敲竹杠 发表于 2025-3-23 11:41:17
http://reply.papertrans.cn/88/8800/879959/879959_11.png首创精神 发表于 2025-3-23 15:50:57
http://reply.papertrans.cn/88/8800/879959/879959_12.png蜈蚣 发表于 2025-3-23 22:00:04
http://reply.papertrans.cn/88/8800/879959/879959_13.png冷峻 发表于 2025-3-24 00:54:00
http://reply.papertrans.cn/88/8800/879959/879959_14.png集合 发表于 2025-3-24 05:05:48
Learning Hierarchically-Structured Concepts II: Overlapping Concepts, and Networks with Feedbackl in two ways: we allow limited overlap between children of different concepts, and we allow networks to include feedback edges. For these more general cases, we describe and analyze algorithms for recognition and algorithms for learning.Mitigate 发表于 2025-3-24 06:46:21
Cops & Robber on Periodic Temporal Graphs: Characterization and Improved Boundson, we design an algorithm for determining if a periodic temporal graph is copwin with time complexity ., where ., improving the existing . bound. Let us stress that, when . (i.e., in the . case), the complexity becomes ., improving the best existing . bound.模范 发表于 2025-3-24 13:41:13
http://reply.papertrans.cn/88/8800/879959/879959_17.png油毡 发表于 2025-3-24 16:04:12
http://reply.papertrans.cn/88/8800/879959/879959_18.png删减 发表于 2025-3-24 21:59:45
: A BFT Protocol with Provable Performance Under Attackber of replicas and thus competitive with state-of-the-art protocols; . ’s amortized throughput with less than . byzantine replicas is at least .th of its best-case throughput. We also provide a proof-of-concept implementation and preliminary evaluation of ..dialect 发表于 2025-3-24 23:41:28
Search and Rescue on the Lineunknown (and potentially infinite) length. We also consider scenarios where the destination is either at the endpoint or in the middle of the path. We provide both deterministic and randomized online algorithms for each of these scenarios and prove bounds on their (expected) competitive ratios.