暂无分享,去创建一个
[1] Mugurel Ionut Andreica. Algorithmic Decision Optimization Techniques for Multiple Types of Agents with Contrasting Interests , 2009, ArXiv.
[2] Bennet Manvel. Counterfeit Coin Problems , 1977 .
[3] J. Hein,et al. An optimal algorithm to reconstruct trees from additive distance data. , 1989, Bulletin of mathematical biology.
[4] Li Zhang,et al. On the complexity of distance-based evolutionary tree reconstruction , 2003, SODA '03.
[5] Jotun J. Hein. An optimal algorithm to reconstruct trees from additive distance data , 1989 .
[6] Ker-I Ko,et al. On the Number of Queries Necessary to Identify a Permutation , 1986, J. Algorithms.
[7] J. Spencer. Guess a number - with lying , 1984 .
[8] Ugo Vaccaro,et al. Optimal Strategies Against a Liar , 1999, Theor. Comput. Sci..
[9] Martin Aigner,et al. Searching for counterfeit coins , 1997, Graphs Comb..
[10] Nicolae Tapus,et al. Algorithms for Identifying Sequence Patterns with Several Types of Occurrence Constraints , 2009, 2009 11th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing.
[11] László Pyber. How to find many counterfeit coins? , 1986, Graphs Comb..
[12] Tim Roughgarden,et al. Algorithmic Game Theory , 2007 .