skip to main content
Skip header Section
Approximation algorithms for NP-hard problemsAugust 1996
Publisher:
  • PWS Publishing Co.
  • 20 Park Plaza Boston, MA
  • United States
ISBN:978-0-534-94968-6
Published:01 August 1996
Pages:
612
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
chapter
chapter
chapter
Hardness of approximations
pp 399–446
chapter
Online computation
pp 521–564

Cited By

  1. Jaykrishnan G and Levin A (2024). EPTAS for parallel identical machine scheduling with time restrictions, Journal of Combinatorial Optimization, 47:2, Online publication date: 1-Mar-2024.
  2. Shukla A, Erementchouk M and Mazumder P (2023). Custom CMOS Ising Machine Based on Relaxed Burer-Monteiro-Zhang Heuristic, IEEE Transactions on Computers, 72:10, (2835-2846), Online publication date: 1-Oct-2023.
  3. Halman N and Nannicini G (2022). Fully polynomial time -approximation schemes for continuous nonlinear newsvendor and continuous stochastic dynamic programs, Mathematical Programming: Series A and B, 195:1-2, (183-242), Online publication date: 1-Sep-2022.
  4. Koutecký M, Levin A, Meesum S and Onn S (2022). Approximate separable multichoice optimization over monotone systems, Discrete Optimization, 44:P1, Online publication date: 1-May-2022.
  5. Agarwal P, Ezra E and Fox K Geometric Optimization Revisited Computing and Software Science, (66-84)
  6. Xu C, Li W, Wang J and Yang Y (2021). An improved algorithm for the -MaxSAT problem: asking branchings to satisfy the clauses, Journal of Combinatorial Optimization, 42:3, (524-542), Online publication date: 1-Oct-2021.
  7. Liu K and Lu M (2021). Complete-Subgraph-Transversal-Sets problem on bounded treewidth graphs, Journal of Combinatorial Optimization, 41:4, (923-933), Online publication date: 1-May-2021.
  8. Pereira F, de Rezende P and de Souza C (2021). Effective Heuristics for the Perfect Awareness Problem, Procedia Computer Science, 195:C, (489-498), Online publication date: 1-Jan-2021.
  9. Della Croce F and Scatamacchia R (2018). The Longest Processing Time rule for identical parallel machines revisited, Journal of Scheduling, 23:2, (163-176), Online publication date: 1-Apr-2020.
  10. de Jong J and Uetz M (2019). The quality of equilibria for set packing and throughput scheduling games, International Journal of Game Theory, 49:1, (321-344), Online publication date: 1-Mar-2020.
  11. Fauske M, Mannino C and Ventura P (2019). Generalized Periodic Vehicle Routing and Maritime Surveillance, Transportation Science, 54:1, (164-183), Online publication date: 1-Jan-2020.
  12. Hatano D, Kuroki Y, Kawase Y, Sumita H, Kakimura N and Kawarabayashi K Non-zero-sum Stackelberg Budget Allocation Game for Computational Advertising PRICAI 2019: Trends in Artificial Intelligence, (568-582)
  13. Bazgan C, Fernau H and Tuza Z (2019). Aspects of upper defensive alliances, Discrete Applied Mathematics, 266:C, (111-120), Online publication date: 15-Aug-2019.
  14. ACM
    Cha S and Oh H Concolic testing with adaptively changing search heuristics Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (235-245)
  15. Sun J, Sheng H, Sun Y and Zhang X Approximation Algorithm for Stochastic Prize-Collecting Steiner Tree Problem Algorithmic Aspects in Information and Management, (261-271)
  16. Della Croce F, Scatamacchia R and T'kindt V (2019). A tight linear time $$\frac{13}{12}$$1312-approximation algorithm for the $$P2 || C_{\max }$$P2||Cmax problem, Journal of Combinatorial Optimization, 38:2, (608-617), Online publication date: 1-Aug-2019.
  17. ACM
    Guan H, Shen X and Lim S Wootz: a compiler-based framework for fast CNN pruning via composability Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, (717-730)
  18. Choudhary P, Jain P, Krithika R and Sahlot V Vertex Deletion on Split Graphs: Beyond 4-Hitting Set Algorithms and Complexity, (161-173)
  19. ACM
    Talukder A and Hong C Knapsack-based reverse influence maximization for target marketing in social networks Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (2128-2130)
  20. Li Z, Chen Q and Koltun V Combinatorial optimization with graph convolutional networks and guided tree search Proceedings of the 32nd International Conference on Neural Information Processing Systems, (537-546)
  21. ACM
    Bordino I and Gullo F Network-based Receivable Financing Proceedings of the 27th ACM International Conference on Information and Knowledge Management, (2137-2145)
  22. Choudhury F, Culpepper J, Bao Z and Sellis T (2018). Finding the optimal location and keywords in obstructed and unobstructed space, The VLDB Journal — The International Journal on Very Large Data Bases, 27:4, (445-470), Online publication date: 1-Aug-2018.
  23. Fiorini S, Krithika R, Narayanaswamy N and Raman V (2018). Approximability of Clique Transversal in Perfect Graphs, Algorithmica, 80:8, (2221-2239), Online publication date: 1-Aug-2018.
  24. ACM
    Du B, Tong Y, Zhou Z, Tao Q and Zhou W Demand-Aware Charger Planning for Electric Vehicle Sharing Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (1330-1338)
  25. Fu B Partial Sublinear Time Approximation and Inapproximation for Maximum Coverage Computing and Combinatorics, (492-503)
  26. Schieber B, Shachnai H, Tamir G and Tamir T (2018). A Theory and Algorithms for Combinatorial Reoptimization, Algorithmica, 80:2, (576-607), Online publication date: 1-Feb-2018.
  27. Li W, Xu C, Wang J and Yang Y An Improved Branching Algorithm for (n, 3)-MaxSAT Based on Refined Observations Combinatorial Optimization and Applications, (94-108)
  28. ACM
    ElSherief M, Vigil-Hayes M, Raghavendra R and Belding E Whom to Query? Proceedings of the First ACM Workshop on Mobile Crowdsensing Systems and Applications, (31-37)
  29. Farbstein B and Levin A (2017). Maximum coverage problem with group budget constraints, Journal of Combinatorial Optimization, 34:3, (725-735), Online publication date: 1-Oct-2017.
  30. Garcia-Diaz J, Sanchez-Hernandez J, Menchaca-Mendez R and Menchaca-Mendez R (2017). When a worse approximation factor gives better performance, Journal of Heuristics, 23:5, (349-366), Online publication date: 1-Oct-2017.
  31. Deng D, Kim A, Madden S and Stonebraker M (2017). SilkMoth, Proceedings of the VLDB Endowment, 10:10, (1082-1093), Online publication date: 1-Jun-2017.
  32. Cheng P, Wang S, Ma J, Sun J and Xiong H Learning to Recommend Accurate and Diverse Items Proceedings of the 26th International Conference on World Wide Web, (183-192)
  33. Escoffier B, Gourvès L and Monnot J (2017). The Price of Optimum, Algorithmica, 77:3, (836-866), Online publication date: 1-Mar-2017.
  34. Im S and Moseley B Fair scheduling via iterative quasi-uniform sampling Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, (2601-2615)
  35. ACM
    Ta V and Liu C Stock market analysis using clustering techniques Proceedings of the 7th Symposium on Information and Communication Technology, (99-106)
  36. Angel E, Bampis E, Kononov A, Paparas D, Pountourakis E and Zissimopoulos V (2016). Clustering on k -edge-colored graphs, Discrete Applied Mathematics, 211:C, (15-22), Online publication date: 1-Oct-2016.
  37. Le T, Kalantarian H and Gerla M (2016). A novel social contact graph-based routing strategy for workload and throughput fairness in delay tolerant networks, Wireless Communications & Mobile Computing, 16:11, (1352-1362), Online publication date: 10-Aug-2016.
  38. Bhatia A and Hansdah R (2016). TRM-MAC, Computer Networks: The International Journal of Computer and Telecommunications Networking, 104:C, (79-93), Online publication date: 20-Jul-2016.
  39. ACM
    Li T, Liu Q and Zhou X Practical Human Sensing in the Light Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, (71-84)
  40. Xu D, Wang F, Du D and Wu C (2016). Approximation algorithms for submodular vertex cover problems with linear/submodular penalties using primal-dual technique, Theoretical Computer Science, 630:C, (117-125), Online publication date: 30-May-2016.
  41. Komodakis N, Pawan Kumar M and Paragios N (2016). Hyper-Graphs Inference through Convex Relaxations and Move Making Algorithms, Foundations and Trends® in Computer Graphics and Vision, 10:1, (1-102), Online publication date: 1-May-2016.
  42. ACM
    Belém F, Batista C, Santos R, Almeida J and Gonçalves M (2016). Beyond Relevance, ACM Transactions on Intelligent Systems and Technology, 7:3, (1-34), Online publication date: 1-Apr-2016.
  43. Shin D, He S and Zhang J (2016). Robust and cost-effective design of cyber-physical systems, IEEE/ACM Transactions on Networking, 24:2, (1081-1094), Online publication date: 1-Apr-2016.
  44. Choudhury F, Culpepper J, Sellis T and Cao X (2016). Maximizing bichromatic reverse spatial and textual k nearest neighbor queries, Proceedings of the VLDB Endowment, 9:6, (456-467), Online publication date: 1-Jan-2016.
  45. Xu C, Chen J and Wang J Improved MaxSAT Algorithms for Instances of Degree 3 Proceedings of the 9th International Conference on Combinatorial Optimization and Applications - Volume 9486, (20-30)
  46. Belaid I and Eyraud-Dubois L Column Generation Integer Programming for Allocating Jobs with Periodic Demand Variations Revised Selected Papers of the First International Workshop on Algorithmic Aspects of Cloud Computing - Volume 9511, (35-48)
  47. ACM
    Mottin D, Bonchi F and Gullo F Graph Query Reformulation with Diversity Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (825-834)
  48. ACM
    Gao W, Pourhassan M and Neumann F Runtime Analysis of Evolutionary Diversity Optimization and the Vertex Cover Problem Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1395-1396)
  49. Carastan-Santos D, de Camargo R, Martins-Jr D, Song S, Rozante L and Borelli F A multi-GPU hitting set algorithm for GRNs inference Proceedings of the 15th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, (313-322)
  50. Yuan Y, Wang G, Chen L and Wang H (2015). Graph similarity search on large uncertain graph databases, The VLDB Journal — The International Journal on Very Large Data Bases, 24:2, (271-296), Online publication date: 1-Apr-2015.
  51. Santos R, Macdonald C and Ounis I (2015). Search Result Diversification, Foundations and Trends in Information Retrieval, 9:1, (1-90), Online publication date: 1-Mar-2015.
  52. ACM
    Feige U and Jozeph S Separation between Estimation and Approximation Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, (271-276)
  53. Bandyapadhyay S, Banik A, Das S and Sarkar H (2015). Voronoi game on graphs, Theoretical Computer Science, 562:C, (270-282), Online publication date: 11-Jan-2015.
  54. Daskalakis C and Weinberg S Bayesian truthful mechanisms for job scheduling from bi-criterion approximation algorithms Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (1934-1952)
  55. Pei Y (2015). Algorithmic mechanism design of evolutionary computation, Computational Intelligence and Neuroscience, 2015, (64-64), Online publication date: 1-Jan-2015.
  56. ACM
    Kang M and Gligor V Routing Bottlenecks in the Internet Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, (321-333)
  57. Chen Z, Fan Y and Wang L (2014). Parameterized and approximation algorithms for finding two disjoint matchings, Theoretical Computer Science, 556:C, (85-93), Online publication date: 30-Oct-2014.
  58. ACM
    Wang Y, Hu W, Wu Y and Cao G SmartPhoto Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing, (113-122)
  59. Gamarnik D, Goldberg D and Weber T (2014). Correlation Decay in Random Decision Networks, Mathematics of Operations Research, 39:2, (229-261), Online publication date: 1-May-2014.
  60. Tajuddin N, Maniymaran B and Jacobsen H Minimal broker overlay design for content-based publish/subscribe systems Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research, (25-39)
  61. ACM
    Hillar C and Lim L (2013). Most Tensor Problems Are NP-Hard, Journal of the ACM, 60:6, (1-39), Online publication date: 1-Nov-2013.
  62. Brankovic L and Fernau H (2013). A novel parameterised approximation algorithm for minimum vertex cover, Theoretical Computer Science, 511, (85-108), Online publication date: 1-Nov-2013.
  63. ACM
    Belém F, Santos R, Almeida J and Gonçalves M Topic diversity in tag recommendation Proceedings of the 7th ACM conference on Recommender systems, (141-148)
  64. ACM
    Hammar M, Karlsson R and Nilsson B Using maximum coverage to optimize recommendation systems in e-commerce Proceedings of the 7th ACM conference on Recommender systems, (265-272)
  65. ACM
    Kennedy W, Morgenstern J, Wilfong G and Zhang L Hierarchical community decomposition via oblivious routing techniques Proceedings of the first ACM conference on Online social networks, (107-118)
  66. Misra N, Narayanaswamy N, Raman V and Shankar B (2013). Solving min ones 2-sat as fast as vertex cover, Theoretical Computer Science, 506, (115-121), Online publication date: 1-Sep-2013.
  67. ACM
    Wu B, Zhao Z, Zhang E, Jiang Y and Shen X (2013). Complexity analysis and algorithm design for reorganizing data to minimize non-coalesced memory accesses on GPU, ACM SIGPLAN Notices, 48:8, (57-68), Online publication date: 23-Aug-2013.
  68. ACM
    Benoit A, Çatalyürek Ü, Robert Y and Saule E (2013). A survey of pipelined workflow scheduling, ACM Computing Surveys, 45:4, (1-36), Online publication date: 1-Aug-2013.
  69. Khandekar R, Kortsarz G and Nutov Z (2013). On some network design problems with degree constraints, Journal of Computer and System Sciences, 79:5, (725-736), Online publication date: 1-Aug-2013.
  70. Palmieri F, Buonanno L, Venticinque S, Aversa R and Di Martino B (2013). A distributed scheduling framework based on selfish autonomous agents for federated cloud environments, Future Generation Computer Systems, 29:6, (1461-1472), Online publication date: 1-Aug-2013.
  71. ACM
    Munishwar V and Abu-Ghazaleh N (2013). Coverage algorithms for visual sensor networks, ACM Transactions on Sensor Networks, 9:4, (1-36), Online publication date: 1-Jul-2013.
  72. ACM
    Küçüktunç O, Saule E, Kaya K and Çatalyürek Ü Diversified recommendation on graphs Proceedings of the 22nd international conference on World Wide Web, (715-726)
  73. Shin D and Bagchi S (2013). An optimization framework for monitoring multi-channel multi-radio wireless mesh networks, Ad Hoc Networks, 11:3, (926-943), Online publication date: 1-May-2013.
  74. ACM
    Hochbaum D and Levin A (2013). Approximation Algorithms for a Minimization Variant of the Order-Preserving Submatrices and for Biclustering Problems, ACM Transactions on Algorithms, 9:2, (1-12), Online publication date: 1-Mar-2013.
  75. ACM
    Wu B, Zhao Z, Zhang E, Jiang Y and Shen X Complexity analysis and algorithm design for reorganizing data to minimize non-coalesced memory accesses on GPU Proceedings of the 18th ACM SIGPLAN symposium on Principles and practice of parallel programming, (57-68)
  76. Harks T, König F and Matuschke J (2013). Approximation Algorithms for Capacitated Location Routing, Transportation Science, 47:1, (3-22), Online publication date: 1-Feb-2013.
  77. ACM
    Jansen T, Oliveto P and Zarges C Approximating vertex cover using edge-based representations Proceedings of the twelfth workshop on Foundations of genetic algorithms XII, (87-96)
  78. Vadlamudi S, Chakrabarti P and Sarkar S Anytime algorithms for mining groups with maximum coverage Proceedings of the Tenth Australasian Data Mining Conference - Volume 134, (209-219)
  79. Santos R, Macdonald C and Ounis I (2012). On the role of novelty for search result diversification, Information Retrieval, 15:5, (478-502), Online publication date: 1-Oct-2012.
  80. Duggal G, Patro R, Sefer E, Wang H, Filippova D, Khuller S and Kingsford C Resolving spatial inconsistencies in chromosome conformation data Proceedings of the 12th international conference on Algorithms in Bioinformatics, (288-300)
  81. Fellows M, Kulik A, Rosamond F and Shachnai H Parameterized approximation via fidelity preserving transformations Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I, (351-362)
  82. ACM
    Diedrich F, Jansen K, Prädel L, Schwarz U and Svensson O (2012). Tight approximation algorithms for scheduling with fixed jobs and nonavailability, ACM Transactions on Algorithms, 8:3, (1-15), Online publication date: 1-Jul-2012.
  83. Leithäuser N, Krumke S and Merkert M Approximating infeasible 2VPI-systems Proceedings of the 38th international conference on Graph-Theoretic Concepts in Computer Science, (225-236)
  84. Hildebrand K, Bickel B and Alexa M (2012). crdbrd: Shape Fabrication by Sliding Planar Slices, Computer Graphics Forum, 31:2pt3, (583-592), Online publication date: 1-May-2012.
  85. ACM
    Alon N, Gamzu I and Tennenholtz M Optimizing budget allocation among channels and influencers Proceedings of the 21st international conference on World Wide Web, (381-388)
  86. Fellows M, Guo J, Moser H and Niedermeier R (2011). A generalization of Nemhauser and Trotter's local optimization theorem, Journal of Computer and System Sciences, 77:6, (1141-1158), Online publication date: 1-Nov-2011.
  87. Escoffier B, Gourvès L and Monnot J The price of optimum in a matching game Proceedings of the 4th international conference on Algorithmic game theory, (81-92)
  88. Bourgeois N, Escoffier B and Paschos V (2011). Approximation of max independent set, min vertex cover and related problems by moderately exponential algorithms, Discrete Applied Mathematics, 159:17, (1954-1970), Online publication date: 1-Oct-2011.
  89. ACM
    Tsaparas P, Ntoulas A and Terzi E Selecting a comprehensive set of reviews Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, (168-176)
  90. Bar-Yehuda R, Hermelin D and Rawitz D (2011). Minimum vertex cover in rectangle graphs, Computational Geometry: Theory and Applications, 44:6-7, (356-364), Online publication date: 1-Aug-2011.
  91. Moldenhauer C Primal-dual approximation algorithms for node-weighted steiner forest on planar graphs Proceedings of the 38th international colloquim conference on Automata, languages and programming - Volume Part I, (748-759)
  92. Wang J, Li G, Yu J and Feng J (2011). Entity matching, Proceedings of the VLDB Endowment, 4:10, (622-633), Online publication date: 1-Jul-2011.
  93. ACM
    Borodin A, Cashman D and Magen A (2011). How well can primal-dual and local-ratio algorithms perform?, ACM Transactions on Algorithms, 7:3, (1-26), Online publication date: 1-Jul-2011.
  94. ACM
    Moser R and Scheder D A full derandomization of schöning's k-SAT algorithm Proceedings of the forty-third annual ACM symposium on Theory of computing, (245-252)
  95. Malik S, Silva A and Kelif J Optimal base station placement Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (66-73)
  96. ACM
    Zhang E, Jiang Y, Guo Z, Tian K and Shen X (2011). On-the-fly elimination of dynamic irregularities for GPU computing, ACM SIGPLAN Notices, 46:3, (369-380), Online publication date: 17-Mar-2011.
  97. ACM
    Zhang E, Jiang Y, Guo Z, Tian K and Shen X (2011). On-the-fly elimination of dynamic irregularities for GPU computing, ACM SIGARCH Computer Architecture News, 39:1, (369-380), Online publication date: 17-Mar-2011.
  98. ACM
    Zhang E, Jiang Y, Guo Z, Tian K and Shen X On-the-fly elimination of dynamic irregularities for GPU computing Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems, (369-380)
  99. ACM
    Chekuri C, Even G, Gupta A and Segev D (2011). Set connectivity problems in undirected graphs and the directed steiner network problem, ACM Transactions on Algorithms, 7:2, (1-17), Online publication date: 1-Mar-2011.
  100. Levin A and Yovel U (2011). Uniform unweighted set cover, Theoretical Computer Science, 412:12-14, (1033-1053), Online publication date: 1-Mar-2011.
  101. Musitelli A and Nicoletti J (2011). Competitive ratio of List Scheduling on uniform machines and randomized heuristics, Journal of Scheduling, 14:1, (89-101), Online publication date: 1-Feb-2011.
  102. Malik T, Wang X, Little P, Chaudhary A and Thakar A A dynamic data middleware cache for rapidly-growing scientific repositories Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware, (64-84)
  103. Li F and Pan X An approximation algorithm for computing minimum-length polygons in 3D images Proceedings of the 10th Asian conference on Computer vision - Volume Part IV, (641-652)
  104. ACM
    Namin A and Sridharan M Bayesian reasoning for software testing Proceedings of the FSE/SDP workshop on Future of software engineering research, (349-354)
  105. ACM
    Maiya A and Berger-Wolf T Expansion and search in networks Proceedings of the 19th ACM international conference on Information and knowledge management, (239-248)
  106. Caragiannis I, Ferreira A, Kaklamanis C, Pérennes S and Rivano H (2010). Fractional Path Coloring in Bounded Degree Trees with Applications, Algorithmica, 58:2, (516-540), Online publication date: 1-Oct-2010.
  107. Kolahi S and Lakshmanan L Exploiting conflict structures in inconsistent databases Proceedings of the 14th east European conference on Advances in databases and information systems, (320-335)
  108. Lorenz U, Martin A and Wolf J Polyhedral and algorithmic properties of quantified linear programs Proceedings of the 18th annual European conference on Algorithms: Part I, (512-523)
  109. Bar-Yehuda R, Hermelin D and Rawitz D Minimum vertex cover in rectangle graphs Proceedings of the 18th annual European conference on Algorithms: Part I, (255-266)
  110. Hajiaghayi M, Khandekar R, Kortsarz G and Mestre J The checkpoint problem Proceedings of the 13th international conference on Approximation, and 14 the International conference on Randomization, and combinatorial optimization: algorithms and techniques, (219-231)
  111. ACM
    Munishwar V and Abu-Ghazaleh N Scalable target coverage in smart camera networks Proceedings of the Fourth ACM/IEEE International Conference on Distributed Smart Cameras, (206-213)
  112. Misra N, Narayanaswamy N, Raman V and Shankar B Solving MINONES-2-SAT as fast as VERTEX COVER Proceedings of the 35th international conference on Mathematical foundations of computer science, (549-555)
  113. Friedler S and Mount D (2010). Approximation algorithm for the kinetic robust K-center problem, Computational Geometry: Theory and Applications, 43:6-7, (572-586), Online publication date: 1-Aug-2010.
  114. Dai W Some results on incremental vertex cover problem Proceedings of the 6th international conference on Algorithmic aspects in information and management, (112-118)
  115. Chen Z, Konno S and Matsushita Y Approximating maximum edge 2-coloring in simple graphs Proceedings of the 6th international conference on Algorithmic aspects in information and management, (78-89)
  116. Kulik A and Shachnai H (2010). There is no EPTAS for two-dimensional knapsack, Information Processing Letters, 110:16, (707-710), Online publication date: 1-Jul-2010.
  117. Kasiviswanathan S and Pan F Matrix interdiction problem Proceedings of the 7th international conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, (219-231)
  118. Sakai K, Sun M and Ku W Message-efficient CDS construction in MANETs Proceedings of the 5th IEEE international conference on Wireless pervasive computing, (186-191)
  119. ACM
    Santos R, Macdonald C and Ounis I Exploiting query reformulations for web search result diversification Proceedings of the 19th international conference on World wide web, (881-890)
  120. ACM
    Chierichetti F, Kumar R and Tomkins A Max-cover in map-reduce Proceedings of the 19th international conference on World wide web, (231-240)
  121. Santos R, Peng J, Macdonald C and Ounis I Explicit search result diversification through sub-queries Proceedings of the 32nd European conference on Advances in Information Retrieval, (87-99)
  122. ACM
    Delbot F and Laforest C (2010). Analytical and experimental comparison of six algorithms for the vertex cover problem, ACM Journal of Experimental Algorithmics, 15, (1.1-1.27), Online publication date: 1-Mar-2010.
  123. Escoffier B, Gourvès L and Monnot J (2010). Complexity and approximation results for the connected vertex cover problem in graphs and hypergraphs, Journal of Discrete Algorithms, 8:1, (36-49), Online publication date: 1-Mar-2010.
  124. Klein P and Young N Approximation algorithms for NP-hard optimization problems Algorithms and theory of computation handbook, (34-34)
  125. Khuller S and Raghavachari B Advanced combinatorial algorithms Algorithms and theory of computation handbook, (8-8)
  126. Raskhodnikova S Transitive-closure spanners Property testing, (167-196)
  127. Goldreich O Introduction to testing graph properties Property testing, (105-141)
  128. Raskhodnikova S Transitive-closure spanners Property testing, (167-196)
  129. Goldreich O Introduction to testing graph properties Property testing, (105-141)
  130. Karger D, Stein C and Wein J Scheduling algorithms Algorithms and theory of computation handbook, (20-20)
  131. Gairing M Covering Games Proceedings of the 5th International Workshop on Internet and Network Economics, (184-195)
  132. Das N, Ghosh P and Sen A Approximation algorithm for avoiding hotspot formation of sensor networks for temperature sensitive environments Proceedings of the 28th IEEE conference on Global telecommunications, (4566-4571)
  133. Chen L, Lu C and Zeng Z (2009). Hardness results and approximation algorithms for (weighted) paired-domination in graphs, Theoretical Computer Science, 410:47-49, (5063-5071), Online publication date: 1-Nov-2009.
  134. Gast N and Gaujal B A mean field approach for optimization in particle systems and applications Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools, (1-10)
  135. ACM
    Isard M, Prabhakaran V, Currey J, Wieder U, Talwar K and Goldberg A Quincy Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, (261-276)
  136. ACM
    Nahapetian A, Brisk P, Ghiasi S and Sarrafzadeh M (2009). An approximation algorithm for scheduling on heterogeneous reconfigurable resources, ACM Transactions on Embedded Computing Systems, 9:1, (1-20), Online publication date: 1-Oct-2009.
  137. Chen Z and Tanahashi R (2009). Approximating maximum edge 2-coloring in simple graphs via local improvement, Theoretical Computer Science, 410:45, (4543-4553), Online publication date: 1-Oct-2009.
  138. Kosowski A (2009). Approximating the maximum 2- and 3-edge-colorable subgraph problems, Discrete Applied Mathematics, 157:17, (3593-3600), Online publication date: 1-Oct-2009.
  139. ACM
    Masri W and El-Ghali M Test case filtering and prioritization based on coverage of combinations of program elements Proceedings of the Seventh International Workshop on Dynamic Analysis, (29-34)
  140. Jin G, Nakhleh L, Snir S and Tuller T (2009). Parsimony Score of Phylogenetic Networks, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 6:3, (495-505), Online publication date: 1-Jul-2009.
  141. ACM
    Jin R, Xiang Y and Liu L Cartesian contour Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (417-426)
  142. Sakai K, Sun M and Ku W Fast connected dominating set construction in mobile ad hoc networks Proceedings of the 2009 IEEE international conference on Communications, (5386-5391)
  143. Reichart R and Rappoport A Sample selection for statistical parsers Proceedings of the Thirteenth Conference on Computational Natural Language Learning, (3-11)
  144. Deng K, Zhou X, Shen H, Sadiq S and Li X (2009). Instance optimal query processing in spatial networks, The VLDB Journal — The International Journal on Very Large Data Bases, 18:3, (675-693), Online publication date: 1-Jun-2009.
  145. Zou S, Nikolaidis I and Harms J Routing and Aggregation Strategies for Contour Map Applications in Sensor Networks Proceedings of the 7th International Conference on Wired/Wireless Internet Communications, (36-47)
  146. Davendra D, Zelinka I and Onwubolu G Clustered population differential evolution approach to quadratic assignment problem Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (1224-1231)
  147. ACM
    Shin D and Bagchi S Optimal monitoring in multi-channel multi-radio wireless mesh networks Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, (229-238)
  148. Zhao S and Gao X (2009). Minimal achievable approximation ratio for MAX-MQ in finite fields, Theoretical Computer Science, 410:21-23, (2285-2290), Online publication date: 1-May-2009.
  149. ACM
    Kolahi S and Lakshmanan L On approximating optimum repairs for functional dependency violations Proceedings of the 12th International Conference on Database Theory, (53-62)
  150. Little P and Chaudhary A Object Caching for Queries and Updates Proceedings of the 3rd International Workshop on Algorithms and Computation, (394-405)
  151. ACM
    Agrawal R, Gollapudi S, Halverson A and Ieong S Diversifying search results Proceedings of the Second ACM International Conference on Web Search and Data Mining, (5-14)
  152. Buchbinder N and (Seffi) Naor J (2009). The Design of Competitive Online Algorithms via a Primal, Foundations and Trends® in Theoretical Computer Science, 3:2–3, (93-263), Online publication date: 1-Feb-2009.
  153. Zuckerman M, Procaccia A and Rosenschein J (2009). Algorithms for the coalitional manipulation problem, Artificial Intelligence, 173:2, (392-412), Online publication date: 1-Feb-2009.
  154. Bhattacharyya A, Grigorescu E, Jung K, Raskhodnikova S and Woodruff D Transitive-closure spanners Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (932-941)
  155. Diedrich F and Jansen K Improved approximation algorithms for scheduling with fixed jobs Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (675-684)
  156. Goldwasser D, Strichman O and Fine S A theory-based decision heuristic for DPLL(T) Proceedings of the 2008 International Conference on Formal Methods in Computer-Aided Design, (1-8)
  157. Jiang T, Gold N, Harman M and Li Z (2008). Locating dependence structures using search-based slicing, Information and Software Technology, 50:12, (1189-1209), Online publication date: 1-Nov-2008.
  158. ACM
    Chen C, Lin C, Yan X and Han J On effective presentation of graph patterns Proceedings of the 17th ACM conference on Information and knowledge management, (299-308)
  159. Sakai K, Sun M, Ku W and Okada H Maintaining CDS in Mobile Ad Hoc Networks Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications, (141-153)
  160. Komodakis N, Tziritas G and Paragios N (2008). Performance vs computational efficiency for optimizing single and dynamic MRFs, Computer Vision and Image Understanding, 112:1, (14-29), Online publication date: 1-Oct-2008.
  161. ACM
    Das N, Murthy S and Sen A Towards a covered and connected body sensor network for healthcare applications Proceedings of the 2nd International Workshop on Systems and Networking Support for Health Care and Assisted Living Environments, (1-3)
  162. Chen Z, Tanahashi R and Wang L (2008). An improved approximation algorithm for maximum edge 2-coloring in simple graphs, Journal of Discrete Algorithms, 6:2, (205-215), Online publication date: 1-Jun-2008.
  163. Bertossi L, Bravo L, Franconi E and Lopatenko A (2008). The complexity and approximation of fixing numerical attributes in databases under integrity constraints, Information Systems, 33:4-5, (407-434), Online publication date: 1-Jun-2008.
  164. ACM
    Dong D, Liu Y and Liao X Self-monitoring for sensor networks Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, (431-440)
  165. Ma B and Sun X More efficient algorithms for closest string and substring problems Proceedings of the 12th annual international conference on Research in computational molecular biology, (396-409)
  166. Finke G, Jost V, Queyranne M and Seb A (2008). Batch processing with interval graph compatibilities between tasks, Discrete Applied Mathematics, 156:5, (556-568), Online publication date: 1-Mar-2008.
  167. Zhang S and Chatha K Automated techniques for energy efficient scheduling on homogeneous and heterogeneous chip multi-processor architectures Proceedings of the 2008 Asia and South Pacific Design Automation Conference, (61-66)
  168. Chekuri C, Even G, Gupta A and Segev D Set connectivity problems in undirected graphs and the directed Steiner network problem Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (532-541)
  169. Kumar A and Sabharwal Y The priority k-median problem Proceedings of the 27th international conference on Foundations of software technology and theoretical computer science, (71-83)
  170. Escoffier B and Hammer P (2007). Approximation of the Quadratic Set Covering problem, Discrete Optimization, 4:3-4, (378-386), Online publication date: 1-Dec-2007.
  171. Bar-Yehuda R, Flysher G, Mestre J and Rawitz D Approximation of partial capacitated vertex cover Proceedings of the 15th annual European conference on Algorithms, (335-346)
  172. Khan M, Pandurangan G and Anil Kumar V (2007). A simple randomized scheme for constructing low-weight k-connected spanning subgraphs with applications to distributed algorithms, Theoretical Computer Science, 385:1-3, (101-114), Online publication date: 1-Oct-2007.
  173. Chen C, Yan X, Yu P, Han J, Zhang D and Gu X Towards graph containment search and indexing Proceedings of the 33rd international conference on Very large data bases, (926-937)
  174. Chaudhuri S, Chen B, Ganti V and Kaushik R Example-driven design of efficient record matching queries Proceedings of the 33rd international conference on Very large data bases, (327-338)
  175. Zhou Y, Guo Z and He J On the running time analysis of the (1+1) evolutionary algorithm for the subset sum problem Proceedings of the Life system modeling and simulation 2007 international conference on Bio-Inspired computational intelligence and applications, (73-82)
  176. Li F and Klette R Euclidean shortest paths in simple cube curves at a glance Proceedings of the 12th international conference on Computer analysis of images and patterns, (661-668)
  177. Porschen S Optimal parameterized rectangular coverings Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I, (96-109)
  178. Gairing M, Monien B and Woclaw A (2007). A faster combinatorial approximation algorithm for scheduling unrelated parallel machines, Theoretical Computer Science, 380:1-2, (87-99), Online publication date: 20-Jul-2007.
  179. ACM
    Banerjee N and Kumar R Multiobjective network design for realistic traffic models Proceedings of the 9th annual conference on Genetic and evolutionary computation, (1904-1911)
  180. Masri W, Podgurski A and Leon D (2007). An Empirical Study of Test Case Filtering Techniques Based on Exercising Information Flows, IEEE Transactions on Software Engineering, 33:7, (454-477), Online publication date: 1-Jul-2007.
  181. Ding Y, Lonsdale D, Embley D, Hepp M and Xu L Generating ontologies via language components and ontology reuse Proceedings of the 12th international conference on Applications of Natural Language to Information Systems, (131-142)
  182. ACM
    Singh M and Lau L Approximating minimum bounded degree spanning trees to within one of optimal Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (661-670)
  183. Chen Z and Tanahashi R An Improved Approximation Algorithm for Maximum Edge 2-Coloring in Simple Graphs Proceedings of the 3rd international conference on Algorithmic Aspects in Information and Management, (27-36)
  184. So A, Zhang J and Ye Y (2007). On approximating complex quadratic optimization problems via semidefinite programming relaxations, Mathematical Programming: Series A and B, 110:1, (93-110), Online publication date: 1-Jun-2007.
  185. ACM
    Chaudhuri S, Das G and Narasayya V (2007). Optimized stratified sampling for approximate query processing, ACM Transactions on Database Systems, 32:2, (9-es), Online publication date: 1-Jun-2007.
  186. Jin G, Nakhleh L, Snir S and Tuller T A new linear-time heuristic algorithm for computing the parsimony score of phylogenetic networks Proceedings of the 3rd international conference on Bioinformatics research and applications, (61-72)
  187. Nguyen H and Thiran P The Boolean Solution to the Congested IP Link Location Problem Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (2117-2125)
  188. Brenner J and Schäfer G Cost sharing methods for makespan and completion time scheduling Proceedings of the 24th annual conference on Theoretical aspects of computer science, (670-681)
  189. Oellermann O and Peters-Fransen J (2007). The strong metric dimension of graphs and digraphs, Discrete Applied Mathematics, 155:3, (356-364), Online publication date: 1-Feb-2007.
  190. Chekuri C, Hajiaghayi M, Kortsarz G and Salavatipour M Approximation algorithms for node-weighted buy-at-bulk network design Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, (1265-1274)
  191. Christodoulou G, Koutsoupias E and Vidali A A lower bound for scheduling mechanisms Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, (1163-1170)
  192. Yang Q, Yin J, Ling C and Pan R (2007). Extracting Actionable Knowledge from Decision Trees, IEEE Transactions on Knowledge and Data Engineering, 19:1, (43-56), Online publication date: 1-Jan-2007.
  193. Krishnan K and Chandran L Hardness of approximation results for the problem of finding the stopping distance in tanner graphs Proceedings of the 26th international conference on Foundations of Software Technology and Theoretical Computer Science, (69-80)
  194. ACM
    Yan X, Zhu F, Yu P and Han J (2006). Feature-based similarity search in graph structures, ACM Transactions on Database Systems, 31:4, (1418-1453), Online publication date: 1-Dec-2006.
  195. Ta D and Zhou S (2006). A network-centric approach to enhancing the interactivity of large-scale distributed virtual environments, Computer Communications, 29:17, (3553-3566), Online publication date: 1-Nov-2006.
  196. ACM
    Ma J, Dunagan J, Wang H, Savage S and Voelker G Finding diversity in remote code injection exploits Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, (53-64)
  197. Boyar J, Epstein L, Favrholdt L, Kohrt J, Larsen K, Pedersen M and Wøhlk S (2006). The maximum resource bin packing problem, Theoretical Computer Science, 362:1, (127-139), Online publication date: 11-Oct-2006.
  198. ACM
    Alon N, Awerbuch B, Azar Y, Buchbinder N and Naor J (2006). A general approach to online network optimization problems, ACM Transactions on Algorithms, 2:4, (640-660), Online publication date: 1-Oct-2006.
  199. Cai L and Huang X Fixed-parameter approximation Proceedings of the Second international conference on Parameterized and Exact Computation, (96-108)
  200. Krysta P and Loryś K (2006). Efficient approximation algorithms for the achromatic number, Theoretical Computer Science, 361:2, (150-171), Online publication date: 1-Sep-2006.
  201. DeVinney J and Priebe C (2006). A new family of proximity graphs, Discrete Applied Mathematics, 154:14, (1975-1982), Online publication date: 1-Sep-2006.
  202. Thibault N and Laforest C An optimal rebuilding strategy for a decremental tree problem Proceedings of the 13th international conference on Structural Information and Communication Complexity, (157-170)
  203. Kannan R and Wei S Approximation algorithms for power-aware scheduling of wireless sensor networks with rate and duty-cycle constraints Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems, (463-479)
  204. Gomes C, van Hoeve W and Leahu L The power of semidefinite programming relaxations for MAX-SAT Proceedings of the Third international conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, (104-118)
  205. Porschen S Algorithms for rectangular covering problems Proceedings of the 6th international conference on Computational Science and Its Applications - Volume Part I, (40-49)
  206. Busch C, Magdon-Ismail M, Mavronicolas M and Spirakis P (2006). Direct routing, Algorithmica, 45:1, (45-68), Online publication date: 1-May-2006.
  207. Ganai M, Talupur M and Gupta A SDSAT Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (135-150)
  208. Ravi R Matching based augmentations for approximating connectivity problems Proceedings of the 7th Latin American conference on Theoretical Informatics, (13-24)
  209. Mastrolilli M and Hutter M (2006). Hybrid rounding techniques for knapsack problems, Discrete Applied Mathematics, 154:4, (640-649), Online publication date: 15-Mar-2006.
  210. ACM
    Hilaire X and Oommen J The averaged mappings problem Proceedings of the 44th annual Southeast regional conference, (24-29)
  211. ACM
    Guha S, Koudas N and Shim K (2006). Approximation and streaming algorithms for histogram construction problems, ACM Transactions on Database Systems, 31:1, (396-438), Online publication date: 1-Mar-2006.
  212. Sayag T, Fine S and Mansour Y Combining multiple heuristics Proceedings of the 23rd Annual conference on Theoretical Aspects of Computer Science, (242-253)
  213. Lin G, Nagarajan C, Rajaraman R and Williamson D A general approach for incremental approximation and hierarchical clustering Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (1147-1156)
  214. Subramani K Totally clairvoyant scheduling with relative timing constraints Proceedings of the 7th international conference on Verification, Model Checking, and Abstract Interpretation, (398-411)
  215. Bar-Yehuda R and Rawitz D A tale of two methods Theoretical Computer Science, (196-217)
  216. Elbassioni K, Katriel I, Kutz M and Mahajan M Simultaneous matchings Proceedings of the 16th international conference on Algorithms and Computation, (106-115)
  217. Chen N and Rudra A Walrasian equilibrium Proceedings of the First international conference on Internet and Network Economics, (141-150)
  218. Jiang J, Song Z, Zhang H and Dou W Voronoi-Based improved algorithm for connected coverage problem in wireless sensor networks Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (224-233)
  219. Cai Z, Yin J, Liu F, Liu X and Lv S Distributed active measuring link bandwidth in IP networks Proceedings of the 2005 IFIP international conference on Network and Parallel Computing, (295-302)
  220. Cai Z, Yin J, Liu F, Liu X and Lv S Efficiently passive monitoring flow bandwidth Proceedings of the 2005 IFIP international conference on Network and Parallel Computing, (266-269)
  221. Fragoudakis C, Markou E and Zachos S How to place efficiently guards and paintings in an art gallery Proceedings of the 10th Panhellenic conference on Advances in Informatics, (145-154)
  222. Moran S and Snir S Efficient approximation of convex recolorings Proceedings of the 8th international workshop on Approximation, Randomization and Combinatorial Optimization Problems, and Proceedings of the 9th international conference on Randamization and Computation: algorithms and techniques, (192-208)
  223. Mestre J A primal-dual approximation algorithm for partial vertex cover Proceedings of the 8th international workshop on Approximation, Randomization and Combinatorial Optimization Problems, and Proceedings of the 9th international conference on Randamization and Computation: algorithms and techniques, (182-191)
  224. Boyar J, Epstein L, Favrholdt L, Kohrt J, Larsen K, Pedersen M and Wøhlk S The maximum resource bin packing problem Proceedings of the 15th international conference on Fundamentals of Computation Theory, (397-408)
  225. Tan J, Chua K and Zhang L Algorithmic and Complexity Issues of Three Clustering Methods in Microarray Data Analysis Proceedings of the 11th Annual International Conference on Computing and Combinatorics - Volume 3595, (74-83)
  226. Gairing M, Monien B and Woclaw A A faster combinatorial approximation algorithm for scheduling unrelated parallel machines Proceedings of the 32nd international conference on Automata, Languages and Programming, (828-839)
  227. Cai Z, Yin J, Liu X and Lv S An approximation algorithm for weak vertex cover problem in network management Proceedings of the First international conference on Algorithmic Applications in Management, (243-251)
  228. ACM
    Yan X, Yu P and Han J Substructure similarity search in graph databases Proceedings of the 2005 ACM SIGMOD international conference on Management of data, (766-777)
  229. So A, Zhang J and Ye Y On approximating complex quadratic optimization problems via semidefinite programming relaxations Proceedings of the 11th international conference on Integer Programming and Combinatorial Optimization, (125-135)
  230. Blum C and Blesa M (2005). New metaheuristic approaches for the edge-weighted k-cardinality tree problem, Computers and Operations Research, 32:6, (1355-1377), Online publication date: 1-Jun-2005.
  231. ACM
    Leon D, Masri W and Podgurski A An empirical evaluation of test case filtering techniques based on exercising complex information flows Proceedings of the 27th international conference on Software engineering, (412-421)
  232. Heinrich-Litan L and Lübbecke M Rectangle covers revisited computationally Proceedings of the 4th international conference on Experimental and Efficient Algorithms, (55-66)
  233. Asgeirsson E and Stein C Vertex cover approximations Proceedings of the 4th international conference on Experimental and Efficient Algorithms, (545-557)
  234. Porschen S On the rectangular subset closure of point sets Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I, (796-805)
  235. Hwang H, Lee K and Chang S (2005). The effect of machine availability on the worst-case performance of LPT, Discrete Applied Mathematics, 148:1, (49-61), Online publication date: 30-Apr-2005.
  236. Babu S, Munagala K, Widom J and Motwani R Adaptive Caching for Continuous Queries Proceedings of the 21st International Conference on Data Engineering, (118-129)
  237. Marchal L, Yang Y, Casanova H and Robert Y A Realistic Network/Application Model for Scheduling Divisible Loads on Large-Scale Platforms Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
  238. Subramani K (2005). An Analysis of Totally Clairvoyant Scheduling, Journal of Scheduling, 8:2, (113-133), Online publication date: 1-Apr-2005.
  239. Kumar R, Singh P and Chakrabarti P Multiobjective EA approach for improved quality of solutions for spanning tree problem Proceedings of the Third international conference on Evolutionary Multi-Criterion Optimization, (811-825)
  240. Jermaine C (2005). Finding the most interesting correlations in a database, Information Systems, 30:1, (21-46), Online publication date: 1-Mar-2005.
  241. Cardinal J and Langerman S (2005). Designing small keyboards is hard, Theoretical Computer Science, 332:1-3, (405-415), Online publication date: 28-Feb-2005.
  242. Witt C Worst-case and average-case approximations by simple randomized search heuristics Proceedings of the 22nd annual conference on Theoretical Aspects of Computer Science, (44-56)
  243. ACM
    deLorimier M and DeHon A Floating-point sparse matrix-vector multiply for FPGAs Proceedings of the 2005 ACM/SIGDA 13th international symposium on Field-programmable gate arrays, (75-85)
  244. Munagala K, Babu S, Motwani R and Widom J The pipelined set cover problem Proceedings of the 10th international conference on Database Theory, (83-98)
  245. Kumar R and Banerjee N Running time analysis of a multiobjective evolutionary algorithm on simple and hard problems Proceedings of the 8th international conference on Foundations of Genetic Algorithms, (112-131)
  246. Kumar R, Singh P and Chakrabarti P Improved quality of solutions for multiobjective spanning tree problem using distributed evolutionary algorithm Proceedings of the 11th international conference on High Performance Computing, (494-503)
  247. ACM
    Elkin M (2004). Distributed approximation, ACM SIGACT News, 35:4, (40-57), Online publication date: 1-Dec-2004.
  248. ACM
    Bar-Yehuda R, Bendel K, Freund A and Rawitz D (2004). Local ratio, ACM Computing Surveys, 36:4, (422-463), Online publication date: 1-Dec-2004.
  249. Bejerano Y (2004). Efficient integration of multihop wireless and wired networks with QoS constraints, IEEE/ACM Transactions on Networking, 12:6, (1064-1078), Online publication date: 1-Dec-2004.
  250. Shamir R, Sharan R and Tsur D (2004). Cluster graph modification problems, Discrete Applied Mathematics, 144:1-2, (173-182), Online publication date: 1-Nov-2004.
  251. Chaudhuri S, Datar M and Narasayya V (2004). Index Selection for Databases, IEEE Transactions on Knowledge and Data Engineering, 16:11, (1313-1323), Online publication date: 1-Nov-2004.
  252. Augustine J and Seiden S (2004). Linear time approximation schemes for vehicle scheduling problems, Theoretical Computer Science, 324:2-3, (147-160), Online publication date: 20-Sep-2004.
  253. ACM
    Afrati F, Gionis A and Mannila H Approximating a collection of frequent sets Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, (12-19)
  254. ACM
    Halldórsson M, Halpern J, Li L and Mirrokni V On spectrum sharing games Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing, (107-114)
  255. ACM
    Mannor S, Menache I, Hoze A and Klein U Dynamic abstraction in reinforcement learning via clustering Proceedings of the twenty-first international conference on Machine learning
  256. Alber J, Fernau H and Niedermeier R (2004). Parameterized complexity, Journal of Algorithms, 52:1, (26-56), Online publication date: 1-Jul-2004.
  257. Shachnai H and Tamir T (2004). Tight bounds for online class-constrained packing, Theoretical Computer Science, 321:1, (103-123), Online publication date: 16-Jun-2004.
  258. Ho C and Stockmeyer L (2004). A New Approach to Fault-Tolerant Wormhole Routing for Mesh-Connected Parallel Computers, IEEE Transactions on Computers, 53:4, (427-439), Online publication date: 1-Apr-2004.
  259. Makai M (2004). Reroute sequence planning in telecommunication networks and compact vector summation, Applied Mathematics and Computation, 150:3, (785-801), Online publication date: 1-Mar-2004.
  260. Alon N, Awerbuch B, Azar Y, Buchbinder N and Naor J A general approach to online network optimization problems Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (577-586)
  261. Fernandez de la Vega W, Karpinski M and Kenyon C Approximation schemes for Metric Bisection and partitioning Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (506-515)
  262. Borodin A, Nielsen M and Rackoff C (2003). (Incremental) Priority Algorithms, Algorithmica, 37:4, (295-326), Online publication date: 1-Dec-2003.
  263. Mastrolilli M (2003). Efficient Approximation Schemes for Scheduling Problems with Release Dates and Delivery Times, Journal of Scheduling, 6:6, (521-531), Online publication date: 1-Nov-2003.
  264. Goel A, Henzinger M, Plotkin S and Tardos E (2003). Scheduling data transfers in a network and the set scheduling problem, Journal of Algorithms, 48:2, (314-332), Online publication date: 1-Sep-2003.
  265. Guha S, Hassin R, Khuller S and Or E (2003). Capacitated vertex covering, Journal of Algorithms, 48:1, (257-270), Online publication date: 1-Aug-2003.
  266. ACM
    Décoret X, Durand F, Sillion F and Dorsey J Billboard clouds for extreme model simplification ACM SIGGRAPH 2003 Papers, (689-696)
  267. Kumar R and Banerjee N Multicriteria network design using evolutionary algorithm Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartII, (2179-2190)
  268. ACM
    Décoret X, Durand F, Sillion F and Dorsey J (2003). Billboard clouds for extreme model simplification, ACM Transactions on Graphics, 22:3, (689-696), Online publication date: 1-Jul-2003.
  269. Arora S and Chang K Approximation schemes for degree-restricted MST and red-blue separation problem Proceedings of the 30th international conference on Automata, languages and programming, (176-188)
  270. Gandhi R, Halperin E, Khuller S, Kortsarz G and Srinivasan A An improved approximation algorithm for vertex cover with hard capacities Proceedings of the 30th international conference on Automata, languages and programming, (164-175)
  271. ACM
    Gupta A, Suciu D and Halevy A The view selection problem for XML content based routing Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (68-77)
  272. Markou E, Zachos S and Fragoudakis C maximizing the guarded boundary of an art gallery is APX-complete Proceedings of the 5th Italian conference on Algorithms and complexity, (24-35)
  273. Demetrescu C and Finocchi I (2003). Combinatorial algorithms for feedback problems in directed graphs, Information Processing Letters, 86:3, (129-136), Online publication date: 16-May-2003.
  274. Brizuela C and Gutiérrez E An experimental comparison of two different encoding schemes for the location of base stations in cellular networks Proceedings of the 2003 international conference on Applications of evolutionary computing, (176-186)
  275. Arenas M, Bertossi L, Chomicki J, He X, Raghavan V and Spinrad J (2003). Scalar aggregation in inconsistent databases, Theoretical Computer Science, 296:3, (405-434), Online publication date: 14-Mar-2003.
  276. Sheffer A and Hart J Seamster Proceedings of the conference on Visualization '02, (291-298)
  277. Dantsin E, Goerdt A, Hirsch E, Kannan R, Kleinberg J, Papadimitriou C, Raghavan P and Schöning U (2002). A deterministic (2 - 2/(k+ 1)) algorithm for k-SAT based on local search, Theoretical Computer Science, 289:1, (69-83), Online publication date: 23-Oct-2002.
  278. Droste S, Jansen T and Wegener I (2002). Optimization with randomized search heuristics, Theoretical Computer Science, 287:1, (131-144), Online publication date: 25-Sep-2002.
  279. ACM
    Bejerano Y Efficient integration of multi-hop wireless and wired networks with QoS constraints Proceedings of the 8th annual international conference on Mobile computing and networking, (215-226)
  280. ACM
    Čagalj M, Hubaux J and Enz C Minimum-energy broadcast in all-wireless networks Proceedings of the 8th annual international conference on Mobile computing and networking, (172-182)
  281. Berghammer R A generic program for minimal subsets with applications Proceedings of the 12th international conference on Logic based program synthesis and transformation, (144-157)
  282. Kumar A, Rastogi R, Silberschatz A and Yener B (2002). Algorithms for provisioning virtual private networks in the hose model, IEEE/ACM Transactions on Networking, 10:4, (565-578), Online publication date: 1-Aug-2002.
  283. Koranne S (2002). A Novel Reconfigurable Wrapper for Testing of Embedded Core-Based SOCs and its Associated Scheduling Algorithm, Journal of Electronic Testing: Theory and Applications, 18:4-5, (415-434), Online publication date: 1-Aug-2002.
  284. ACM
    Sandholm T, Suri S, Gilpin A and Levine D Winner determination in combinatorial auction generalizations Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1, (69-76)
  285. ACM
    Babu S, Garofalakis M and Rastogi R (2002). SPARTAN, ACM SIGKDD Explorations Newsletter, 4:1, (11-20), Online publication date: 1-Jun-2002.
  286. ACM
    Khuller S (2002). Algorithms column, ACM SIGACT News, 33:2, (31-33), Online publication date: 1-Jun-2002.
  287. Ho C and Stockmeyer L A New Approach to Fault-Tolerant Wormhole Routing for Mesh-Connected Parallel Computers Proceedings of the 16th International Parallel and Distributed Processing Symposium
  288. Sivignon I and Coeurjolly D From digital plane segmentation to polyhedral representation Proceedings of the 11th international conference on Theoretical foundations of computer vision, (356-367)
  289. Cannon A, Ettinger J, Hush D and Scovel C (2002). Machine learning with data dependent hypothesis classes, The Journal of Machine Learning Research, 2, (335-358), Online publication date: 1-Mar-2002.
  290. Williamson D (2002). The primal-dual method for approximation algorithms, Mathematical Programming: Series A and B, 91:3, (447-478), Online publication date: 1-Feb-2002.
  291. ACM
    Petrank E and Rawitz D The hardness of cache conscious data placement Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (101-112)
  292. Guha S, Hassin R, Khuller S and Or E Capacitated vertex covering with applications Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms, (858-865)
  293. Berman P, DasGupta B and Muthukrishnan S Slice and dice Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms, (455-464)
  294. Lloyd E Broadcast scheduling for TDMA in wireless multihop networks Handbook of wireless networks and mobile computing, (347-370)
  295. ACM
    Petrank E and Rawitz D (2002). The hardness of cache conscious data placement, ACM SIGPLAN Notices, 37:1, (101-112), Online publication date: 1-Jan-2002.
  296. Boyar J, Favrholdt L, Larsen K and Nielsen M (2001). The competitive ratio for on-line dual bin packing with restricted input sequences, Nordic Journal of Computing, 8:4, (463-472), Online publication date: 1-Dec-2001.
  297. Prasad M, Chong P and Keutzer K (2001). Why is Combinational ATPG Efficiently Solvable for Practical VLSI Circuits?, Journal of Electronic Testing: Theory and Applications, 17:6, (509-527), Online publication date: 1-Dec-2001.
  298. ACM
    Kumar A, Rastogi R, Silberschatz A and Yener B (2001). Algorithms for provisioning virtual private networks in the hose model, ACM SIGCOMM Computer Communication Review, 31:4, (135-146), Online publication date: 1-Oct-2001.
  299. Wolf J, Squillante M, Turek J, Yu P and Sethuraman J (2001). Scheduling Algorithms for the Broadcast Delivery of Digital Products, IEEE Transactions on Knowledge and Data Engineering, 13:5, (721-741), Online publication date: 1-Sep-2001.
  300. ACM
    Kumar A, Rastogi R, Silberschatz A and Yener B Algorithms for provisioning virtual private networks in the hose model Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, (135-146)
  301. ACM
    Halevi S, Krauthgamer R, Kushilevitz E and Nissim K Private approximation of NP-hard functions Proceedings of the thirty-third annual ACM symposium on Theory of computing, (550-559)
  302. ACM
    Moss A and Rabani Y Approximation algorithms for constrained for constrained node weighted steiner tree problems Proceedings of the thirty-third annual ACM symposium on Theory of computing, (373-382)
  303. ACM
    Elkin M and Peleg D (1 + εΒ)-spanner constructions for general graphs Proceedings of the thirty-third annual ACM symposium on Theory of computing, (173-182)
  304. ACM
    Annexstein F, Berman K and Jovanović M Latency effects on reachability in large-scale peer-to-peer networks Proceedings of the thirteenth annual ACM symposium on Parallel algorithms and architectures, (84-92)
  305. ACM
    Hunt H, Marathe M and Stearns R Strongly-local reductions and the complexity/efficient approximability of algebra and optimization on abstract algebraic structures Proceedings of the 2001 international symposium on Symbolic and algebraic computation, (183-191)
  306. ACM
    Estkowski R and Mitchell J Simplifying a polygonal subdivision while keeping it simple Proceedings of the seventeenth annual symposium on Computational geometry, (40-49)
  307. ACM
    Chaudhuri S, Das G and Narasayya V (2001). A robust, optimization-based approach for approximate answering of aggregate queries, ACM SIGMOD Record, 30:2, (295-306), Online publication date: 1-Jun-2001.
  308. ACM
    Hristidis V, Koudas N and Papakonstantinou Y (2001). PREFER, ACM SIGMOD Record, 30:2, (259-270), Online publication date: 1-Jun-2001.
  309. Van Hoesel S and Müller R (2001). Optimization in electronic markets, Netnomics, 3:1, (23-33), Online publication date: 1-Jun-2001.
  310. ACM
    Chaudhuri S, Das G and Narasayya V A robust, optimization-based approach for approximate answering of aggregate queries Proceedings of the 2001 ACM SIGMOD international conference on Management of data, (295-306)
  311. ACM
    Hristidis V, Koudas N and Papakonstantinou Y PREFER Proceedings of the 2001 ACM SIGMOD international conference on Management of data, (259-270)
  312. ACM
    Fagin R, Lotem A and Naor M Optimal aggregation algorithms for middleware Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (102-113)
  313. ACM
    Sarrafzadeh M, Bozorgzadeh E, Kastner R and Srivastava A Design and analysis of physical design algorithms Proceedings of the 2001 international symposium on Physical design, (82-89)
  314. Charikar M, Khuller S, Mount D and Narasimhan G Algorithms for facility location problems with outliers Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms, (642-651)
  315. Iske A Hierarchical scattered data filtering for multilevel interpolation schemes Mathematical Methods for Curves and Surfaces, (211-221)
  316. ACM
    Koudas N Space efficient bitmap indexing Proceedings of the ninth international conference on Information and knowledge management, (194-201)
  317. ACM
    Freimer R Generalized map coloring for use in geographical information systems Proceedings of the 8th ACM international symposium on Advances in geographic information systems, (167-173)
  318. Doddi S, Marathe M, Ravi S, Taylor D and Widmayer P (2000). Approximation algorithms for clustering to minimize the sum of diameters, Nordic Journal of Computing, 7:3, (185-203), Online publication date: 1-Sep-2000.
  319. Fizzano P and Swanson S (2000). Scheduling Classes on a College Campus, Computational Optimization and Applications, 16:3, (279-294), Online publication date: 1-Sep-2000.
  320. ACM
    Marathe M, Panconesi A and Risinger L An experimental study of a simple, distributed edge coloring algorithm Proceedings of the twelfth annual ACM symposium on Parallel algorithms and architectures, (166-175)
  321. ACM
    Orlin J, Schulz A and Sengupta S ε-optimization schemes and L-bit precision (extended abstract) Proceedings of the thirty-second annual ACM symposium on Theory of computing, (565-572)
  322. ACM
    Könemann J and Ravi R A matter of degree Proceedings of the thirty-second annual ACM symposium on Theory of computing, (537-546)
  323. Carr R, Fleischer L, Leung V and Phillips C Strengthening integrality gaps for capacitated network design and covering problems Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms, (106-115)
  324. Martignon L and Schmitt M (1999). Simplicity and Robustness of Fast and Frugal Heuristics, Minds and Machines, 9:4, (565-593), Online publication date: 1-Nov-1999.
  325. Krysta P and Solis-Oba R Approximation algorithms for bounded facility location Proceedings of the 5th annual international conference on Computing and combinatorics, (241-250)
  326. ACM
    Prasad M, Chong P and Keutzer K Why is ATPG easy? Proceedings of the 36th annual ACM/IEEE Design Automation Conference, (22-28)
  327. ACM
    Karloff H and Mihail M On the complexity of the view-selection problem Proceedings of the eighteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (167-173)
  328. ACM
    Dodis Y and Khanna S Design networks with bounded pairwise distance Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (750-759)
  329. ACM
    Guha S, Moss A, Naor J and Schieber B Efficient recovery from power outage (extended abstract) Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (574-582)
  330. ACM
    Goel A, Henzinger M, Plotkin S and Tardos E Scheduling data transfers in a network and the set scheduling problem Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (189-197)
  331. ACM
    Nisan N and Ronen A Algorithmic mechanism design (extended abstract) Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (129-140)
  332. ACM
    Chen G, Kao M, Lyuu Y and Wong H Optimal buy-and-hold strategies for financial markets with bounded daily returns Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (119-128)
  333. Kanungo T, Mount D, Netanyahu N, Piatko C, Silverman R and Wu A Computing nearest neighbors for moving points and applications to clustering Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms, (931-932)
  334. Gąsieniec L, Jansson J and Lingas A Efficient approximation algorithms for the Hamming center problem Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms, (905-906)
  335. Henzinger M and Leonardi S Scheduling multicasts on unit-capacity trees and meshes Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms, (438-447)
  336. ACM
    Arora S The approximability of NP-hard problems Proceedings of the thirtieth annual ACM symposium on Theory of computing, (337-348)
  337. ACM
    Arora S, Raghavan P and Rao S Approximation schemes for Euclidean k-medians and related problems Proceedings of the thirtieth annual ACM symposium on Theory of computing, (106-113)
  338. ACM
    Khuller S (1998). Open problems, ACM SIGACT News, 29:1, (15-17), Online publication date: 1-Mar-1998.
  339. Guha S and Khuller S Greedy strikes back Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms, (649-657)
  340. Khanna S, Muthukrishnan S and Paterson M On approximating rectangle tiling and packing Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms, (384-393)
  341. Crescenzi P A Short Guide To Approximation Preserving Reductions Proceedings of the 12th Annual IEEE Conference on Computational Complexity
  342. ACM
    Vardy A Algorithmic complexity in coding theory and the minimum distance problem Proceedings of the twenty-ninth annual ACM symposium on Theory of computing, (92-109)
  343. Shi L and Hwang P A Method for Real-Time Scheduling Problems Proceedings of the 3rd Workshop on Object-Oriented Real-Time Dependable Systems - (WORDS '97)
Contributors
  • University of California, Berkeley

Recommendations