奖牌 发表于 2025-3-25 03:28:39

Balanced Coloring: Equally Easy for All Numbers of Colors?gs in c. colors having discrepancy at most D with respect to a suitable subhypergraph of .. A central step in the proof is to show that a fairly general rounding problem (linear discrepancy problem in c. colors) can be solved by computing low-discrepancy c.-colorings.

Asparagus 发表于 2025-3-25 11:27:54

http://reply.papertrans.cn/87/8604/860325/860325_22.png

季雨 发表于 2025-3-25 12:58:18

A Space Lower Bound for Routing in Treeshemes using addresses and routing tables of size .(log../log log .) bits per node, if the output port numbers of each node are chosen by an adversary. This paper shows that this result is tight, that is the sum of the sizes of the address and of the local routing table is at least Ω(log../ log log .) bits for some node of some tree.

混沌 发表于 2025-3-25 15:55:28

http://reply.papertrans.cn/87/8604/860325/860325_24.png

Chandelier 发表于 2025-3-25 23:53:52

A Probabilistic 3—SAT Algorithm Further Improved solving 3-SAT. Here, we describe an algorithm which improves upon this time bound by combining an improved version of the above randomized algorithm with other randomized algorithms. Our new expected time bound for 3-SAT is .(1.3302.).

PLAYS 发表于 2025-3-26 01:29:07

http://reply.papertrans.cn/87/8604/860325/860325_26.png

六个才偏离 发表于 2025-3-26 07:18:14

Approximations for ATSP with Parametrized Triangle Inequality . ratio of edge costs in a general asymmetric graph. We show that for γ ∈ . , while for γ ∈ ., this ratio can be .. We make use of this result to give a better analysis to our main algorithm. We also observe that when . with γ ∈ ., the minimum cost and the maximum cost edges in the graph are .and are . to each other.

babble 发表于 2025-3-26 09:13:31

http://reply.papertrans.cn/87/8604/860325/860325_28.png

幸福愉悦感 发表于 2025-3-26 13:19:15

http://reply.papertrans.cn/87/8604/860325/860325_29.png

entail 发表于 2025-3-26 19:21:01

Hyper-Encryption and Everlasting Securityhe major new result is that the shared secret key employed by the sender Alice andthe receiver Bob can be re-used to send an exponential number of messages, against strong adaptive attacks. This essential step enhances the usability of the encryption method, and also allows strong authentication and
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: STACS 2002; 19th Annual Symposiu Helmut Alt,Afonso Ferreira Conference proceedings 2002 Springer-Verlag Berlin Heidelberg 2002 Automat.algo