Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2025
Inertial accelerated augmented Lagrangian algorithms with scaling coefficients to solve exactly and inexactly linearly constrained convex optimization problems
Journal of Computational and Applied Mathematics (JCAM), Volume 460, Issue Chttps://doi.org/10.1016/j.cam.2024.116425AbstractIn this paper, we propose an inertial accelerated augmented Lagrangian algorithm with a scaling coefficient tailored for solving linearly constrained convex optimization problems. Under suitable scaling conditions, we show that the iteration ...
- research-articleJanuary 2025
Quality-of-service based multipath routing for the internet of things: Quality-of-service based multipath...
AbstractQuick and vast development of the Internet of Things (IoT) applications exhibits varied Quality-of-Service (QoS) requirements. Routing is one of the methods used to build a network capable of providing these requirements. However, traditional ...
- research-articleDecember 2024
Optimal blocks for maximizing the transaction fee revenue of Bitcoin miners
Journal of Combinatorial Optimization (SPJCO), Volume 49, Issue 1https://doi.org/10.1007/s10878-024-01249-0AbstractIn this work, we consider a combinatorial optimization problem with direct applications in blockchain mining, namely finding the most lucrative blocks for Bitcoin miners, and propose optimal algorithmic solutions. Our experiments show that our ...
- research-articleNovember 2024
VIFL: vulnerability identification using federated learning in the internet of things systems
AbstractVulnerability identification has been broadly studied as a way to improve cybersecurity. Internet of Things (IoT) ecosystems are considered particularly vulnerable as a whole, due to their widespread deployment, low processing ability, difficulty ...
-
- research-articleOctober 2024
On the computation of r-th roots in finite fields
Finite Fields and Their Applications (FFATA), Volume 99, Issue Chttps://doi.org/10.1016/j.ffa.2024.102479AbstractLet q be a power of a prime such that q ≡ 1 ( mod r ). Let c be an r-th power residue over F q. In this paper, we present a new r-th root formula which generalizes G.H. Cho et al.'s cube root algorithm, and which provides a refinement of Williams'...
- research-articleAugust 2024
High-Accuracy Numerical Methods and Convergence Analysis for Schrödinger Equation with Incommensurate Potentials
Journal of Scientific Computing (JSCI), Volume 101, Issue 1https://doi.org/10.1007/s10915-024-02658-3AbstractNumerical solving the Schrödinger equation with incommensurate potentials presents a great challenge since its solutions could be space-filling quasiperiodic structures without translational symmetry nor decay. In this paper, we propose two high-...
- review-articleAugust 2024
A survey on the cold start latency approaches in serverless computing: an optimization-based perspective
AbstractServerless computing is one of the latest technologies that has received much attention from researchers and companies in recent years since it provides dynamic scalability and a clear economic model. Serverless computing enables users to pay only ...
- research-articleApril 2024
Bayesian DivideMix++ for Enhanced Learning with Noisy Labels
AbstractLeveraging inexpensive and human intervention-based annotating methodologies, such as crowdsourcing and web crawling, often leads to datasets with noisy labels. Noisy labels can have a detrimental impact on the performance and generalization of ...
- research-articleApril 2024
Identities and periodic oscillations of divide-and-conquer recurrences splitting at half
Advances in Applied Mathematics (AAMA), Volume 155, Issue Chttps://doi.org/10.1016/j.aam.2023.102653AbstractWe study divide-and-conquer recurrences of the form f ( n ) = α f ( ⌊ n 2 ⌋ ) + β f ( ⌈ n 2 ⌉ ) + g ( n ) ( n ⩾ 2 ) , with g ( n ) and f ( 1 ) given, where α , β ⩾ 0 with α + β > 0; such recurrences appear often in the analysis of computer ...
- research-articleFebruary 2024
- review-articleFebruary 2024
A survey on algorithms for Nash equilibria in finite normal-form games
AbstractNash equilibrium is one of the most influential solution concepts in game theory. With the development of computer science and artificial intelligence, there is an increasing demand on Nash equilibrium computation, especially for Internet ...
Highlights- A classification on Nash equilibrium algorithms in the literature with basic ideas on design and analysis presented.
- A comprehensive comparison on Nash equilibrium algorithms in the literature over different kinds of games.
- ...
- research-articleJanuary 2024
The appeals of quadratic majorization–minimization
Journal of Global Optimization (KLU-JOGO), Volume 89, Issue 3Pages 509–558https://doi.org/10.1007/s10898-023-01361-1AbstractMajorization–minimization (MM) is a versatile optimization technique that operates on surrogate functions satisfying tangency and domination conditions. Our focus is on differentiable optimization using inexact MM with quadratic surrogates, which ...
- research-articleJanuary 2024
- research-articleDecember 2023
Algorithms for Cardinality-Constrained Monotone DR-Submodular Maximization with Low Adaptivity and Query Complexity
Journal of Optimization Theory and Applications (JOPT), Volume 200, Issue 1Pages 194–214https://doi.org/10.1007/s10957-023-02353-7AbstractSubmodular maximization is a NP-hard combinatorial optimization problem regularly used in machine learning and data mining with large-scale data sets. To quantify the running time of approximation algorithms, the query complexity and adaptive ...
- research-articleNovember 2023
An Accelerated Newton–Dinkelbach Method and Its Application to Two Variables per Inequality Systems
Mathematics of Operations Research (MOOR), Volume 48, Issue 4Pages 1934–1958https://doi.org/10.1287/moor.2022.1326We present an accelerated or “look-ahead” version of the Newton–Dinkelbach method, a well-known technique for solving fractional and parametric optimization problems. This acceleration halves the Bregman divergence between the current iterate and the ...
- research-articleOctober 2023
- research-articleOctober 2023
The variant of the iterative shrinkage-thresholding algorithm for minimization of the ℓ1 over ℓ∞ norms
Highlights- We firstly give an analysis solution of the proximal operator of the L1 over Linf in compressed sensing.
In this paper, we study minimization of the ratio of ℓ 1 and ℓ ∞ norms (ℓ 1 / ℓ ∞) as a nonconvex and sparsity-promoting metric for solving the unconstrained compressed sensing problems. To design some efficient algorithms, we derive a ...