Zobrazeno 1 - 10
of 73
pro vyhledávání: '"Mauro Passacantando"'
Autor:
Mauro Passacantando, Fabio Raciti
Publikováno v:
Algorithms, Vol 16, Iss 10, p 458 (2023)
We consider a class of finite-dimensional variational inequalities where both the operator and the constraint set can depend on a parameter. Under suitable assumptions, we provide new estimates for the Lipschitz constant of the solution, which consid
Externí odkaz:
https://doaj.org/article/b66a94b817db48aca6e2da69abd5de15
Autor:
Hamta Sedghani, Mina Zolfy Lighvan, Hadi S. Aghdasi, Mauro Passacantando, Giacomo Verticale, Danilo Ardagna
Publikováno v:
IEEE Access, Vol 10, Pp 91524-91544 (2022)
Mobile Crowdsensing (MCS) is a new paradigm that leverages the collective sensing ability of a crowd so that a special task can be performed through the aggregation of information collected from personal mobile devices. While MCS brings several benef
Externí odkaz:
https://doaj.org/article/4b4fbc4ea730430da6850b132528222d
Publikováno v:
EURO Journal on Computational Optimization, Vol 11, Iss , Pp 100062- (2023)
In this paper, we consider policy interventions for international migrant flows and quantify their ramifications. In particular, we further develop a recent equilibrium model of international human migration in which some of the destination countries
Externí odkaz:
https://doaj.org/article/9983500688684caeb60cf94ccd8ec6ec
Publikováno v:
IEEE Access, Vol 7, Pp 162913-162940 (2019)
The decoupling of infrastructure from services, which has been so far a mainstream paradigm in the computational and storage domain, is now becoming a paradigm also for mobile networks. Indeed, 5G must provide a variety of services with very diverse
Externí odkaz:
https://doaj.org/article/3d8f83b7a7034fecbc9ec83a88d47c37
This is the source code and dataset that we used in the paper: "A Stackelberg Game for Managing AI Sensing Tasks in Mobile Crowdsensing"
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::56b312a985386c154d9fb327bc71dfec
A global optimization approach for solving non-monotone equilibrium problems (EPs) is proposed. The class of (regularized) gap functions is used to reformulate any EP as a constrained global optimization program and some bounds on the Lipschitz const
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fffdfefc98c5340bd95e3f417d4fa497
https://hdl.handle.net/11577/3470718
https://hdl.handle.net/11577/3470718
Autor:
Mauro Passacantando, Fabio Raciti
Publikováno v:
Approximation and Computation in Science and Engineering ISBN: 9783030841218
We consider a class of games played on networks in which the utility 4 functions consist of both deterministic and random terms. In order to find the Nash 5 equilibrium of the game we formulate the problem as a variational inequality in a 6 probabili
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a8f31352ccaed5bda4861c192e90b522
https://hdl.handle.net/10281/391578
https://hdl.handle.net/10281/391578
The paper deals with a sequencing and routing problem originated by a real-world application context. The problem consists in defining the best sequence of locations to visit within a warehouse for the storage and/or retrieval of a given set of items
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4090432ef721b062f706e451adce2a9e
https://hdl.handle.net/10281/391592
https://hdl.handle.net/10281/391592
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031165788
The paper deals with a sequencing and routing problem originated by a real-world application context. The problem consists in defining the best sequence of locations to visit within a warehouse for the storage and/or retrieval of a given set of items
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::19d90898ba88f700c1399218102fd352
https://doi.org/10.1007/978-3-031-16579-5_16
https://doi.org/10.1007/978-3-031-16579-5_16
We evaluate the performance of a genetic algorithm to discover the best set of rules to implement an intrusion against an ICT network. The rules determine how the attacker selects and sequentializes its actions to implement an intrusion. The fitness
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b14794bf8452cd4478175395f9012d74
https://hdl.handle.net/10281/392279
https://hdl.handle.net/10281/392279