A feedback vertex set of a graph is a subset of vertices that contains at least one vertex from every cycle in the graph. The problem considered is that of finding a minimum feedback vertex set given a weighted and undirected graph. We present a…
Papers in Discrete Mathematics
Discrete Mathematics papers in Mathematics, A
Papers
1  20 of
262
in Discrete Mathematics, A


A method is developed to take the eddy currents in lamination stacks into account with the finiteelement method using the threedimensional (3D) magnetic vector potential magnetodynamic formulation. It consists in converting the stacked…

Until now, the analysis of fault tolerance of peertopeer systems usually only covers random faults of some kind. Contrary to traditional algorithmic research, faults as well as joins and leaves occurring in a worstcase manner are hardly…

We propose a way of measuring the similarity of a Boolean vector to a given set of Boolean vectors, motivated in part by certain data mining or machine learning problems. We relate the similarity measure to one based on Hamming distance and we…

Operations Research (OR) is gaining importance in public health interventions and programmes increasingly both nationally and internationally. The focus of these research techniques is to constantly guide the programme implementation to achieve best…

Boosting is a general method for improving the accuracy of any given learning algorithm. This short overview paper introduces the boosting algorithm AdaBoost, and explains the underlying theory of boosting, including an explanation of why boosting…

Particular focus in this paper is on quantum information protocols, which exploit quantummechanical effects in an essential way. The particular examples we shall use to illustrate our approach will be teleportation (Benett et al., 1993),…

In this paper the following is proved: Let K ⊂ E2 be a smooth strictly convex body, and let L ⊂ E2 be a line. Assume that for every point x ∈ L\K the two tangent segments from x to K have the same length, and the line joining the two contact points…

The uniqueness of a binary doublyeven selfdual [48, 24, 12] code is used to prove that a selforthogonal 5(48, 12, 8) design, as well as some of its derived and residual designs, including a quasisymmetric 2(45, 9, 8) design, are all unique up…

The panel data unit root test suggested by Levin and Lin (LL) has been widely used in several applications, notably in papers on tests of the purchasing power parity hypothesis. This test is based on a very restrictive hypothesis which is rarely…

Logistic regression is a workhorse of statistics and is closely related to methods used in Machine Learning, including the Perceptron and the Support Vector Machine. This note compares eight different algorithms for computing the maximum…

There are many (mixed) integer programming formulations of the Steiner problem in networks. The corresponding linear programming relaxations are of great interest particularly, but not exclusively, for computing lower bounds; but not much has been…

The initial genomescale reconstruction of the metabolic network of Escherichia coli K12 MG1655 was assembled in 2000. It has been updated and periodically released since then based on new and curated genomic and biochemical knowledge. An update…

This paper attempts to cover the main algorithms used for clustering, with a brief and simple description of each. For each algorithm, I have selected the most common version to represent the entire family. Advantages and drawbacks are commented for…

Repositioning existing drugs for new therapeutic uses is an efficient approach to drug discovery. We have developed a computational drug repositioning pipeline to perform largescale molecular docking of small molecule drugs against protein drug…

BACKGROUND: Many preventable diseases such as ischemic heart diseases and breast cancer prevail at a large scale in the general population. Computerized decision support systems are one of the solutions for improving the quality of prevention…

The hope that mathematical methods employed in the investigation of formal logic would lead to purely computational methods for obtaining mathematical theorems goes back to Leibniz and has been revived by Peano around the turn of the century and by…

In 19971998, the Netherlands experienced a large epidemic of classical swine fever (CSF). The magnitude of this epidemic stressed the role information systems could play in supporting the management during an eradication campaign. The enforcement…

A general model for the coevolution of cooperating species is presented. This model is instantiated and tested in the domain of function optimization, and compared with a traditional GAbased function optimizer. The results are encouraging in two…

The Hirsch Conjecture (1957) stated that the graph of a $d$dimensional polytope with $n$ facets cannot have (combinatorial) diameter greater than $nd$. That is, that any two vertices of the polytope can be connected to each other by a path of at…
Papers in associated subdisciplines
Sign up today  FREE
Mendeley saves you time finding and organizing research. Learn more
 All your research in one place
 Add and import papers easily
 Access it anywhere, anytime