The slice is served: Enforcing radio access network slicing in virtualized 5G systems

S D'Oro, F Restuccia, A Talamonti… - IEEE INFOCOM 2019 …, 2019 - ieeexplore.ieee.org
The notions of softwarization and virtualization of the radio access network (RAN) of next-
generation (5G) wireless systems are ushering in a vision where applications and services …

[图书][B] Constrained Optimization and Image Space Analysis: Volume 1: Separation of Sets and Optimality Conditions

F Giannessi - 2005 - books.google.com
Over the last twenty years, Professor Franco Giannessi, a highly respected researcher, has
been working on an approach to optimization theory based on image space analysis. His …

Binarized collaborative filtering with distilling graph convolutional networks

H Wang, D Lian, Y Ge - arXiv preprint arXiv:1906.01829, 2019 - arxiv.org
The efficiency of top-K item recommendation based on implicit feedback are vital to
recommender systems in real world, but it is very challenging due to the lack of negative …

Coordinated 5G network slicing: How constructive interference can boost network throughput

S D'Oro, L Bonati, F Restuccia… - IEEE/ACM Transactions …, 2021 - ieeexplore.ieee.org
Radio access network (RAN) slicing is a virtualization technology that partitions radio
resources into multiple autonomous virtual networks. Since RAN slicing can be tailored to …

[图书][B] On the existence of polyhedral convex envelopes

F Tardella - 2004 - Springer
In this paper we address the problem of identifying those functions whose convex envelope
on a polyhedron P coincides with the convex envelope of their restrictions to the vertices of …

Existence and sum decomposition of vertex polyhedral convex envelopes

F Tardella - Optimization Letters, 2008 - Springer
Convex envelopes are a very useful tool in global optimization. However finding the exact
convex envelope of a function is a difficult task in general. This task becomes considerably …

Binary optimized hashing

Q Dai, J Li, J Wang, YG Jiang - … of the 24th ACM international conference …, 2016 - dl.acm.org
This paper studies the problem of learning to hash, which is essentially a mixed integer
optimization problem, containing both the binary hash code output and the (continuous) …

Euclidean combinatorial configurations: Typology and applications

O Pichugina, S Yakovlev - 2019 IEEE 2nd Ukraine Conference …, 2019 - ieeexplore.ieee.org
In this paper, a concept of Euclidean combinatorial configuration as a mapping of a set of
certain objects into a point of Euclidean space is introduced. A typology of Euclidean …

Improved penalty algorithm for mixed integer PDE constrained optimization problems

D Garmatter, M Porcelli, F Rinaldi, M Stoll - Computers & Mathematics with …, 2022 - Elsevier
Optimal control problems including partial differential equation (PDE) as well as integer
constraints merge the combinatorial difficulties of integer programming and the challenges …

Conic relaxations for semi-supervised support vector machines

Y Bai, X Yan - Journal of Optimization Theory and Applications, 2016 - Springer
Semi-supervised support vector machines arise in machine learning as a model of mixed
integer programming problem for classification. In this paper, we propose two convex conic …