rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540874768

Modelling, Computation and Optimization in Information Systems and Management Sciences: Second International Conference Mco 2008, Metz, France - Luxembourg, September 8-10, 2008, Proceedings

by ; ;
  • ISBN13:

    9783540874768

  • ISBN10:

    3540874763

  • Format: Paperback
  • Copyright: 2008-09-01
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $119.00

Summary

This book constitutes the refereed proceedings of the Second International Conference MCO 2008, Metz, France, September 2008.The 65 revised full papers presented were carefully reviewed and selected from 160 submissions. The papers are organized in topical sections on optimization and decision making; data mining theory, systems and applications; computer vision and image processing; computer communications and networks; optimization and search techniques for security, reliability, trust.

Table of Contents

Optimization and Decision Making
Optimal Flight Paths Reducing the Aircraft Noise During Landingp. 1
Scalability Analysis of a Novel Integer Programming Model to Deal with Energy Consumption in Heterogeneous Wireless Sensor Networksp. 11
Single Straddle Carrier Routing Problem in Port Container Terminals: Mathematical Model and Solving Approachesp. 21
Employing "Particle Swarm Optimization" and "Fuzzy Ranking Functions" for Direct Solution of EOQ Problemp. 32
Linear Reformulations of Integer Quadratic Programsp. 43
Control of Some Graph Invariants in Dynamic Routingp. 52
A Simulation Tool for Analyzing and Improving the Maternity Block Managementp. 59
Solving the Multiple Objective Integer Linear Programming Problemp. 69
Generalized Polychotomic Encoding: A Very Short Bit-Vector Encoding of Tree Hierarchiesp. 77
Mathematical Programming Formulations for the Bottleneck Hyperplane Clustering Problemp. 87
Constraint Propagation with Tabu List for Min-Span Frequency Assignment Problemp. 97
Evolutionary Optimisation of Kernel and Hyper-Parameters for SVMp. 107
Lot-Sizing and Sequencing on a Single Imperfect Machinep. 117
Best and Worst Optimum for Linear Programs with Interval Right Hand Sidesp. 126
Transit Network Re-timetabling and Vehicle Schedulingp. 135
Traveling Salesman Problem and Membership in Pedigree Polytope - A Numerical Illustrationp. 145
The Minimum Weight In-Tree Cover Problemp. 155
On Importance of a Special Sorting in the Maximum-Weight Clique Algorithm Based on Colour Classesp. 165
An Extended Comparison of the Best Known Algorithms for Finding the Unweighted Maximum Cliquep. 175
An Adapted Branch and Bound Algorithm for Approximating Real Root of a Ploynomialp. 182
Portfolio Selection under Piecewise Affine Transaction Costs: An Integer Quadratic Formulationp. 190
An Exact Method for a Discrete Quadratic Fractional Maximum Problemp. 197
Disaggregation of Bipolar-Valued Outranking Relationsp. 204
A Performance Study of Task Scheduling Heuristics in HC Environmentp. 214
Performance Evaluation in a Queueing System M[subscript 2]/G/1p. 224
Outcome-Space Polyblock Approximation Algorithm for Optimizing over Efficient Setsp. 234
A DC Programming Approach for Mixed-Integer Linear Programsp. 244
Simulation-Based Optimization for Steel Stackingp. 254
Robust Hedging of Electricity Retail Portfolios with CVaR Constraintsp. 264
Value Functions and Transversality Conditions for Infinite Horizon Optimal Control Problemsp. 273
Modeling the MObile Oil Recovery Problem as a Multiobjective Vehicle Routing Problemp. 283
Empirical Analysis of an Online Algorithm for Multiple Trading Problemsp. 293
A Novel Approach for the Nurse Scheduling Problemp. 303
Postoptimal Analysis in Nonserial Dynamic Programmingp. 308
A Novel Optimization in Guillotine Cut Applied Reel of Steelp. 318
Robust Production Planning: An Alternative to Scenario-Based Optimization Modelsp. 328
Challenging the Incomparability Problem: An Approach Methodology Based on ZAPROSp. 338
DC Programming Approach for a Class of Nonconvex Programs Involving l[subscript 0] Normp. 348
Finding Maximum Common Connected Subgraphs Using Clique Detection or Constraint Satisfaction Algorithmsp. 358
Analysis and Solution Developement of the Single-Vehicle Inventory Routing Problemp. 369
Data Mining Theory, Systems and Applications
A Methodology for the Automatic Regulation of Intersections in Real Time Using Soft-Computing Techniquesp. 379
Composite Dispatching Rule Generation through Data Mining in a Simulated Job Shopp. 389
Co-author Network Analysis in DBLP: Classifying Personal Namesp. 399
On Clustering the Criteria in an Outranking Based Decision Aid Approachp. 409
A Fast Parallel SVM Algorithm for Massive Classification Tasksp. 419
A Wavelet Based Multi Scale VaR Model for Agricultural Marketp. 429
Using Formal Concept Analysis for the Extraction of Groups of Co-expressed Genesp. 439
Join on Closure Systems Using Direct Implicational Basis Representationp. 450
Computer Vision and Image Processing
G[superscript 1] Blending B-Spline Surfaces and Optimizationp. 458
A Delineation Algorithm for Particle Images Onlinep. 468
Computer Communications and Networks
Improving Inter-cluster Broadcasting in Ad Hoc Networks by Delayed Floodingp. 478
Improved Time Complexities of Algorithms for the Directional Minimum Energy Broadcast Problemp. 488
Optimised Recovery with a Coordinated Checkpoint/Rollback Protocol for Domain Decomposition Applicationsp. 497
A Context-Aware Broadcast Protocol for Mobile Wireless Networksp. 507
Stability of Two-Stage Queues with Blockingp. 520
A Competitive Neural Network for Intrusion Detection Systemsp. 530
Transfer Graph Approach for Multimodal Transport Problemsp. 538
Wireless Traffic Service Communication Platform for Carsp. 548
System Architecture for C2C Communications Based on Mobile WiMAXp. 558
Accuracy and Efficiency in Simulating VANETsp. 568
Optimization and Search Techniques for Security, Reliability, Trust
Design of Highly Nonlinear Balanced Boolean Functions Using an Hybridation of DCA and Simulated Annealing Algorithmp. 579
Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocolp. 589
Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipherp. 597
VNSOptClust: A Variable Neighborhood Search Based Approach for Unsupervised Anomaly Detectionp. 607
Author Indexp. 617
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program