Author of the publication

A (1.4 + epsilon)-Approximation Algorithm for the 2-Max-Duo Problem.

, , , , , and . ISAAC, volume 92 of LIPIcs, page 66:1-66:12. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network pharmacology-based prediction of the active ingredients and mechanism of Shen Gui capsule for application to coronary heart disease., , , , , , , , , and . Comput. Biol. Medicine, (2020)Adversarial FDI Attack against AC State Estimation with ANN., and . CoRR, (2019)Simultaneous Phase Unwrapping and Removal of Chemical Shift (SPURS) Using Graph Cuts: Application in Quantitative Susceptibility Mapping., , , , , , , , and . IEEE Trans. Med. Imaging, 34 (2): 531-540 (2015)Rank-One Solutions for SDP Relaxation of QCQPs in Power Systems., , and . IEEE Trans. Smart Grid, 10 (1): 5-15 (2019)A Note on Closeness between NP-Hard Sets and C=P.. J. Comput. Sci. Technol., 15 (2): 194-195 (2000)Some Structural Properties of SAT.. J. Comput. Sci. Technol., 15 (5): 439-444 (2000)Large hypertree width for sparse random hypergraphs., , and . J. Comb. Optim., 29 (3): 531-540 (2015)Improved Exponential Time Lower Bound of Knapsack Problem under BT model, , , , and . CoRR, (2006)Detection of Quiescent Cardiac Phases in Echocardiography Data Using Nonlinear Filtering and Boundary Detection Techniques., , , , and . J. Digital Imaging, 27 (5): 625-632 (2014)A Lightweight Privacy-Preserving Authentication Protocol for VANETs., , , , , and . IEEE Syst. J., 14 (3): 3547-3557 (2020)