<--- Back to Details
First PageDocument Content
Computer science / Applied mathematics / K-server problem / Randomized algorithm / Metrical task system / SL / Competitive analysis / Adversary model / David Shmoys / Online algorithms / Theoretical computer science / Analysis of algorithms
Date: 2011-10-07 12:47:37
Computer science
Applied mathematics
K-server problem
Randomized algorithm
Metrical task system
SL
Competitive analysis
Adversary model
David Shmoys
Online algorithms
Theoretical computer science
Analysis of algorithms

Add to Reading List

Source URL: people.csail.mit.edu

Download Document from Source Website

File Size: 623,94 KB

Share Document on Facebook

Similar Documents

Online algorithms / Analysis of algorithms / Computer science / Applied mathematics / Computer programming / K-server problem / Metrical task system / Adversary model / Competitive analysis / List update problem / Algorithm / Randomized algorithm

Competitive Online Algorithms Susanne Albers Overview arrive one by one and must be scheduled immediately

DocID: 1ri9G - View Document

Analysis of algorithms / Academia / Online algorithms / Computer science / Probabilistic complexity theory / Randomized algorithm / Adversary model / Algorithm / Data binning / Labeling theory / Mathematics

Charles University in Prague Faculty of Mathematics and Physics DOCTORAL THESIS Jan BulĀ“anek

DocID: 1r6w8 - View Document

Online algorithms / Analysis of algorithms / Computer science / Applied mathematics / Mathematics / Competitive analysis / Cache replacement policies / List update problem / Algorithm / K-server problem / Time complexity / Adversary model

Online Algorithms: A Study of Graph-Theoretic Concepts Susanne Albers Max-Planck-Institut fur Informatik, Im Stadtwald, 66123 Saarbrucken, Germany. , http://www.mpi-sb.mpg.de/~ albers/

DocID: 1r4RN - View Document

Road traffic management / Mathematical physics / Road transport / Law / Privacy / Adversary model / Traffic flow / Internet privacy / Applied mathematics / Business / Academia

C:/Users/Bin Zan/Dropbox/typeinst/IEEE6page.dvi

DocID: 1qYAD - View Document

Technology / Electronics / Electromagnetism / Computer networking / Sensor node / Wireless sensor network / Signal-to-interference-plus-noise ratio / Radar / Adversary model / Beamforming / Computer network / Throughput

The 2011 Military Communications Conference - Track 3 - Cyber Security and Network Operations Multi-node Coordinated Jamming for Location Privacy Protection Sangho Oh

DocID: 1qr3M - View Document