Search for dissertations about: "greedy algorithm"
Showing result 16 - 20 of 32 swedish dissertations containing the words greedy algorithm.
-
16. Decentralized Resource Sharing and Associationin in Wireless Networks
Abstract : In wireless networks, some of the most important supporting functionalities are decentralized resource sharing and association of clients to access points. These functionalities aim to optimally allocate the available wireless transmission resources, for example, time or spectrum channels, the transmit power, access points, and relaying opportunities, all of which are subject to availability constraints. READ MORE
-
17. Dynamic algorithms: new worst-case and instance-optimal bounds via new connections
Abstract : This thesis studies a series of questions about dynamic algorithms which are algorithms for quickly maintaining some information of an input data undergoing a sequence of updates. The first question asks \emph{how small the update time for handling each update can be} for each dynamic problem. READ MORE
-
18. Combinatorics of genome rearrangements and phylogeny
Abstract : This thesis deals with combinatorial problems taken frombioinformatics. In particular, we study the problem ofinferring distances between bacterial species by looking attheir respective gene orders. We regard one of the gene ordersas a permutation of the other. READ MORE
-
19. Performance Analysis and Optimization for Time Critical Networking
Abstract : Future communication systems will be characterized by heterogeneous traffic and requirements. Time critical applications like cyberphysical systems, augmented and virtual reality, raise the need for a low-latency based network. At the same time, conventional devices requiring for high throughput will co-exist with time critical applications. READ MORE
-
20. Model Based Impact Analysis and Security Measure Allocation for Control Systems
Abstract : Improvement of cyber-security of industrial control systems is of utmost importance for our society. It has been recognized that many security vulnerabilities can be found in these systems, which if exploited may lead to dire consequences. READ MORE