Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,984,604 papers from all fields of science
Search
Sign In
Create Free Account
Greedy algorithm
Known as:
Greedy method
, Greedy algorithms
, Greedy heuristic
Expand
A greedy algorithm is an algorithmic paradigm that follows the problem solving heuristic of making the locally optimal choice at each stage with the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Algorithm design
Antimatroid
Best-first search
Brown clustering
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
GeoSVR: A map-based stateless VANET routing
Yong Xiang
,
Zheng Liu
,
Ruilin Liu
,
Weizhen Sun
,
Wei Wang
Ad hoc networks
2013
Corpus ID: 40001744
Highly Cited
2011
Highly Cited
2011
Efficient track linking methods for track graphs using network-flow and set-cover techniques
Zheng Wu
,
T. Kunz
,
Margrit Betke
Computer Vision and Pattern Recognition
2011
Corpus ID: 17063512
This paper proposes novel algorithms that use network-flow and set-cover techniques to perform occlusion reasoning for a large…
Expand
Highly Cited
2008
Highly Cited
2008
Optimizing deployment of Internet gateway in Wireless Mesh Networks
Bing He
,
Bin Xie
,
D. Agrawal
Computer Communications
2008
Corpus ID: 22195143
Highly Cited
2004
Highly Cited
2004
Combination of hidden Markov models with dynamic time warping for speech recognition
S. Axelrod
,
B. Maison
IEEE International Conference on Acoustics…
2004
Corpus ID: 16440025
We combine hidden Markov models of various topologies and nearest neighbor classification techniques in an exponential modeling…
Expand
Highly Cited
2004
Highly Cited
2004
Organization-based cooperative coalition formation
Sherief Abdallah
,
V. Lesser
ACM International Conference on International…
2004
Corpus ID: 1591796
The coalition formation problem has received a considerable amount of attention in recent years. In this work we present a novel…
Expand
Highly Cited
2001
Highly Cited
2001
Data mining criteria for tree-based regression and classification
A. Buja
,
Yung-Seop Lee
Knowledge Discovery and Data Mining
2001
Corpus ID: 7319327
This paper is concerned with the construction of regression and classification trees that are more adapted to data mining…
Expand
Highly Cited
1998
Highly Cited
1998
Adaptive Fault-Tolerant Routing in Cube-Based Multicomputers Using Safety Vectors
Jie Wu
IEEE Trans. Parallel Distributed Syst.
1998
Corpus ID: 12941596
Reliable communication in cube-based multicomputers using the safety vector concept is studied in this paper. In our approach…
Expand
Highly Cited
1995
Highly Cited
1995
Loading Multiple Pallets
E. E. Bischoff
,
M. Ratcliff
1995
Corpus ID: 62710721
This paper addresses the problem of loading pallets with non-identical items, i.e. what has been called the ‘Distributor's Pallet…
Expand
Highly Cited
1994
Highly Cited
1994
Using a genetic algorithm to optimize problems with feasibility constraints
David Orvosh
,
L. Davis
Proceedings of the First IEEE Conference on…
1994
Corpus ID: 980682
G.E. Liepins et al. (1990) have shown that genetic algorithm optimization of certain combinatorial optimization problems can be…
Expand
Highly Cited
1994
Highly Cited
1994
An observation-based admission control algorithm for multimedia servers
H. Vin
,
A. Goyal
,
Anshuman Goyal
,
P. Goyal
Proceedings of IEEE International Conference on…
1994
Corpus ID: 15182362
Proposes a novel observation-based admission control algorithm, in which a client is admitted for service by a multimedia server…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE