2010.
  521. Louis A and Vishnoi N Improved algorithm for degree bounded survivable network design problem Proceedings of the 12th Scandinavian conference on Algorithm Theory, (408-419)
  522. ACM
    Karagiannis T, Gkantsidis C, Narayanan D and Rowstron A Hermes Proceedings of the 1st ACM symposium on Cloud computing, (89-100)
  523. ACM
    Yang M, Wang H, Lim L and Wang M Optimizing content freshness of relations extracted from the web using keyword search Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, (819-830)
  524. ACM
    Deutch D, Koch C and Milo T On probabilistic fixpoint and Markov chain query languages Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (215-226)
  525. ACM
    Varadarajan K Weighted geometric set cover via quasi-uniform sampling Proceedings of the forty-second ACM symposium on Theory of computing, (641-648)
  526. ACM
    Byrka J, Grandoni F, Rothvoß T and Sanità L An improved LP-based approximation for steiner tree Proceedings of the forty-second ACM symposium on Theory of computing, (583-592)
  527. ACM
    Lee J, Sviridenko M and Vondrak J Matroid matching Proceedings of the forty-second ACM symposium on Theory of computing, (369-378)
  528. ACM
    Hirai H The maximum multiflow problems with bounded fractionality Proceedings of the forty-second ACM symposium on Theory of computing, (115-120)
  529. Hua Q, Wang Y, Yu D and Lau F (2010). Dynamic programming based algorithms for set multicover and multiset multicover problems, Theoretical Computer Science, 411:26-28, (2467-2474), Online publication date: 1-Jun-2010.
  530. Roos M and Rothe J Complexity of social welfare optimization in multiagent resource allocation Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1, (641-648)
  531. Dom M, Guo J and Niedermeier R (2010). Approximation and fixed-parameter algorithms for consecutive ones submatrix problems, Journal of Computer and System Sciences, 76:3-4, (204-221), Online publication date: 1-May-2010.
  532. Zhang Z, Zhang M, Greenberg A, Hu Y, Mahajan R and Christian B Optimizing cost and performance in online service provider networks Proceedings of the 7th USENIX conference on Networked systems design and implementation, (3-3)
  533. Ge Q and Štefankovič D The complexity of counting eulerian tours in 4-regular graphs Proceedings of the 9th Latin American conference on Theoretical Informatics, (638-649)
  534. Asahiro Y, Miyano E and Samizo K Approximating maximum diameter-bounded subgraphs Proceedings of the 9th Latin American conference on Theoretical Informatics, (615-626)
  535. McGregor A and Milenkovic O (2010). On the hardness of approximating stopping and trapping sets, IEEE Transactions on Information Theory, 56:4, (1640-1650), Online publication date: 1-Apr-2010.
  536. Kenkre S and Vishwanathan S (2010). Approximation algorithms for the Bipartite Multicut problem, Information Processing Letters, 110:8-9, (282-287), Online publication date: 1-Apr-2010.
  537. ACM
    Das Sarma A, Parameswaran A, Garcia-Molina H and Widom J Synthesizing view definitions from data Proceedings of the 13th International Conference on Database Theory, (89-103)
  538. Sharma S, Shi Y, Hou Y, Sherali H and Kompella S Cooperative communications in multi-hop wireless networks Proceedings of the 29th conference on Information communications, (2016-2024)
  539. Shao Z, Chen M, Avestimehr S and Li S Cross-layer optimization for wireless networks with deterministic channel models Proceedings of the 29th conference on Information communications, (181-185)
  540. ACM
    Svitkina Z and Tardos É (2010). Facility location with hierarchical facility costs, ACM Transactions on Algorithms, 6:2, (1-22), Online publication date: 1-Mar-2010.
  541. ACM
    Marx D (2010). Approximating fractional hypertree width, ACM Transactions on Algorithms, 6:2, (1-17), Online publication date: 1-Mar-2010.
  542. ACM
    Delbot F and Laforest C (2010). Analytical and experimental comparison of six algorithms for the vertex cover problem, ACM Journal of Experimental Algorithmics, 15, (1.1-1.27), Online publication date: 1-Mar-2010.
  543. Cardinal J and Hoefer M (2010). Non-cooperative facility location and covering games, Theoretical Computer Science, 411:16-18, (1855-1876), Online publication date: 1-Mar-2010.
  544. Ghosh S (2010). Approximation algorithms for art gallery problems in polygons, Discrete Applied Mathematics, 158:6, (718-722), Online publication date: 1-Mar-2010.
  545. Jin Y, Khan L and Prabhakaran B (2010). Knowledge Based Image Annotation Refinement, Journal of Signal Processing Systems, 58:3, (387-406), Online publication date: 1-Mar-2010.
  546. Ghosh S Approximation algorithms for art gallery problems in polygons and terrains Proceedings of the 4th international conference on Algorithms and Computation, (21-34)
  547. Sen S and Muralidhara V The covert set-cover problem with application to network discovery Proceedings of the 4th international conference on Algorithms and Computation, (228-239)
  548. Klein P and Young N Approximation algorithms for NP-hard optimization problems Algorithms and theory of computation handbook, (34-34)
  549. Anthony B, Goyal V, Gupta A and Nagarajan V (2010). A Plant Location Guide for the Unsure, Mathematics of Operations Research, 35:1, (79-101), Online publication date: 1-Feb-2010.
  550. Kolling A and Carpin S (2010). Pursuit-evasion on trees by robot teams, IEEE Transactions on Robotics, 26:1, (32-47), Online publication date: 1-Feb-2010.
  551. Escoffier B and Paschos V (2010). Survey, Computer Science Review, 4:1, (19-40), Online publication date: 1-Feb-2010.
  552. Eisenbrand F, Hähnle N, Palvolgyi D and Shmonin G Testing additive integrality gaps Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1227-1234)
  553. Eisenbrand F and Rothvoß T EDF-schedulability of synchronous periodic task systems is coNP-hard Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1029-1034)
  554. Avigdor-Elgrabli N and Rabani Y An improved competitive algorithm for reordering buffer management Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (13-21)
  555. Czumaj A and Sohler C Sublinear-time algorithms Property testing, (41-64)
  556. Czumaj A and Sohler C Sublinear-time algorithms Property testing, (41-64)
  557. Pandurangan G and Khan M Theory of communication networks Algorithms and theory of computation handbook, (27-27)
  558. Venkataraman G, Feng Z, Hu J and Li P (2010). Combinatorial algorithms for fast clock mesh optimization, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18:1, (131-141), Online publication date: 1-Jan-2010.
  559. Briest P, Hoefer M, Gualà L and Ventre C On Stackelberg Pricing with Computationally Bounded Consumers Proceedings of the 5th International Workshop on Internet and Network Economics, (42-54)
  560. Gairing M Covering Games Proceedings of the 5th International Workshop on Internet and Network Economics, (184-195)
  561. Xu S and Shen H The Fault-Tolerant Facility Allocation Problem Proceedings of the 20th International Symposium on Algorithms and Computation, (689-698)
  562. Hua Q, Yu D, Lau F and Wang Y Exact Algorithms for Set Multicover and Multiset Multicover Problems Proceedings of the 20th International Symposium on Algorithms and Computation, (34-44)
  563. Ito T, Miyamoto Y, Ono H, Tamaki H and Uehara R Route-Enabling Graph Orientation Problems Proceedings of the 20th International Symposium on Algorithms and Computation, (403-412)
  564. Lenzen C, Suomela J and Wattenhofer R Local Algorithms Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, (17-34)
  565. Liu H, Shao Z, Wang M, Du J, Xue C and Jia Z (2009). Combining Coarse-Grained Software Pipelining with DVS for Scheduling Real-Time Periodic Dependent Tasks on Multi-Core Embedded Systems, Journal of Signal Processing Systems, 57:2, (249-262), Online publication date: 1-Nov-2009.
  566. Ando E, Ono H and Yamashita M A generic algorithm for approximately solving stochastic graph optimization problems Proceedings of the 5th international conference on Stochastic algorithms: foundations and applications, (89-103)
  567. ACM
    Ducasse R, Turaga D and van der Schaar M Topology selection for stream mining systems Proceedings of the First ACM workshop on Large-scale multimedia retrieval and mining, (113-120)
  568. ACM
    Anandkumar A, Bisdikian C, He T and Agrawal D (2009). Selectively retrofitting monitoring in distributed systems, ACM SIGMETRICS Performance Evaluation Review, 37:2, (6-8), Online publication date: 16-Oct-2009.
  569. ACM
    Rana V, Murali S, Atienza D, Santambrogio M, Benini L and Sciuto D Minimization of the reconfiguration latency for the mapping of applications on FPGA-based systems Proceedings of the 7th IEEE/ACM international conference on Hardware/software codesign and system synthesis, (325-334)
  570. ACM
    Banerjee P, Sur-Kolay S, Bishnu A, Das S, Nandy S and Bhattacharjee S (2009). FPGA placement using space-filling curves, ACM Transactions on Embedded Computing Systems, 9:2, (1-23), Online publication date: 1-Oct-2009.
  571. Angel E, Bampis E and Gourvès L (2009). On the minimum hitting set of bundles problem, Theoretical Computer Science, 410:45, (4534-4542), Online publication date: 1-Oct-2009.
  572. Ohta N, Conitzer V, Ichimura R, Sakurai Y, Iwasaki A and Yokoo M Coalition structure generation utilizing compact characteristic function representations Proceedings of the 15th international conference on Principles and practice of constraint programming, (623-638)
  573. Hua Q, Wang Y, Yu D and Lau F (2009). Set multi-covering via inclusion-exclusion, Theoretical Computer Science, 410:38-40, (3882-3892), Online publication date: 1-Sep-2009.
  574. Kim J and Choi S (2009). Clustering with r-regular graphs, Pattern Recognition, 42:9, (2020-2028), Online publication date: 1-Sep-2009.
  575. ACM
    Zhang S, Chatha K and Konjevod G Near optimal battery-aware energy management Proceedings of the 2009 ACM/IEEE international symposium on Low power electronics and design, (249-254)
  576. Chaudhuri S, Narasayya V and Ramamurthy R (2009). Exact cardinality query optimization for optimizer testing, Proceedings of the VLDB Endowment, 2:1, (994-1005), Online publication date: 1-Aug-2009.
  577. So A, Zhang J and Ye Y (2009). Stochastic Combinatorial Optimization with Controllable Risk Aversion Level, Mathematics of Operations Research, 34:3, (522-537), Online publication date: 1-Aug-2009.
  578. ACM
    Carr R, Konjevod G, Little G, Natarajan V and Parekh O (2009). Compacting cuts, ACM Transactions on Algorithms, 5:3, (1-16), Online publication date: 1-Jul-2009.
  579. Cygan M, Kowalik Ł and Wykurz M (2009). Exponential-time approximation of weighted set cover, Information Processing Letters, 109:16, (957-961), Online publication date: 1-Jul-2009.
  580. ACM
    Elmongui H, Narasayya V and Ramamurthy R A framework for testing query transformation rules Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, (257-268)
  581. ACM
    Lappas T, Liu K and Terzi E Finding a team of experts in social networks Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (467-476)
  582. Yu C, Lu C and Kuo S A simple non-interactive pairwise key establishment scheme in sensor networks Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks, (360-368)
  583. Sen P, Deshpande A and Getoor L Bisimulation-based approximate lifted inference Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence, (496-505)
  584. ACM
    Martins A, Smith N and Xing E Polyhedral outer approximations with application to natural language parsing Proceedings of the 26th Annual International Conference on Machine Learning, (713-720)
  585. Yadlapalli S, Rathinam S and Darbha S An approximation algorithm for a 2-depot, heterogeneous vehicle routing problem Proceedings of the 2009 conference on American Control Conference, (1730-1735)
  586. ACM
    Chekuri C, Clarkson K and Har-Peled S On the set multi-cover problem in geometric settings Proceedings of the twenty-fifth annual symposium on Computational geometry, (341-350)
  587. ACM
    Agarwal P, Ezra E and Shair M Near-linear approximation algorithms for geometric hitting sets Proceedings of the twenty-fifth annual symposium on Computational geometry, (23-32)
  588. ACM
    Chakrabarti D, Kumar R and Punera K Quicklink selection for navigational query results Proceedings of the 18th international conference on World wide web, (391-400)
  589. ACM
    Kolahi S and Lakshmanan L On approximating optimum repairs for functional dependency violations Proceedings of the 12th International Conference on Database Theory, (53-62)
  590. Ferrante A, Parlato G, Sorrentino F and Ventre C (2009). Fast payment schemes for truthful mechanisms with verification, Theoretical Computer Science, 410:8-10, (886-899), Online publication date: 1-Mar-2009.
  591. Dai D and Yu C (2009). A 5+epsilon (Porson)-approximation algorithm for minimum weighted dominating set in unit disk graph, Theoretical Computer Science, 410:8-10, (756-765), Online publication date: 1-Mar-2009.
  592. Kako A, Ono T, Hirata T and Halldórsson M (2009). Approximation algorithms for the weighted independent set problem in sparse graphs, Discrete Applied Mathematics, 157:4, (617-626), Online publication date: 20-Feb-2009.
  593. Buchbinder N and (Seffi) Naor J (2009). The Design of Competitive Online Algorithms via a Primal, Foundations and Trends® in Theoretical Computer Science, 3:2–3, (93-263), Online publication date: 1-Feb-2009.
  594. Caragiannis I, Covey J, Feldman M, Homan C, Kaklamanis C, Karanikolas N, Procaccia A and Rosenschein J On the approximability of Dodgson and Young elections Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (1058-1067)
  595. Marx D Approximating fractional hypertree width Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (902-911)
  596. Bansal N, Friggstad Z, Khandekar R and Salavatipour M A logarithmic approximation for unsplittable flow on line graphs Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (702-709)
  597. Nagarajan V and Sviridenko M On the maximum quadratic assignment problem Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (516-524)
  598. Guha S, Munagala K and Shi P Approximation algorithms for restless bandit problems Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (28-37)
  599. ACM
    Wu C (2009). An energy-efficient I/O request mechanism for multi-bank flash-memory storage systems, ACM Transactions on Design Automation of Electronic Systems, 14:1, (1-25), Online publication date: 1-Jan-2009.
  600. Beichl I and Cloteaux B Measuring the effectiveness of the s-metric to produce better network models Proceedings of the 40th Conference on Winter Simulation, (1020-1028)
  601. Manlove D and O'Malley G (2008). Student-Project Allocation with preferences over Projects, Journal of Discrete Algorithms, 6:4, (553-560), Online publication date: 1-Dec-2008.
  602. Galbiati G (2008). The complexity of a minimum reload cost diameter problem, Discrete Applied Mathematics, 156:18, (3494-3497), Online publication date: 1-Nov-2008.
  603. ACM
    Wu L and Landfeldt B The problem of placing mobility anchor points in wireless mesh networks Proceedings of the 6th ACM international symposium on Mobility management and wireless access, (19-27)
  604. Allalouf M and Shavitt Y (2008). Centralized and distributed algorithms for routing and weighted max-min fair bandwidth allocation, IEEE/ACM Transactions on Networking, 16:5, (1015-1024), Online publication date: 1-Oct-2008.
  605. Zeng Y, Samaras D, Chen W and Peng Q (2008). Topology cuts, Computer Vision and Image Understanding, 112:1, (81-90), Online publication date: 1-Oct-2008.
  606. Komodakis N, Tziritas G and Paragios N (2008). Performance vs computational efficiency for optimizing single and dynamic MRFs, Computer Vision and Image Understanding, 112:1, (14-29), Online publication date: 1-Oct-2008.
  607. Coskun A, Rosing T, Whisnant K and Gross K (2008). Static and dynamic temperature-aware scheduling for multiprocessor SoCs, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 16:9, (1127-1140), Online publication date: 1-Sep-2008.
  608. Karger D and Scott J Efficient Algorithms for Fixed-Precision Instances of Bin Packing and Euclidean TSP Proceedings of the 11th international workshop, APPROX 2008, and 12th international workshop, RANDOM 2008 on Approximation, Randomization and Combinatorial Optimization: Algorithms and Techniques, (104-117)
  609. Plociennik K Approximating Independent Set and Coloring in Random Uniform Hypergraphs Proceedings of the 33rd international symposium on Mathematical Foundations of Computer Science, (539-550)
  610. ACM
    Bonchi F, Castillo C, Donato D and Gionis A Topical query decomposition Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, (52-60)
  611. ACM
    Hua Q and Lau F Exact and approximate link scheduling algorithms under the physical interference model Proceedings of the fifth international workshop on Foundations of mobile computing, (45-54)
  612. ACM
    Khan M, Kuhn F, Malkhi D, Pandurangan G and Talwar K Efficient distributed approximation algorithms via probabilistic tree embeddings Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, (263-272)
  613. Koch C and Olteanu D (2008). Conditioning probabilistic databases, Proceedings of the VLDB Endowment, 1:1, (313-325), Online publication date: 1-Aug-2008.
  614. ACM
    Swamy C and Shmoys D (2008). Fault-tolerant facility location, ACM Transactions on Algorithms, 4:4, (1-27), Online publication date: 1-Aug-2008.
  615. ACM
    Bläser M (2008). A new approximation algorithm for the asymmetric TSP with triangle inequality, ACM Transactions on Algorithms, 4:4, (1-15), Online publication date: 1-Aug-2008.
  616. Samer M and Szeider S Backdoor trees Proceedings of the 23rd national conference on Artificial intelligence - Volume 1, (363-368)
  617. Chekuri C and Khanna S Algorithms for 2-Route Cut Problems Proceedings of the 35th international colloquium on Automata, Languages and Programming - Volume Part I, (472-484)
  618. Johnson M, Rowaihy H, Pizzocaro D, Bar-Noy A, Chalmers S, Porta T and Preece A Frugal Sensor Assignment Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems, (219-236)
  619. ACM
    Anagnostopoulos A, Dasgupta A and Kumar R Approximation algorithms for co-clustering Proceedings of the twenty-seventh ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (201-210)
  620. ACM
    Liu Z, Parthasarathy S, Ranganathan A and Yang H A generic flow algorithm for shared filter ordering problems Proceedings of the twenty-seventh ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (79-88)
  621. ACM
    Liu Z, Parthasarathy S, Ranganathan A and Yang H Near-optimal algorithms for shared filter evaluation in data stream systems Proceedings of the 2008 ACM SIGMOD international conference on Management of data, (133-146)
  622. ACM
    Dimitrov N and Roy I A primal-dual resource augmentation analysis of a constant approximate algorithm for stable coalitions in a cluster Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures, (236-245)
  623. ACM
    Fan W, Geerts F, Jia X and Kementsietsidis A (2008). Conditional functional dependencies for capturing data inconsistencies, ACM Transactions on Database Systems, 33:2, (1-48), Online publication date: 1-Jun-2008.
  624. Bertossi L, Bravo L, Franconi E and Lopatenko A (2008). The complexity and approximation of fixing numerical attributes in databases under integrity constraints, Information Systems, 33:4-5, (407-434), Online publication date: 1-Jun-2008.
  625. ACM
    Yi Y, Proutière A and Chiang M Complexity in wireless scheduling Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, (33-42)
  626. ACM
    Lau L and Singh M Additive approximation for bounded degree survivable network design Proceedings of the fortieth annual ACM symposium on Theory of computing, (759-768)
  627. Rodolakis G, Laouiti A, Jacquet P and Meraihi Naimi A (2008). Multicast overlay spanning trees in ad hoc networks, Computer Communications, 31:7, (1400-1412), Online publication date: 1-May-2008.
  628. Das A and Kempe D Sensor Selection for Minimizing Worst-Case Prediction Error Proceedings of the 7th international conference on Information processing in sensor networks, (97-108)
  629. ACM
    Ghosh A and Mahdian M Externalities in online advertising Proceedings of the 17th international conference on World Wide Web, (161-168)
  630. Hoefer M Competitive cost sharing with economies of scale Proceedings of the 8th Latin American conference on Theoretical informatics, (339-349)
  631. Bansal M, Dong J and Fernández-Baca D Comparing and aggregating partially resolved trees Proceedings of the 8th Latin American conference on Theoretical informatics, (72-83)
  632. ACM
    Zhang Q, Yu T and Ning P (2008). A Framework for Identifying Compromised Nodes in Wireless Sensor Networks, ACM Transactions on Information and System Security, 11:3, (1-37), Online publication date: 15-Mar-2008.
  633. Byun S and Yoo C (2008). Minimum DVS gateway deployment in DVS-based overlay streaming, Computer Communications, 31:3, (537-550), Online publication date: 15-Feb-2008.
  634. ACM
    Pandey S and Olston C Crawl ordering by search impact Proceedings of the 2008 International Conference on Web Search and Data Mining, (3-14)
  635. Coskun A, Rosing T, Whisnant K and Gross K Temperature-aware MPSoC scheduling for reducing hot spots and gradients Proceedings of the 2008 Asia and South Pacific Design Automation Conference, (49-54)
  636. Chen N On the approximability of influence in social networks Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (1029-1037)
  637. Chen H, Roughgarden T and Valiant G Designing networks with good equilibria Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (854-863)
  638. Halman N, Klabjan D, Li C, Orlin J and Simchi-Levi D Fully polynomial time approximation schemes for stochastic dynamic programs Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (700-709)
  639. Chekuri C, Even G, Gupta A and Segev D Set connectivity problems in undirected graphs and the directed Steiner network problem Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (532-541)
  640. Ebenlendr T, Krčál M and Sgall J Graph balancing Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (483-490)
  641. Chepoi V, Nouioua K and Vaxès Y (2008). A rounding algorithm for approximating minimum Manhattan networks, Theoretical Computer Science, 390:1, (56-69), Online publication date: 1-Jan-2008.
  642. Bouras C and Stamos K (2008). An efficient architecture for bandwidth Brokers in DiffServ networks, International Journal of Network Management, 18:1, (27-46), Online publication date: 1-Jan-2008.
  643. Zhang S and Chatha K Approximation algorithm for the temperature-aware scheduling problem Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design, (281-288)
  644. ACM
    Smith A, Geiger J, Kapfhammer G and Soffa M Test suite reduction and prioritization with call trees Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering, (539-540)
  645. Krauthgamer R, Mehta A and Rudra A Pricing commodities, or how to sell when buyers have restricted valuations Proceedings of the 5th international conference on Approximation and online algorithms, (1-14)
  646. Berger A, Fukunaga T, Nagamochi H and Parekh O (2007). Approximability of the capacitated b-edge dominating set problem, Theoretical Computer Science, 385:1-3, (202-213), Online publication date: 1-Oct-2007.
  647. Galbiati G and Maffioli F (2007). Approximation algorithms for maximum cut with limited unbalance, Theoretical Computer Science, 385:1-3, (78-87), Online publication date: 1-Oct-2007.
  648. ACM
    Chafekar D, Kumar V, Marathe M, Parthasarathy S and Srinivasan A Cross-layer latency minimization in wireless networks with SINR constraints Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, (110-119)
  649. ACM
    Chrobak M (2007). Competitiveness via primal-dual, ACM SIGACT News, 38:3, (100-105), Online publication date: 1-Sep-2007.
  650. ACM
    Zhang S, Chatha K and Konjevod G Approximation algorithms for power minimization of earliest deadline first and rate monotonic schedules Proceedings of the 2007 international symposium on Low power electronics and design, (225-230)
  651. Chepoi V and Estellon B Packing and Covering δ-Hyperbolic Spaces by Balls Proceedings of the 10th International Workshop on Approximation and the 11th International Workshop on Randomization, and Combinatorial Optimization. Algorithms and Techniques, (59-73)
  652. Paschos V, Telelis O and Zissimopoulos V Steiner forests on stochastic metric graphs Proceedings of the 1st international conference on Combinatorial optimization and applications, (112-123)
  653. Lodha S and Thomas D Probabilistic anonymity Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD, (56-79)
  654. Komodakis N and Tziritas G (2007). Approximate Labeling via Graph Cuts Based on Linear Programming, IEEE Transactions on Pattern Analysis and Machine Intelligence, 29:8, (1436-1453), Online publication date: 1-Aug-2007.
  655. Schaeffer S (2007). Survey, Computer Science Review, 1:1, (27-64), Online publication date: 1-Aug-2007.
  656. ACM
    Friedrich T, Hebbinghaus N, Neumann F, He J and Witt C Approximating covering problems by randomized search heuristics using multi-objective models Proceedings of the 9th annual conference on Genetic and evolutionary computation, (797-804)
  657. Gruber H and Holzer M Inapproximability of nondeterministic state and transition complexity assuming P ≠ NP Proceedings of the 11th international conference on Developments in language theory, (205-216)
  658. ACM
    Wu C, Kuo T and Chang L (2007). An efficient B-tree layer implementation for flash-memory storage systems, ACM Transactions on Embedded Computing Systems, 6:3, (19-es), Online publication date: 1-Jul-2007.
  659. Krishnaswamy S, Markov I and Hayes J (2007). Tracking Uncertainty with Probabilistic Logic Circuit Testing, IEEE Design & Test, 24:4, (312-321), Online publication date: 1-Jul-2007.
  660. Roughgarden T and Sundararajan M Optimal Efficiency Guarantees for Network Design Mechanisms Proceedings of the 12th international conference on Integer Programming and Combinatorial Optimization, (469-483)
  661. Zhang P Approximating Generalized Multicut on Trees Proceedings of the 3rd conference on Computability in Europe: Computation and Logic in the Real World, (799-808)
  662. Friedman J Linear Transformations in Boolean Complexity Theory Proceedings of the 3rd conference on Computability in Europe: Computation and Logic in the Real World, (307-315)
  663. Bhandari S, Choi B and Park E Hybrid topology for multicast support in constrained WDM networks Proceedings of the 20th international teletraffic conference on Managing traffic performance in converged networks, (236-247)
  664. ACM
    Munagala K, Srivastava U and Widom J Optimization of continuous queries with shared expensive filters Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (215-224)
  665. ACM
    Mehta A, Roughgarden T and Sundararajan M Beyond moulin mechanisms Proceedings of the 8th ACM conference on Electronic commerce, (1-10)
  666. ACM
    Singh M and Lau L Approximating minimum bounded degree spanning trees to within one of optimal Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (661-670)
  667. ACM
    Lau L, Naor J, Salavatipour M and Singh M Survivable network design with degree or order constraints Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (651-660)
  668. ACM
    Pap G Some new results on node-capacitated packing of A-paths Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (599-604)
  669. ACM
    Dobzinski S and Nisan N Limitations of VCG-based mechanisms Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (338-344)
  670. ACM
    Asadpour A and Saberi A An approximation algorithm for max-min fair allocation of indivisible goods Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (114-121)
  671. ACM
    Berman P, Jeong J, Kasiviswanathan S and Urgaonkar B Packing to angles and sectors Proceedings of the nineteenth annual ACM symposium on Parallel algorithms and architectures, (171-180)
  672. Hüffner F, Betzler N and Niedermeier R Optimal edge deletions for signed graph balancing Proceedings of the 6th international conference on Experimental algorithms, (297-310)
  673. Lampis M and Mitsou V The ferry cover problem Proceedings of the 4th international conference on Fun with algorithms, (227-239)
  674. ACM
    Deligiannakis A, Garofalakis M and Roussopoulos N (2007). Extended wavelets for multiple measures, ACM Transactions on Database Systems, 32:2, (10-es), Online publication date: 1-Jun-2007.
  675. ACM
    Cheng M, Ruan L and Wu W (2007). Coverage breach problems in bandwidth-constrained sensor networks, ACM Transactions on Sensor Networks, 3:2, (12-es), Online publication date: 1-Jun-2007.
  676. ACM
    Gupta A, Kumar A, P´al M and Roughgarden T (2007). Approximation via cost sharing, Journal of the ACM, 54:3, (11-es), Online publication date: 1-Jun-2007.
  677. Bouras C and Stamos K (2007). Performance Analysis of Adaptive Admission Control Algorithms for Bandwidth Brokers, Journal of Network and Systems Management, 15:2, (191-218), Online publication date: 1-Jun-2007.
  678. Feng W, Zhang L, Qu W and Wang H Approximation algorithms for maximum edge coloring problem Proceedings of the 4th international conference on Theory and applications of models of computation, (646-658)
  679. Diedrich F, Harren R, Jansen K, Thöle R and Thomas H Approximation algorithms for 3D orthogonal Knapsack Proceedings of the 4th international conference on Theory and applications of models of computation, (34-45)
  680. ACM
    Dasgupta A, Ghosh A, Kumar R, Olston C, Pandey S and Tomkins A The discoverability of the web Proceedings of the 16th international conference on World Wide Web, (421-430)
  681. ACM
    Yang F, Gupta N, Gerner N, Qi X, Demers A, Gehrke J and Shanmugasundaram J A unified platform for data driven web applications with automatic client-server partitioning Proceedings of the 16th international conference on World Wide Web, (341-350)
  682. Dutta P, Jaiswal S and Rastogi R Routing and Channel Allocation in Rural Wireless Mesh Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (598-606)
  683. Amzallag D, Naor J and Raz D Algorithmic Aspects of Access Networks Design in B3G/4G Cellular Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (991-999)
  684. Fireman L, Petrank E and Zaks A New algorithms for SIMD alignment Proceedings of the 16th international conference on Compiler construction, (1-15)
  685. Koltun V and Papadimitriou C (2007). Approximately dominating representatives, Theoretical Computer Science, 371:3, (148-154), Online publication date: 25-Feb-2007.
  686. ACM
    Caporuscio M, Charlet D, Issarny V and Navarra A Energetic performance of service-oriented multi-radio networks Proceedings of the 6th international workshop on Software and performance, (42-45)
  687. ACM
    Bhatia R, Chuzhoy J, Freund A and Naor J (2007). Algorithmic aspects of bandwidth trading, ACM Transactions on Algorithms, 3:1, (1-19), Online publication date: 1-Feb-2007.
  688. Bahl P, Hajiaghayi M, Jain K, Mirrokni S, Qiu L and Saberi A (2007). Cell Breathing in Wireless LANs, IEEE Transactions on Mobile Computing, 6:2, (164-178), Online publication date: 1-Feb-2007.
  689. Chekuri C, Hajiaghayi M, Kortsarz G and Salavatipour M Approximation algorithms for node-weighted buy-at-bulk network design Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, (1265-1274)
  690. Carr R, Konjevod G, Little G, Natarajan V and Parekh O Compacting cuts Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, (43-52)
  691. Gilpin A and Sandholm T Information-theoretic approaches to branching in search Proceedings of the 20th international joint conference on Artifical intelligence, (2286-2292)
  692. Levin A and Segev D (2006). Partial multicuts in trees, Theoretical Computer Science, 369:1, (384-395), Online publication date: 15-Dec-2006.
  693. Dumrauf D and Gairing M Price of anarchy for polynomial wardrop games Proceedings of the Second international conference on Internet and Network Economics, (319-330)
  694. Krishnan K and Chandran L Hardness of approximation results for the problem of finding the stopping distance in tanner graphs Proceedings of the 26th international conference on Foundations of Software Technology and Theoretical Computer Science, (69-80)
  695. ACM
    Venkataraman G, Feng Z, Hu J and Li P Combinatorial algorithms for fast clock mesh optimization Proceedings of the 2006 IEEE/ACM international conference on Computer-aided design, (563-567)
  696. ACM
    Chen J and Kuo T Allocation cost minimization for periodic hard real-time tasks in energy-constrained DVS systems Proceedings of the 2006 IEEE/ACM international conference on Computer-aided design, (255-260)
  697. ACM
    Routzounis S and Stamoulis G An efficient mechanism for auctioning alternative paths Proceeding from the 2006 workshop on Game theory for communications and networks, (12-es)
  698. ACM
    Alon N, Awerbuch B, Azar Y, Buchbinder N and Naor J (2006). A general approach to online network optimization problems, ACM Transactions on Algorithms, 2:4, (640-660), Online publication date: 1-Oct-2006.
  699. Elomaa T, Kujala J and Rousu J Practical approximation of optimal multivariate discretization Proceedings of the 16th international conference on Foundations of Intelligent Systems, (612-621)
  700. Çivril A, Magdon-Ismail M and Bocek-Rivele E SSDE Proceedings of the 14th international conference on Graph drawing, (30-41)
  701. Manthey B and Ram L Approximation algorithms for multi-criteria traveling salesman problems Proceedings of the 4th international conference on Approximation and Online Algorithms, (302-315)
  702. Galbiati G and Maffioli F Approximating maximum cut with limited unbalance Proceedings of the 4th international conference on Approximation and Online Algorithms, (202-213)
  703. Fukunaga T and Nagamochi H Network design with edge-connectivity and degree constraints Proceedings of the 4th international conference on Approximation and Online Algorithms, (188-201)
  704. Li Gørtz I and Wirth A (2006). Asymmetry in k-center variants, Theoretical Computer Science, 361:2, (188-199), Online publication date: 1-Sep-2006.
  705. Demaine E, Emanuel D, Fiat A and Immorlica N (2006). Correlation clustering in general weighted graphs, Theoretical Computer Science, 361:2, (172-187), Online publication date: 1-Sep-2006.
  706. Coja-Oghlan A, Krumke S and Nierhoff T (2006). A heuristic for the Stacker Crane Problem on trees which is almost surely exact, Journal of Algorithms, 61:1, (1-19), Online publication date: 1-Sep-2006.
  707. Ambühl C, Erlebach T, Mihalák M and Nunkesser M Constant-factor approximation for minimum-weight (connected) dominating sets in unit disk graphs Proceedings of the 9th international conference on Approximation Algorithms for Combinatorial Optimization Problems, and 10th international conference on Randomization and Computation, (3-14)
  708. Grohe M The structure of tractable constraint satisfaction problems Proceedings of the 31st international conference on Mathematical Foundations of Computer Science, (58-72)
  709. Ravi R and Sinha A (2006). Hedging Uncertainty, Mathematical Programming: Series A and B, 108:1, (97-114), Online publication date: 1-Aug-2006.
  710. Gao J, Guibas L and Nguyen A (2006). Deformable spanners and applications, Computational Geometry: Theory and Applications, 35:1-2, (2-19), Online publication date: 1-Aug-2006.
  711. ACM
    Chen J and Kuo T (2006). Procrastination for leakage-aware rate-monotonic scheduling on a dynamic voltage scaling processor, ACM SIGPLAN Notices, 41:7, (153-162), Online publication date: 12-Jul-2006.
  712. Chakrabarty D, Mehta A and Vazirani V Design is as easy as optimization Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part I, (477-488)
  713. Epstein L and Levin A A robust APTAS for the classical bin packing problem Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part I, (214-225)
  714. Angelopoulos S The node-weighted steiner problem in graphs of restricted node weights Proceedings of the 10th Scandinavian conference on Algorithm Theory, (208-219)
  715. Arora S and Karakostas G (2006). A 2 + ź approximation algorithm for the k-MST problem, Mathematical Programming: Series A and B, 107:3, (491-504), Online publication date: 1-Jul-2006.
  716. Fotakis D and Gritzalis S (2006). Efficient heuristic algorithms for correcting the Cascade Vulnerability Problem for interconnected networks, Computer Communications, 29:11, (2109-2122), Online publication date: 1-Jul-2006.
  717. Lin P, Ngo H, Qiao C, Wang X, Wang T and Qian D Minimum Cost Wireless Broadband Overlay Network Planning Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, (228-236)
  718. Borodin A Further reflections on a theory for basic algorithms Proceedings of the Second international conference on Algorithmic Aspects in Information and Management, (1-9)
  719. ACM
    Chen J and Kuo T Procrastination for leakage-aware rate-monotonic scheduling on a dynamic voltage scaling processor Proceedings of the 2006 ACM SIGPLAN/SIGBED conference on Language, compilers, and tool support for embedded systems, (153-162)
  720. Nikolova E, Brand M and Karger D Optimal route planning under uncertainty Proceedings of the Sixteenth International Conference on International Conference on Automated Planning and Scheduling, (131-140)
  721. Asahiro Y, Furukawa T, Ikegami K and Miyano E How to pack directed acyclic graphs into small blocks Proceedings of the 6th Italian conference on Algorithms and Complexity, (272-283)
  722. ACM
    Bin Tariq M, Ammar M and Zegura E Message ferry route design for sparse ad hoc networks with mobile nodes Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing, (37-48)
  723. ACM
    Samorodnitsky A and Trevisan L Gowers uniformity, influence of variables, and PCPs Proceedings of the thirty-eighth annual ACM symposium on Theory of Computing, (11-20)
  724. Kohli R, Krishnamurti R and Jedidi K (2006). Subset-conjunctive rules for breast cancer diagnosis, Discrete Applied Mathematics, 154:7, (1100-1112), Online publication date: 1-May-2006.
  725. ACM
    Krause A, Guestrin C, Gupta A and Kleinberg J Near-optimal sensor placements Proceedings of the 5th international conference on Information processing in sensor networks, (2-10)
  726. Ravi R Matching based augmentations for approximating connectivity problems Proceedings of the 7th Latin American conference on Theoretical Informatics, (13-24)
  727. Xavier E and Miyazawa F (2006). Approximation schemes for knapsack problems with shelf divisions, Theoretical Computer Science, 352:1, (71-84), Online publication date: 7-Mar-2006.
  728. Hsu H, Chen J and Kuo T Multiprocessor synthesis for periodic hard real-time tasks under a given energy constraint Proceedings of the conference on Design, automation and test in Europe: Proceedings, (1061-1066)
  729. Murat C and Paschos V (2006). On the probabilistic minimum coloring and minimum k-coloring, Discrete Applied Mathematics, 154:3, (564-586), Online publication date: 1-Mar-2006.
  730. Murat C and Paschos V (2006). On the probabilistic minimum coloring and minimum k-coloring, Discrete Applied Mathematics, 154:3, (564-586), Online publication date: 1-Mar-2006.
  731. ACM
    Guha S, Koudas N and Shim K (2006). Approximation and streaming algorithms for histogram construction problems, ACM Transactions on Database Systems, 31:1, (396-438), Online publication date: 1-Mar-2006.
  732. Mihail M, Papadimitriou C and Saberi A (2006). On certain connectivity properties of the internet topology, Journal of Computer and System Sciences, 72:2, (239-251), Online publication date: 1-Mar-2006.
  733. Lin G, Nagarajan C, Rajaraman R and Williamson D A general approach for incremental approximation and hierarchical clustering Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (1147-1156)
  734. Gupta A and Talwar K Approximating unique games Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (99-106)
  735. Bar-Yehuda R and Rawitz D A tale of two methods Theoretical Computer Science, (196-217)
  736. ACM
    Bracht E, Meira L and Miyazawa F (2005). A greedy approximation algorithm for the uniform metric labeling problem analyzed by a primal-dual technique, ACM Journal of Experimental Algorithmics, 10, (2.11-es), Online publication date: 31-Dec-2005.
  737. Klasing R, Lotker Z, Navarra A and Perennes S From balls and bins to points and vertices Proceedings of the 16th international conference on Algorithms and Computation, (757-766)
  738. Khachiyan L, Boros E, Borys K, Elbassioni K, Gurvich V and Makino K Generating cut conjunctions and bridge avoiding extensions in graphs Proceedings of the 16th international conference on Algorithms and Computation, (156-165)
  739. Elbassioni K, Katriel I, Kutz M and Mahajan M Simultaneous matchings Proceedings of the 16th international conference on Algorithms and Computation, (106-115)
  740. Fotakis D A primal-dual algorithm for online non-uniform facility location Proceedings of the 10th Panhellenic conference on Advances in Informatics, (47-56)
  741. Kolliopoulos S and Young N (2005). Approximation algorithms for covering/packing integer programs, Journal of Computer and System Sciences, 71:4, (495-505), Online publication date: 1-Nov-2005.
  742. Shachnai H, Tamir T and Yehezkely O Approximation schemes for packing with item fragmentation Proceedings of the Third international conference on Approximation and Online Algorithms, (334-347)
  743. Levin A and Segev D Partial multicuts in trees Proceedings of the Third international conference on Approximation and Online Algorithms, (320-333)
  744. Fujito T and Kurahashi H A better-than-greedy algorithm for k-set multicover Proceedings of the Third international conference on Approximation and Online Algorithms, (176-189)
  745. Ferrante A, Parlato G, Sorrentino F and Ventre C Improvements for truthful mechanisms with verifiable one-parameter selfish agents Proceedings of the Third international conference on Approximation and Online Algorithms, (147-160)
  746. Elomaa T, Kujala J and Rousu J Approximation algorithms for minimizing empirical error by axis-parallel hyperplanes Proceedings of the 16th European conference on Machine Learning, (547-555)
  747. Aissi H, Bazgan C and Vanderpooten D Approximation complexity of min-max (regret) versions of shortest path, spanning tree, and knapsack Proceedings of the 13th annual European conference on Algorithms, (862-873)
  748. Tang X and Xu J (2005). QoS-Aware Replica Placement for Content Distribution, IEEE Transactions on Parallel and Distributed Systems, 16:10, (921-932), Online publication date: 1-Oct-2005.
  749. Moran S and Snir S Efficient approximation of convex recolorings Proceedings of the 8th international workshop on Approximation, Randomization and Combinatorial Optimization Problems, and Proceedings of the 9th international conference on Randamization and Computation: algorithms and techniques, (192-208)
  750. Mestre J A primal-dual approximation algorithm for partial vertex cover Proceedings of the 8th international workshop on Approximation, Randomization and Combinatorial Optimization Problems, and Proceedings of the 9th international conference on Randamization and Computation: algorithms and techniques, (182-191)
  751. Chepoi V, Estellon B and Vaxès Y Approximation algorithms for forests augmentation ensuring two disjoint paths of bounded length Proceedings of the 9th international conference on Algorithms and Data Structures, (282-293)
  752. Berger A and Parekh O Linear time algorithms for generalized edge dominating set problems Proceedings of the 9th international conference on Algorithms and Data Structures, (233-243)
  753. Berman P and DasGupta B Approximating the online set multicover problems via randomized winnowing Proceedings of the 9th international conference on Algorithms and Data Structures, (110-121)
  754. DasGupta B, Konwar K, Mandoiu I and Shvartsman A (2005). Highly scalable algorithms for robust string barcoding, International Journal of Bioinformatics Research and Applications, 1:2, (145-161), Online publication date: 1-Aug-2005.
  755. ACM
    Gupta A, Maggs B, Oprea F and Reiter M Quorum placement in networks to minimize access delays Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing, (87-96)
  756. Borodin A, Cashman D and Magen A How well can primal-dual and local-ratio algorithms perform? Proceedings of the 32nd international conference on Automata, Languages and Programming, (943-955)
  757. Gairing M, Lücking T, Monien B and Tiemann K Nash equilibria, the price of anarchy and the fully mixed nash equilibrium conjecture Proceedings of the 32nd international conference on Automata, Languages and Programming, (51-65)
  758. ACM
    Mishra A, Banerjee S and Arbaugh W (2005). Weighted coloring based channel assignment for WLANs, ACM SIGMOBILE Mobile Computing and Communications Review, 9:3, (19-31), Online publication date: 1-Jul-2005.
  759. ACM
    Chuzhoy J, Guha S, Halperin E, Khanna S, Kortsarz G, Krauthgamer R and Naor J (2005). Asymmetric k-center is log* n-hard to approximate, Journal of the ACM, 52:4, (538-551), Online publication date: 1-Jul-2005.
  760. Kako A, Ono T, Hirata T and Halldórsson M Approximation algorithms for the weighted independent set problem Proceedings of the 31st international conference on Graph-Theoretic Concepts in Computer Science, (341-350)
  761. Cheng S, Jia X, Hung F and Wang Y Energy efficient broadcasting and multicasting in static wireless ad hoc networks Proceedings of the First international conference on Algorithmic Applications in Management, (16-25)
  762. Gabow H On the L ∞ -norm of extreme points for crossing supermodular directed network LPs Proceedings of the 11th international conference on Integer Programming and Combinatorial Optimization, (392-406)
  763. ACM
    Khot S (2005). Guest column: inapproximability results via Long Code based PCPs, ACM SIGACT News, 36:2, (25-42), Online publication date: 1-Jun-2005.
  764. Coja-Oghlan A, Krumke S and Nierhoff T (2005). A Hard Dial-a-Ride Problem that is Easy on Average, Journal of Scheduling, 8:3, (197-210), Online publication date: 1-Jun-2005.
  765. Bilò D and Proietti G Range augmentation problems in static ad-hoc wireless networks Proceedings of the 12th international conference on Structural Information and Communication Complexity, (49-64)
  766. ACM
    Cheriyan J and Vetta A Approximation algorithms for network design with metric costs Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, (167-175)
  767. ACM
    Ino H, Kudo M and Nakamura A Partitioning of Web graphs by community topology Proceedings of the 14th international conference on World Wide Web, (661-669)
  768. Heinrich-Litan L and Lübbecke M Rectangle covers revisited computationally Proceedings of the 4th international conference on Experimental and Efficient Algorithms, (55-66)
  769. Papadimitriou C Tα Παιδíα Παíζϵι the interaction between algorithms and game theory Proceedings of the 4th international conference on Experimental and Efficient Algorithms, (1-3)
  770. Gaur D and Krishnamurti R The capacitated max-k-cut problem Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV, (670-679)
  771. Seo J, Park S, Lee S and Kim D Regrouping service sites Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV, (652-661)
  772. Escoffier B and Paschos V Differential approximation of MIN SAT, MAX SAT and related problems Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV, (192-201)
  773. Subhadrabandhu D, Sarkar S and Anjum F RIDA Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (1069-1082)
  774. Viamontes G, Markov I and Hayes J (2005). Is Quantum Search Practical?, Computing in Science and Engineering, 7:3, (62-70), Online publication date: 1-May-2005.
  775. O'Connell T and Stearns R (2005). Mechanism design for software agents with complete information, Decision Support Systems, 39:2, (197-217), Online publication date: 1-Apr-2005.
  776. Devanur N, Mihail M and Vazirani V (2005). Strategyproof cost-sharing mechanisms for set cover and facility location games, Decision Support Systems, 39:1, (11-22), Online publication date: 1-Mar-2005.
  777. Markakis E and Saberi A (2005). On the core of the multicommodity flow game, Decision Support Systems, 39:1, (3-10), Online publication date: 1-Mar-2005.
  778. Cardinal J and Langerman S (2005). Designing small keyboards is hard, Theoretical Computer Science, 332:1-3, (405-415), Online publication date: 28-Feb-2005.
  779. Immorlica N, Mahdian M and Mirrokni V Cycle cover with short cycles Proceedings of the 22nd annual conference on Theoretical Aspects of Computer Science, (641-653)
  780. Sümer Ö Partial covering of hypergraphs Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms, (572-581)
  781. Gabow H, Goemans M, Tardos É and Williamson D Approximating the smallest k-edge connected spanning subgraph by LP-rounding Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms, (562-571)
  782. Lee J On distance scales, embeddings, and efficient relaxations of the cut cone Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms, (92-101)
  783. Milis I Approximating a class of classification problems Efficient Approximation and Online Algorithms, (213-249)
  784. Angel E A survey of approximation results for local search algorithms Efficient Approximation and Online Algorithms, (30-73)
  785. Afrati F On approximation algorithms for data mining applications Efficient Approximation and Online Algorithms, (1-29)
  786. Uehara R and Uno Y Efficient Algorithms for the Longest Path Problem Algorithms and Computation, (871-883)
  787. ACM
    Elkin M (2004). Distributed approximation, ACM SIGACT News, 35:4, (40-57), Online publication date: 1-Dec-2004.
  788. ACM
    O'Donnell A and Sethu H On achieving software diversity for improved network security using distributed coloring algorithms Proceedings of the 11th ACM conference on Computer and communications security, (121-131)
  789. Leonardi S and Schäfer G (2004). Cross-monotonic cost sharing methods for connected facility location games, Theoretical Computer Science, 326:1-3, (431-442), Online publication date: 20-Oct-2004.
  790. ACM
    Bejerano Y, Han S and Li L Fairness and load balancing in wireless LANs using association control Proceedings of the 10th annual international conference on Mobile computing and networking, (315-329)
  791. Fujito T and Yabuta T Submodular integer cover and its application to production planning Proceedings of the Second international conference on Approximation and Online Algorithms, (154-166)
  792. Borodin A, Boyar J and Larsen K Priority algorithms for graph optimization problems Proceedings of the Second international conference on Approximation and Online Algorithms, (126-139)
  793. Shachnai H, Shmueli O and Sayegh R Approximation schemes for deal splitting and covering integer programs with multiplicity constraints Proceedings of the Second international conference on Approximation and Online Algorithms, (111-125)
  794. ACM
    Wu C, Kuo T and Yang C Energy-efficient flash-memory storage systems with an interrupt-emulation mechanism Proceedings of the 2nd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis, (134-139)
  795. Bidyuk B and Dechter R On finding minimal w-cutset Proceedings of the 20th conference on Uncertainty in artificial intelligence, (43-50)
  796. ACM
    Czumaj A and Sohler C Estimating the weight of metric minimum spanning trees in sublinear-time Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, (175-183)
  797. ACM
    Chuzhoy J, Guha S, Halperi E, Khanna S, Kortsarz G and Nao J Asymmetric k-center is log* n-hard to approximate Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, (21-27)
  798. ACM
    Arora S, Rao S and Vazirani U Expander flows, geometric embeddings and graph partitioning Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, (222-231)
  799. ACM
    Pinto A, Bonivento A, Sangiovanni-Vincentelli A, Passerone R and Sgroi M System level design paradigms Proceedings of the 41st annual Design Automation Conference, (537-563)
  800. ACM
    Park S, Vedantham R, Sivakumar R and Akyildiz I A scalable approach for reliable downstream data delivery in wireless sensor networks Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing, (78-89)
  801. ACM
    Goemans M, Li L, Mirrokni V and Thottan M Market sharing games applied to content distribution in ad-hoc networks Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing, (55-66)
  802. ACM
    Kirovski D Toward an automated verification of certificates of authenticity Proceedings of the 5th ACM conference on Electronic commerce, (160-169)
  803. ACM
    Lipton R, Markakis E, Mossel E and Saberi A On approximately fair allocations of indivisible goods Proceedings of the 5th ACM conference on Electronic commerce, (125-131)
  804. ACM
    Abrams Z, Goel A and Plotkin S Set k-cover algorithms for energy efficient monitoring in wireless sensor networks Proceedings of the 3rd international symposium on Information processing in sensor networks, (424-432)
  805. ACM
    Chen J, Kuo T and Yang C Profit-driven uniprocessor scheduling with energy and timing constraints Proceedings of the 2004 ACM symposium on Applied computing, (834-840)
  806. ACM
    Garofalakis M and Gibbons P (2004). Probabilistic wavelet synopses, ACM Transactions on Database Systems, 29:1, (43-90), Online publication date: 1-Mar-2004.
  807. Goemans M and Skutella M (2004). Cooperative facility location games, Journal of Algorithms, 50:2, (194-214), Online publication date: 1-Feb-2004.
  808. Archer A, Fakcharoenphol J, Harrelson C, Krauthgamer R, Talwar K and Tardos É Approximate classification via earthmover metrics Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (1079-1087)
  809. Alon N, Awerbuch B, Azar Y, Buchbinder N and Naor J A general approach to online network optimization problems Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (577-586)
  810. Davis S and Impagliazzo R Models of greedy algorithms for graph problems Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (381-390)
  811. Ravi R and Sinha A Multicommodity facility location Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (342-349)
  812. Baswana S and Sen S Approximate distance oracles for unweighted graphs in Õ (n2) time Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (271-280)
  813. Correa J and Kenyon C Approximation schemes for multidimensional packing Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (186-195)
  814. ACM
    Wu C, Chang L and Kuo T An efficient R-tree implementation over flash-memory storage systems Proceedings of the 11th ACM international symposium on Advances in geographic information systems, (17-24)
  815. ACM
    Jain K, Mahdian M, Markakis E, Saberi A and Vazirani V (2003). Greedy facility location algorithms analyzed using dual fitting with factor-revealing LP, Journal of the ACM, 50:6, (795-824), Online publication date: 1-Nov-2003.
  816. ACM
    Bejerano Y, Immorlica N, Naor J and Smith M Efficient location area planning for personal communication systems Proceedings of the 9th annual international conference on Mobile computing and networking, (109-121)
  817. Chaudhuri S, Ganesan P and Narasayya V Primitives for workload summarization and implications for SQL Proceedings of the 29th international conference on Very large data bases - Volume 29, (730-741)
  818. Kolliopoulos S (2003). Approximating covering integer programs with multiplicity constraints, Discrete Applied Mathematics, 129:2-3, (461-473), Online publication date: 1-Aug-2003.
  819. Naor J, Shachnai H and Tamir T Real-time scheduling with a budget Proceedings of the 30th international conference on Automata, languages and programming, (1123-1137)
  820. Bhatia R, Chuzhoy J, Freund A and Naor J Algorithmic aspects of bandwidth trading Proceedings of the 30th international conference on Automata, languages and programming, (751-766)
  821. Chekuri C, Guha S and Naor J Approximating Steiner k-cuts Proceedings of the 30th international conference on Automata, languages and programming, (189-199)
  822. Gandhi R, Halperin E, Khuller S, Kortsarz G and Srinivasan A An improved approximation algorithm for vertex cover with hard capacities Proceedings of the 30th international conference on Automata, languages and programming, (164-175)
  823. ACM
    Gkantsidis C, Mihail M and Saberi A Conductance and congestion in power law graphs Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (148-159)
  824. ACM
    Gkantsidis C, Mihail M and Saberi A (2003). Conductance and congestion in power law graphs, ACM SIGMETRICS Performance Evaluation Review, 31:1, (148-159), Online publication date: 10-Jun-2003.
  825. ACM
    Devanur N, Mihail M and Vazirani V Strategyproof cost-sharing mechanisms for set cover and facility location games Proceedings of the 4th ACM conference on Electronic commerce, (108-114)
  826. ACM
    Markakis E and Saberi A On the core of the multicommodity flow game Proceedings of the 4th ACM conference on Electronic commerce, (93-97)
  827. ACM
    Nuggehalli P, Srinivasan V and Chiasserini C Energy-efficient caching strategies in ad hoc wireless networks Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, (25-34)
  828. Chandran L (2003). A lower bound for the hitting set size for combinatorial rectangles and an application, Information Processing Letters, 86:2, (75-78), Online publication date: 30-Apr-2003.
  829. Guha S, Meyerson A, Mishra N, Motwani R and O'Callaghan L (2003). Clustering Data Streams, IEEE Transactions on Knowledge and Data Engineering, 15:3, (515-528), Online publication date: 1-Mar-2003.
  830. Bläser M A new approximation algorithm for the asymmetric TSP with triangle inequality Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms, (638-645)
  831. Eisenbrand F, Funke S, Garg N and Könemann J A combinatorial algorithm for computing a maximum independent set in a t-perfect graph Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms, (517-522)
  832. Jain K, Mandoiu I, Vazirani V and Williamson D (2002). A primal-dual schema based approximation algorithm for the element connectivity problem, Journal of Algorithms, 45:1, (1-15), Online publication date: 1-Oct-2002.
  833. ACM
    Sandholm T, Suri S, Gilpin A and Levine D Winner determination in combinatorial auction generalizations Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1, (69-76)
  834. ACM
    Jain K, Mahdian M and Saberi A A new greedy approach for facility location problems Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, (731-740)
  835. ACM
    Jain K and Vazirani V Equitable cost allocations via primal-dual-type algorithms Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, (313-321)
  836. Carr R and Vempala S (2002). Randomized metarounding, Random Structures & Algorithms, 20:3, (343-352), Online publication date: 1-May-2002.
  837. Williamson D (2002). The primal-dual method for approximation algorithms, Mathematical Programming: Series A and B, 91:3, (447-478), Online publication date: 1-Feb-2002.
  838. ACM
    Jain K and Vazirani V Applications of approximation algorithms to cooperative games Proceedings of the thirty-third annual ACM symposium on Theory of computing, (364-372)
  839. Rautenbach D and Reed B Approximately covering by cycles in planar graphs Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms, (402-406)
  840. Goemans M and Skutella M Cooperative facility location games Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms, (76-85)
  841. Măndoiu I, Vazirani V and Ganley J A new heuristic for rectilinear Steiner trees Proceedings of the 1999 IEEE/ACM international conference on Computer-aided design, (157-162)
  842. Soliman H and Leon-Garcia A QoS-aware Joint RRH activation and clustering in cloud-RANs 2016 IEEE Wireless Communications and Networking Conference, (1-6)
  843. Cicalese F, Gargano L and Vaccaro U Approximating probability distributions with short vectors, via information theoretic distance measures 2016 IEEE International Symposium on Information Theory (ISIT), (1138-1142)
  844. Gong W, Liu H, Liu K, Ma Q and Liu Y Exploiting channel diversity for rate adaptation in backscatter communication networks IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, (1-9)
  845. Mitev M, Chorti A and Reed M Subcarrier Scheduling for Joint Data Transfer and Key Generation Schemes in Multicarrier Systems 2019 IEEE Global Communications Conference (GLOBECOM), (1-6)
Contributors
  • University of California, Irvine

Reviews

Dimitrios Katsaros

An excellent source of information for a young and exciting research field that of devising approximation algorithms for numerous NP-hard problems is provided in this book. The author has conducted premium quality research in various topics, and during the past ten years has advanced the field of approximation algorithms. This is an ideal introductory book for this field, written by a highly qualified author. The first of the books three parts covers combinatorial algorithms for a number of important problems. Among these problems are the set cover, the metric Steiner tree, the traveling salesperson, the knapsack, and the bin packing problems. The second part presents algorithms, which are based on the linear programming paradigm. These algorithms are categorized under two techniques: the rounding and the primal-dual schema. These schemes are exhibited using problems like the set cover, the facility location, and so on. Finally, the third part covers the problem of finding a shortest vector in a lattice, the approximability of counting the solutions of a given problem instance, the hardness of devising approximation algorithms for many key problems, and also some open problems of the field. Although it is tempting to comment on each part of the book individually, it is better to treat it as a whole. The book from the first glance reveals a great deal of insight about the authors very deep knowledge of the topic. This is immediately seen, if one considers the set of problems that were selected to present the ideas and fundamental techniques behind the approximability of algorithms. These problems are well known and occupy a central position in the teaching of any course related to the design of algorithms. The author has achieved a combination of mathematical precision and clarity of presentation, so that the final text is comprehensible without sacrificing mathematical elegance. Other advantages of the book are the set of exercises and the short notes at the end of each chapter. The exercises are indeed very instructive and sometimes very challenging; some more properly expressed hints would be needed to make them less frightening. The bibliographic notes are very useful, and provide links to additional reading. If someone wanted to find any negative aspects in this book, he would mention the non-cohesive appearance of the first part (which is also admitted by the author). Moreover, he would add the paper-like appearance of the other parts as well. But I believe that this is not necessarily a shortcoming. In such books, which are targeted for graduate studies or deal with advanced mathematical topics, a nice appearance is not the primary objective; it is the rigorous mathematical presentation that is striven for. I really enjoyed reading and studying this book. I am convinced it will be a must read for anyone who is involved in the task of designing algorithms. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations