Relaxed Quasimonotone Operators and Relaxed Quasiconvex Functions

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Relaxed Quasimonotone Operators and Relaxed Quasiconvex Functions

In this paper, we introduce the class of multivalued relaxed μ quasimonotone operators and establish the existence of solutions of variational inequalities for such operators. This result is compared with a recent result of Bai et al on densely relaxed pseudomonotone operators. A similar comparison regarding an existence result of Luc on densely pseudomonotone operators is provided. Also, we in...

متن کامل

Relaxed optimality conditions for mu-differentiable functions

We prove some fundamental properties of mu-differentiable functions. A new notion of local minimizer and maximizer is introduced and several extremum conditions are formulated using the language of nonstandard analysis.

متن کامل

Learning Heuristic Functions from Relaxed Plans

We present a novel approach to learning heuristic functions for AI planning domains. Given a state, we view a relaxed plan (RP) found from that state as a relational database, which includes the current state and goal facts, the actions in the RP, and the actions’ add and delete lists. We represent heuristic functions as linear combinations of generic features of the database, selecting feature...

متن کامل

Relaxed Differential Fault Analysis of SHA-3

In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new features to the proposed attacks, e.g., the high probability of fault detection and the possibility of re-checking initial faults and the possibility to recover internal state...

متن کامل

Relaxed Authenticity

In-network data aggregation allows energy-efficient communication within a sensor network. However, such data aggregation introduces new security challenges. As sensor nodes are prone to node-compromise, a fraction of nodes might act maliciously and forge aggregated data. For arbitrary aggregation functions, the verification of authenticity of aggregated data, i.e., its correctness, integrity, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Optimization Theory and Applications

سال: 2008

ISSN: 0022-3239,1573-2878

DOI: 10.1007/s10957-008-9382-6