Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,201,895 papers from all fields of science
Search
Sign In
Create Free Account
Competitive analysis (online algorithm)
Known as:
Competitive analysis
, Competitive ratio
Competitive analysis is a method invented for analyzing online algorithms, in which the performance of an online algorithm (which must satisfy an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Adversary model
Amortized analysis
Amos Fiat
Anna Karlin
Expand
Broader (1)
Analysis of algorithms
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
The influence of knowledge economy development on competitiveness of southeastern Europe countries
B. Krstić
,
Tanja Stanišić
2013
Corpus ID: 56247826
The purpose of this research is to analyze the influence of knowledge as a vital development resource on competitiveness of…
Expand
2012
2012
Truck Transportation and Chipping Productivity of Whole Trees and Delimbed Energy Wood in Finland
J. Laitila
,
K. Väätäinen
2012
Corpus ID: 45171344
Nacrtak The present study aims to evaluate the competitiveness of various supply systems of smalldiameter wood harvested from…
Expand
2008
2008
Packet mode and QoS algorithms for buffered crossbar switches with FIFO queuing
A. Kesselman
,
Kirill Kogan
,
M. Segal
ACM SIGACT-SIGOPS Symposium on Principles of…
2008
Corpus ID: 17470958
The buffered crossbar switch architecture has recently gained considerable research attention. In such a switch, besides normal…
Expand
2007
2007
Softwood Lumber Quality Requirements: Examining the Supplier/Buyer Perception Gap
S. Weinfurter
,
E. Hansen
2007
Corpus ID: 54591559
The major objective of this research was to examine the perception gap that exists between suppliers and buyers concerning…
Expand
2006
2006
Approximation algorithms for multiconstrained quality-of-service routing
M. Song
,
S. Sahni
IEEE transactions on computers
2006
Corpus ID: 15610413
We propose six new heuristics to find a source-to-destination path that satisfies two or more additive constraints on edge…
Expand
Review
2004
Review
2004
Levels of information technology (IT) applications in Muslim world libraries
Muhammad Ramzan
Electronic library
2004
Corpus ID: 1743780
The utilisation of information technology (IT) has become an indicator of a country's wealth level. Countries, which fail to…
Expand
2003
2003
Possible positive-feedback mechanisms: plants change abiotic soil parameters in wet calcareous dune slacks
E. B. Adema
,
A. Grootjans
Plant Ecology
2003
Corpus ID: 12441560
In this paper the results are presented from a mesocosm study of the effects of typical dune slack plants on the soil solution…
Expand
2002
2002
Supply chain analysis: spreadsheet or simulation?
L. Chwif
,
M. Barretto
,
E. Saliby
Proceedings of the Winter Simulation Conference
2002
Corpus ID: 542058
In the last few decades, a lot of company effort has been spent in the optimization of internal efficiency, aiming at cost…
Expand
1999
1999
The Role of Technology in Learning: Managing to Achieve a Vision
R. Lewis
British Journal of Educational Technology
1999
Corpus ID: 15824387
The paper explores the current context for uses of technology in education, including the nature of work, the capabilities…
Expand
Highly Cited
1998
Highly Cited
1998
Speed is More Powerful than Clairvoyance
P. Berman
,
C. Coulston
Nordic Journal of Computing
1998
Corpus ID: 8171983
We consider the problem of preemptive non-clairvoyant scheduling on a single machine. In this model a scheduler receives a number…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE