Search results
Jump to navigation
Jump to search
- ...1980s. It's primarily used for solving [[Nonlinear programming|non-linear programming]] problems, particularly those related to structural design and [[topology ...especially in the realm of structural design. Another paper was published in 1993 by Svanberg which added some extensions to the method, including mini- ...4 KB (564 words) - 23:08, 13 December 2023
- {{Short description|Technique in mathematical programming}} ...]]. This block structure often occurs in applications such as [[stochastic programming]] as the uncertainty is usually represented with scenarios. The technique i ...11 KB (1,766 words) - 20:06, 2 November 2024
- ...ditor3-first=H. |editor3-last=Uzawa |title=Studies in linear and nonlinear programming |url=https://archive.org/details/studiesinlinearn0000arro |url-access=regis in order to compute <math>x_2</math>. ...5 KB (818 words) - 17:14, 9 September 2024
- ...ient method (in red) and the [[Frank–Wolfe algorithm|Frank-Wolfe method]] (in green).]] \operatorname{min}\limits_{x \in \mathbb{R}^N} \sum_{i=1}^n f_i(x) ...5 KB (713 words) - 18:45, 26 December 2024
- ...nd sometimes in the center. This process is repeated recursively to result in the fractal. Typically, there is also the restriction that the ''n''-gons m == In two dimensions == ...15 KB (2,122 words) - 09:37, 2 June 2024
- ...the non-negative integers is also known as a '''bound function''', because in this case it provides a trivial upper bound on the number of iterations of ...''.<ref>{{cite book|last=Winskel|first=Glynn|title=The Formal Semantics of Programming Languages: An Introduction|year=1993|publisher=Massachusetts Institute of T ...10 KB (1,608 words) - 09:05, 24 August 2021
- ...irst2=John J. | last3=Sherali | first3=Hanif D. | year=2010 | title=Linear Programming and Network Flows | edition=4th | publisher=Wiley | page=453}}</ref> ...problem, but with a higher dependence on the numbers of edges and vertices in the graph, have been known for longer.<ref>{{citation ...4 KB (581 words) - 20:52, 16 November 2024
- {{Infobox programming language ...radigm = [[Imperative programming|imperative]] ([[Procedural programming|procedural]]), [[Reversible computing|reversible]] ...11 KB (1,629 words) - 08:31, 12 August 2024
- ...ref> The algorithmic theory of Graver bases and its application to integer programming is described by [[Shmuel Onn]].<ref name="Onn">[http://ie.technion.ac.il/~o ...rix <math>A</math> is the finite set <math>G(A)</math> of minimal elements in the set ...14 KB (2,147 words) - 06:55, 17 January 2025
- ...la''' is used to determine the blocking probability of an M/M/c/c/N queue (in [[Kendall's notation]]). ...003">{{cite book|last1=Tijms|first1=Henk C.|year=2003|title=A first course in stochastic models|publisher=John Wiley and Sons|doi=10.1002/047001363X}}</r ...4 KB (604 words) - 18:10, 24 February 2025
- ...tish people|British]] [[mathematician]] [[John Horton Conway|John Conway]] in 1973. Contrary to other games and problems introduced by Conway, these prob In each variant of the problem, Conway uses a deck of [[playing cards]]. Since ...11 KB (1,601 words) - 11:59, 25 February 2025
- {{Short description|Programming language}} {{Infobox programming language ...7 KB (988 words) - 09:49, 13 March 2024
- ...th [[gradient descent]], but it uses an explicit [[trust region]]. At each iteration, if the step from the Gauss–Newton algorithm is within the trust region, it ...leg step and the shape of a [[Golf course#Fairway and rough|dogleg hole]] in [[golf]].<ref name="yuan"/> ...6 KB (833 words) - 08:48, 13 December 2024
- ...ramming language]] developed for and used on [[ICT 1900 series]] computers in the late 1960s and early 1970s; it was implemented as an incremental [[BASI ...code to be renumbered, by default in increments of 10, to allow more space in the middle of a program. ...7 KB (1,034 words) - 18:13, 11 December 2023
- ...lems.<ref name=":0">Fletcher, R. (2005). "On the Barzilai–Borwein Method". In Qi, L.; Teo, K.; Yang, X. (eds.). Optimization and Control with Application ...alpha_{k-1} g_{k-1}</math> where <math>\alpha_{k-1}</math> is the previous iteration's step size (not necessarily a Barzilai-Borwein step size), and for brevity ...8 KB (1,210 words) - 14:23, 11 February 2025
- ...l function with an unknown scaling factor. Richtárik and Takáč (2011) give iteration complexity bounds which do not require this, i.e., the method is applied to where <math>\Psi(x) = \sum_{i=1}^n \Psi_i(x^{(i)}),</math> <math>x\in R^N</math> is decomposed into <math>n</math> blocks of variables/coordinate ...5 KB (778 words) - 01:53, 29 September 2024
- ...th>n</math> students living in the student dormitories. Each student lives in a single house. Each student has a [[preference (economics)|preference rela # Note that there must be at least one cycle in the graph (this might be a cycle of length 1, if some agent <math>i</math> ...13 KB (1,961 words) - 08:40, 21 January 2025
- ...ce a small increase in one objective value preempts a much larger increase in less important objective values. ...=4 |issue=4 |pages=223–228 |doi=10.1007/BF01782758 |issn=1436-6304}}</ref> in project management, when analyzing [[PERT]] networks, one often wants to mi ...10 KB (1,493 words) - 04:28, 16 December 2024
- In [[computer science]] and [[operations research]], '''randomized rounding''' ...dea of randomized rounding is to convert an optimal solution of a [[linear programming relaxation|relaxation]] of the problem into an approximately-optimal soluti ...24 KB (3,865 words) - 04:12, 2 December 2023
- ...estimated using statistical estimation techniques (called output analysis in simulation methodology). ...imum computation and time, the problem is solved iteratively where in each iteration the solution moves closer to the optimum solution. Such methods are known a ...13 KB (1,802 words) - 19:05, 19 June 2024