Academic literature on the topic 'Greedy Algorithms'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Greedy Algorithms.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Greedy Algorithms"
Abdallah, Alaa E., Mohammad Bsoul, Emad E. Abdallah, Ibrahim Al–Oqily, and George Kao. "Cluster-Based Online Routing Protocols for Ad Hoc Network." International Journal of Information Technology and Web Engineering 9, no. 4 (October 2014): 54–66. http://dx.doi.org/10.4018/ijitwe.2014100105.
Full textOchkov, V. F., A. O. Ivanova, and M. D. Alekseev. "THREE "GREEDY" ALGORITHMS." Informatics in school, no. 9 (December 20, 2018): 34–42. http://dx.doi.org/10.32517/2221-1993-2018-17-9-34-42.
Full textLutoborski, Adam, and Vladimir N. Temlyakov. "Vector greedy algorithms." Journal of Complexity 19, no. 4 (August 2003): 458–73. http://dx.doi.org/10.1016/s0885-064x(03)00026-8.
Full textSimmons, Benno I., Christoph Hoeppke, and William J. Sutherland. "Beware greedy algorithms." Journal of Animal Ecology 88, no. 5 (March 15, 2019): 804–7. http://dx.doi.org/10.1111/1365-2656.12963.
Full textTian, Heng, Fuhai Duan, Yong Sang, and Liang Fan. "Novel algorithms for sequential fault diagnosis based on greedy method." Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability 234, no. 6 (May 2, 2020): 779–92. http://dx.doi.org/10.1177/1748006x20914498.
Full textHignasari, L. Virginayoga. "Komparasi Algoritma Cheapest Insertion Heuristic (CIH) Dan Greedy Dalam Optimasi Rute Pendistribusian Barang." Jurnal Ilmiah Vastuwidya 2, no. 2 (June 16, 2020): 31–39. http://dx.doi.org/10.47532/jiv.v2i2.87.
Full textNi, Qiufen, Chuanhe Huang, Panos M. Pardalos, Jia Ye, and Bin Fu. "Different Approximation Algorithms for Channel Scheduling in Wireless Networks." Mobile Information Systems 2020 (November 16, 2020): 1–13. http://dx.doi.org/10.1155/2020/8836517.
Full textWANG, LIN. "FAST ALGORITHMS FOR THERMAL-AWARE FLOORPLANNING." Journal of Circuits, Systems and Computers 23, no. 07 (June 2, 2014): 1450098. http://dx.doi.org/10.1142/s0218126614500984.
Full textWayahdi, Muhammad Rhifky, Subhan Hafiz Nanda Ginting, and Dinur Syahputra. "Greedy, A-Star, and Dijkstra’s Algorithms in Finding Shortest Path." International Journal of Advances in Data and Information Systems 2, no. 1 (February 1, 2021): 45–52. http://dx.doi.org/10.25008/ijadis.v2i1.1206.
Full textLi, Jonathan, Rohan Potru, and Farhad Shahrokhi. "A Performance Study of Some Approximation Algorithms for Computing a Small Dominating Set in a Graph." Algorithms 13, no. 12 (December 14, 2020): 339. http://dx.doi.org/10.3390/a13120339.
Full textDissertations / Theses on the topic "Greedy Algorithms"
Sundman, Dennis. "Greedy Algorithms for Distributed Compressed Sensing." Doctoral thesis, KTH, Kommunikationsteori, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-144907.
Full textCompressed sensing (CS) är en nyutvecklad teknik som utnyttjar gleshet i stora undersamplade signaler. Många intressanta signaler besitter dessa glesa egenskaper. Utifrån en undersamplad vektor återskapar CS-algoritmer hela den sökta signalen. En klass av rekonstruktionsalgoritmer är de så kallade giriga algoritmerna, som blivit populära tack vare låg komplexitet och god prestanda. CS kan användas i vissa typer av nätverk för att detektera eller estimera stora signaler. En typ av nätverk där detta kan göras är i sensornätverk för kognitiv radio, där man använder sensorer för att estimera effektspektrum. Datan som samplas av de olika sensorerna i sådana nätverk är typiskt korrelerad. En annan typ av nätverk är multiprocessornätverk bestående av distribuerade beräkningsnoder, där noderna genom samarbete kan lösa svårare problem än de kan göra ensamma. Avhandlingen kommer främst att behandla giriga algoritmer för distribuerade CS-problem. Vi börjar med en överblick av nuvarande kunskap inom området. Här introducerar vi signalmodeller för korrelation och nätverksmodeller som används för simulering i nätverk. Vi fortsätter med att studera två tillämpningar; estimering av effektspektrum och en distribuerad återskapningsalgoritm för multiprocessornätverk. Därefter tar vi ett djupare steg i studien av giriga algoritmer, där vi utvecklar nya algoritmer med förbättrad prestanda, detta till priset av ökad beräkningskomplexitet. Huvudmålet med avhandlingen är giriga algoritmer för distribuerad CS, där algoritmerna utnyttjar datakorrelationen i sensornätverk. Vi utvecklar flera sådana algoritmer, där en huvudingrediens är att använda demokratiska röstningsalgoritmer. Vi analyserar sedan denna typ av röstningsalgoritmer genom att introducera en ingång/utgångs modell. Analysen visar att algoritmerna ger bra resultat. Genom att jämföra algoritmer för enskilda sensorer med redan befintliga algoritmer i litteraturen ser vi att målet med ökad prestanda uppnås. Vi karaktäriserar också komplexiteten. Genom simulationer verifierar vi både prestandan och komplexiteten. Att analysera komplexitet hos distribuerade algoritmer är generellt svårare eftersom den beror på specifik signalrealisation, nätverkstopologi och andra parametrar. I de fall där vi inte kan göra analys presenterar vi istället genomgående simuleringsresultat. Vi jämför våra algoritmer med de vanligaste algoritmerna för enskilda sensorsystem, och våra resultat kan därför enkelt användas som referens för framtida forskning. Jämfört med prestandan för enskilda sensorer visar de nya distribuerade algoritmerna markant förbättring.
Beis, Michail. "Greedy algorithms for random regular graphs." Thesis, University of Liverpool, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.427021.
Full textDeterme, Jean-François. "Greedy algorithms for multi-channel sparse recovery." Doctoral thesis, Universite Libre de Bruxelles, 2018. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/265808.
Full textDoctorat en Sciences de l'ingénieur et technologie
info:eu-repo/semantics/nonPublished
Sun, Qing. "Greedy Inference Algorithms for Structured and Neural Models." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/81860.
Full textPh. D.
Puricella, Antonio. "The complexity of greedy algorithms on ordered graphs." Thesis, University of Leicester, 2002. http://hdl.handle.net/2381/30518.
Full textDutta, Himanshu Shekhar. "Survey of Approximation Algorithms for Set Cover Problem." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc12118/.
Full textOglic, Dino [Verfasser]. "Constructive Approximation and Learning by Greedy Algorithms / Dino Oglic." Bonn : Universitäts- und Landesbibliothek Bonn, 2018. http://d-nb.info/1170777910/34.
Full textYuen, Chi-kan. "A double-track greedy algorithm for VLSI channel routing /." Hong Kong : University of Hong Kong, 1997. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19656373.
Full textRazanajatovo, Misanantenaina Valisoa. "Properties of greedy trees." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/95909.
Full textENGLISH ABSTRACT: A greedy tree is constructed from a given degree sequence using a simple greedy algorithm that assigns the highest degree to the root, the second, the third, . . . , -highest degree to the root’s neighbours, etc. This particular tree is the solution to numerous extremal problems among all trees with given degree sequence. In this thesis, we collect results for some distancebased graph invariants, the number of subtrees and the spectral radius in which greedy trees play a major role. We show that greedy trees are extremal for the aforementioned graph invariants by means of two different approaches, one using level greedy trees and majorization, while the other one is somewhat more direct. Finally, we prove some new results on greedy trees for additive parameters with specific toll functions.
AFRIKAANSE OPSOMMING: ’n Gulsige boom word vanuit ’n gegewe graadry deur middel van ’n eenvoudige gulsige algoritme gebou, wat die hoogste graad aan die wortel toewys, die tweede-, derde-, . . . , -hoogste graad aan die wortel se bure, ens. Hierdie spesifieke boom is die oplossing van ’n groot aantal ekstremale probleme onder al die bome met gegewe graadry. In hierdie tesis beskou ons ’n versameling van resultate oor afstand-gebaseerde grafiekinvariante, die aantal subbome en die spektraalstraal waarin gulsige bome ’n belangrike rol speel. Ons bewys dat gulsige bome ekstremaal vir die bogenoemde grafiekinvariante is deur van twee verskillende tegnieke gebruik te maak: een met behulp van vlak-gulsige bome en majorering, en ’n ander metode wat effens meer direk is. Laastens bewys ons sommige nuwe resultate oor gulsige bome vir additiewe parameters met spesifieke tolfunksies.
Ortiz, John E. "Absolute position measurement for automated guided vehicles using the Greedy DeBruijn Sequence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FOrtiz.pdf.
Full textThesis Advisor(s): Harold M. Fredricksen, Jon T. Butler. "September 2006." Includes bibliographical references (p. 149). Also available in print.
Books on the topic "Greedy Algorithms"
Hirai, Hiroshi. Greedy fans: A geometric approach to dual greedy algorithms. Kyoto, Japan: Kyōto Daigaku Sūri Kaiseki Kenkyūjo, 2005.
Find full textSano, Yoshio. The greedy algorithm for strict cg-matroids. Kyoto, Japan: Kyōto Daigaku Sūri Kaiseki Kenkyūjo, 2007.
Find full textFaigle, Ulrich. A general model for matroids and the greedy algorithm. Kyoto, Japan: Kyōto Daigaku Sūri Kaiseki Kenkyūjo, 2007.
Find full text1955-, Spirakis P. G., ed. Algorithms - ESA '95: Third Annual European Symposium, Corfu, Greece, September 25-27, 1995 : proceedings. Berlin: Springer, 1995.
Find full textSotiris, Nikoletseas, ed. Experimental and efficient algorithms: 4th International Workshop, WEA 2005, Santorini Island, Greece, May 10-13, 2005 : proceedings. Berlin: Springer, 2005.
Find full textRoderick, Michael J. Channel and switchbox routing using a greedy based channel algorithm with outward scanning technique. Monterey, Calif: Naval Postgraduate School, 1988.
Find full textESA, '95 (1995 Corfu Greece). Algorithms - ESA '95: Third Annual European Symposium, Corfu, Greece, September 25-27, 1995 : proceedings. Berlin: Springer, 1995.
Find full textF, Makedon, ed. VLSI algorithms and architectures: Aegean Workshop on Computing, Loutraki, Greece, July 8-11, 1986 : proceedings. Berlin: Springer-Verlag, 1986.
Find full textAegean Workshop on Computing: VLSI Algorithms and Architectures (1986 Loutráki, Greece). VLSI Algorithms and Architectures: Aegean Workshop on Computing, Loutraki, Greece, July 8-11, 1986 : proceedings. Berlin: Springer-Verlag, 1986.
Find full textBook chapters on the topic "Greedy Algorithms"
Majumdar, Angshul. "Greedy Algorithms." In Compressed Sensing for Engineers, 9–28. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis, [2019] | Series: Devices, circuits, and systems: CRC Press, 2018. http://dx.doi.org/10.1201/9781351261364-2.
Full textTemlyakov, Vladimir. "Greedy Algorithms." In Encyclopedia of Applied and Computational Mathematics, 611–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-540-70529-1_295.
Full textAldous, Joan M., and Robin J. Wilson. "Greedy Algorithms." In Graphs and Applications, 182–201. London: Springer London, 2000. http://dx.doi.org/10.1007/978-1-4471-0467-4_8.
Full textStinson, Douglas R. "Greedy Algorithms." In Techniques for Designing and Analyzing Algorithms, 171–214. Boca Raton: Chapman and Hall/CRC, 2021. http://dx.doi.org/10.1201/9780429277412-5.
Full textMohanty, Sachi Nandan, Pabitra Kumar Tripathy, and Suneeta Satpathy. "Greedy Algorithms." In The Art of Algorithm Design, 143–74. Boca Raton: Chapman and Hall/CRC, 2021. http://dx.doi.org/10.1201/9781003093886-5.
Full textCidon, Israel, Shay Kutten, Yishay Mansour, and David Peleg. "Greedy packet scheduling." In Distributed Algorithms, 169–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/3-540-54099-7_12.
Full textWang, Feng, and Weili Wu. "Greedy Approximation Algorithms." In Encyclopedia of Algorithms, 376–79. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-30162-4_174.
Full textWu, Weili, and Feng Wang. "Greedy Approximation Algorithms." In Encyclopedia of Algorithms, 882–86. New York, NY: Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4939-2864-4_174.
Full textWu, Weili, and Feng Wang. "Greedy Approximation Algorithms." In Encyclopedia of Algorithms, 1–7. Boston, MA: Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27848-8_174-2.
Full textWan, Peng-Jun. "Greedy Approximation Algorithms." In Handbook of Combinatorial Optimization, 1599–629. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4419-7997-1_48.
Full textConference papers on the topic "Greedy Algorithms"
Kodaganallur, Viswanathan, and Anup K. Sen. "Greedy by Chance - Stochastic Greedy Algorithms." In 2010 Sixth International Conference on Autonomic and Autonomous Systems (ICAS). IEEE, 2010. http://dx.doi.org/10.1109/icas.2010.32.
Full textDickerson, Matthew T., Robert L. Scot Drysdale, Scott A. McElfresh, and Emo Welzl. "Fast greedy triangulation algorithms." In the tenth annual symposium. New York, New York, USA: ACM Press, 1994. http://dx.doi.org/10.1145/177424.177649.
Full textSong, Yunlong, and Min Liu. "Greedy-based distributed algorithms for green traffic routing." In 2014 23rd International Conference on Computer Communication and Networks (ICCCN). IEEE, 2014. http://dx.doi.org/10.1109/icccn.2014.6911771.
Full textBaburaj, Maya K., Sooraj K. Ambat, and V. S. Sheeba. "Compressive beamforming using greedy algorithms." In 2016 International Conference on Communication Systems and Networks (ComNet). IEEE, 2016. http://dx.doi.org/10.1109/csn.2016.7823991.
Full textLucier, Brendan, and Vasilis Syrgkanis. "Greedy Algorithms Make Efficient Mechanisms." In EC '15: ACM Conference on Economics and Computation. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2764468.2764506.
Full textGupta, Anupam, and Amit Kumar. "Greedy Algorithms for Steiner Forest." In STOC '15: Symposium on Theory of Computing. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2746539.2746590.
Full textKumar, Ravi, Benjamin Moseley, Sergei Vassilvitskii, and Andrea Vattani. "Fast greedy algorithms in mapreduce and streaming." In SPAA '13: 25th ACM Symposium on Parallelism in Algorithms and Architectures. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2486159.2486168.
Full textJulstrom, Bryant A. "Greedy, genetic, and greedy genetic algorithms for the quadratic knapsack problem." In the 2005 conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1068009.1068111.
Full textSmorodkina, Ekaterina, and Daniel Tauritz. "Greedy Population Sizing for Evolutionary Algorithms." In 2007 IEEE Congress on Evolutionary Computation. IEEE, 2007. http://dx.doi.org/10.1109/cec.2007.4424742.
Full textGao, Wanru, Tobias Friedrich, Frank Neumann, and Christian Hercher. "Randomized greedy algorithms for covering problems." In GECCO '18: Genetic and Evolutionary Computation Conference. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3205455.3205542.
Full textReports on the topic "Greedy Algorithms"
Temlyakov, V. N. Greedy Algorithms in Banach Spaces. Fort Belvoir, VA: Defense Technical Information Center, January 2000. http://dx.doi.org/10.21236/ada637095.
Full textLeviatan, D., and V. N. Temlyakov. Simultaneous Approximation by Greedy Algorithms. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada619364.
Full textLivshitz, E. D., and V. N. Temlyakov. On Convergence of Weak Greedy Algorithms. Fort Belvoir, VA: Defense Technical Information Center, January 2000. http://dx.doi.org/10.21236/ada637114.
Full textTemlyakov, V. N. A Criterion for Convergence of Weak Greedy Algorithms. Fort Belvoir, VA: Defense Technical Information Center, January 2000. http://dx.doi.org/10.21236/ada637117.
Full textBinev, Peter, Albert Cohen, Wolfgang Dahmen, Ronald DeVore, Guergana Petrova, and Przemyslaw Wojtaszczyk. Convergence Rates for Greedy Algorithms in Reduced Basis Methods. Fort Belvoir, VA: Defense Technical Information Center, May 2010. http://dx.doi.org/10.21236/ada640047.
Full textHesthaven, Jan S., Benjamin Stamm, and Shun Zhang. Efficient Greedy Algorithms for High-Dimensional Parameter Spaces with Applications to Empirical Interpolation and Reduced Basis Methods. Fort Belvoir, VA: Defense Technical Information Center, September 2011. http://dx.doi.org/10.21236/ada554134.
Full textDilworth, S. J., N. J. Kalton, D. Kutzarova, and V. N. Temlyakov. The Thresholding Greedy Algorithm, Greedy Bases and Duality. Fort Belvoir, VA: Defense Technical Information Center, August 2001. http://dx.doi.org/10.21236/ada640677.
Full text