Center for Discrete Mathematics and Theoretical Computer Science (DIMACS)

Research Output 1974 2019

Filter
Chapter
2015
1 Citation (Scopus)

Food Webs and Graphs

Cozzens, M., Mar 25 2015, Algebraic and Discrete Mathematical Methods for Modern Biology. Elsevier, p. 29-49 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Food Web
Graph in graph theory
Competition Graph
Ecology
Linkage
6 Citations (Scopus)

Strategy for the energy crisis: The case of commuter transportation policy

Roberts, F., Jan 1 2015, Structure of Decision: The Cognitive Maps of Political Elites. Princeton University Press, p. 142-179 38 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

energy crisis
transportation policy
commuter
Consensus
energy shortage
7 Citations (Scopus)

The questionnaire method

Roberts, F., Jan 1 2015, Structure of Decision: The Cognitive Maps of Political Elites. Princeton University Press, p. 333-342 10 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

questionnaire
self-initiated work
research planning
Research Design
Research Personnel
2014
2 Citations (Scopus)

Meaningful and meaningless statements in landscape ecology and environmental sustainability

Roberts, F., Jan 1 2014, Springer Optimization and Its Applications. Springer International Publishing, p. 297-312 16 p. (Springer Optimization and Its Applications; vol. 92).

Research output: Chapter in Book/Report/Conference proceedingChapter

Sustainability
Ecology
Climate
Water
Metric

Strange bedfellows: How and when to work with your enemy

Jaggard, A. D. & Wright, R., Jan 1 2014, Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. Stajano, F., Matyáš, V., Švenda, P., Anderson, J., Christianson, B. & Malcolm, J. (eds.). Springer Verlag, p. 263-267 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8809).

Research output: Chapter in Book/Report/Conference proceedingChapter

Security Protocols
Formal Model
Context
Collaboration

Strange bedfellows: How and when to work with your enemy (transcript of discussion)

Wright, R., Jan 1 2014, Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. Stajano, F., Matyáš, V., Švenda, P., Anderson, J., Christianson, B. & Malcolm, J. (eds.). Springer Verlag, p. 268-275 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8809).

Research output: Chapter in Book/Report/Conference proceedingChapter

Strategy-proof location functions on finite graphs

McMorris, F. R., Mulder, H. M. & Roberts, F. S., Jan 1 2014, Springer Optimization and Its Applications. Springer International Publishing, p. 63-75 13 p. (Springer Optimization and Its Applications; vol. 92).

Research output: Chapter in Book/Report/Conference proceedingChapter

Finite Graph
Strategy
Entire
Graph in graph theory
2013
1 Citation (Scopus)

Meaningful and meaningless statements in epidemiology and public health

Roberts, F., Jan 1 2013, Measurement with Persons: Theory, Methods, and Implementation Areas. Taylor and Francis, p. 75-95 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Epidemiology
Public Health
2011
2 Citations (Scopus)

Sensor management problems of nuclear detection

Carpenter, T., Cheng, J., Roberts, F. & Xie, M., Jan 1 2011, Springer Series in Reliability Engineering. Springer-Verlag London Ltd, p. 299-323 25 p. (Springer Series in Reliability Engineering; vol. 34).

Research output: Chapter in Book/Report/Conference proceedingChapter

Sensors
2008
9 Citations (Scopus)

Optimization problems for port-of-entry detection systems

Boros, E., Elsayed, E., Kantor, P., Roberts, F. & Xie, M., Jul 3 2008, Intelligence and Security Informatics: Techniques and Applications. Chen, H. & Yang, C. (eds.). p. 319-335 17 p. (Studies in Computational Intelligence; vol. 135).

Research output: Chapter in Book/Report/Conference proceedingChapter

Inspection
Containers
Sensors
Detectors
Gamma rays