kw.\*:("conic programming")
Results 1 to 25 of 136
Selection :
Cone Programming and its ApplicationsANJOS, Miguel F; DE KLERK, Etienne; RENDL, Franz et al.Mathematical programming (Print). 2011, Vol 129, Num 1, issn 0025-5610, 157 p.Serial Issue
Risk optimization with p-order conic constraints: A linear programming approachKROKHMAL, Pavlo A; SOBERANIS, Policarpio.European journal of operational research. 2010, Vol 201, Num 3, pp 653-671, issn 0377-2217, 19 p.Article
Representing quadratically constrained quadratic programs as generalized copositive programsBURER, Samuel; DONG, Hongbo.Operations research letters. 2012, Vol 40, Num 3, pp 203-206, issn 0167-6377, 4 p.Article
Full Nesterov―Todd step infeasible interior-point method for symmetric optimizationGU, G; ZANGIABADI, M; ROOS, C et al.European journal of operational research. 2011, Vol 214, Num 3, pp 473-484, issn 0377-2217, 12 p.Article
Second order symmetric duality in multiobjective programming involving generalized cone-invex functionsMISHRA, S. K; LAI, K. K.European journal of operational research. 2007, Vol 178, Num 1, pp 20-26, issn 0377-2217, 7 p.Article
A Note on the Simplex Method for 2-Dimensional Second-Order Cone ProgrammingYU XIA.Lecture notes in computer science. 2006, pp 124-131, issn 0302-9743, isbn 3-540-34379-2, 8 p.Conference Paper
Solving asymmetric variational inequalities via convex optimizationAGHASSI, Michele; BERTSIMAS, Dimitris; PERAKIS, Georgia et al.Operations research letters. 2006, Vol 34, Num 5, pp 481-490, issn 0167-6377, 10 p.Article
Inverse conic programming with applicationsIYENGAR, Garud; WANMO KANG.Operations research letters. 2005, Vol 33, Num 3, pp 319-330, issn 0167-6377, 12 p.Article
Mesh adaptive computation of upper and lower bounds in limit analysisCIRIA, H; PERAIRE, J; BONET, J et al.International journal for numerical methods in engineering. 2008, Vol 75, Num 8, pp 899-944, issn 0029-5981, 46 p.Article
Lower bound limit analysis of cohesive-frictional materials using second-order cone programmingMAKRODIMOPOULOS, A; MARTIN, C. M.International journal for numerical methods in engineering. 2006, Vol 66, Num 4, pp 604-634, issn 0029-5981, 31 p.Article
Hollow sphere models, conic programming and third stress invariantTHORE, Ph; PASTOR, F; PASTOR, J et al.European journal of mechanics. A. Solids. 2011, Vol 30, Num 2, pp 63-71, issn 0997-7538, 9 p.Article
A modified alternating direction method for convex quadratically constrained quadratic semidefinite programsJIE SUN; SU ZHANG.European journal of operational research. 2010, Vol 207, Num 3, pp 1210-1220, issn 0377-2217, 11 p.Article
Strong Semismoothness of Projection onto Slices of Second-Order ConeYINGNAN WANG; NAIHUA XIU.Journal of optimization theory and applications. 2011, Vol 150, Num 3, pp 599-614, issn 0022-3239, 16 p.Article
A D-induced duality and its applicationsBRINKHUIS, Jan; SHUZHONG ZHANG.Mathematical programming. 2008, Vol 114, Num 1, pp 149-182, issn 0025-5610, 34 p.Article
Non-differentiable symmetric duality for multiobjective programming with cone constraintsMOON HEE KIM; DO SANG KIM.European journal of operational research. 2008, Vol 188, Num 3, pp 652-661, issn 0377-2217, 10 p.Article
Stochastic 0-1 linear programming under limited distributional informationWAGNER, Michael R.Operations research letters. 2008, Vol 36, Num 2, pp 150-156, issn 0167-6377, 7 p.Article
Controlling Sparseness in Non-negative Tensor FactorizationHEILER, Matthias; SCHNÖRR, Christoph.Lecture notes in computer science. 2006, pp 56-67, issn 0302-9743, isbn 3-540-33832-2, 12 p.Conference Paper
Remarks on some properties of conic yield restrictions in limit analysisMAKRODIMOPOULOS, Athanasios.International journal for numerical methods in biomedical engineering (Print). 2010, Vol 26, Num 11, pp 1449-1461, issn 2040-7939, 13 p.Article
Largest dual ellipsoids inscribed in dual conesTODD, M. J.Mathematical programming (Print). 2009, Vol 117, Num 1-2, pp 425-434, issn 0025-5610, 10 p.Article
Graph Implementations for Nonsmooth Convex ProgramsGRANT, Michael C; BOYD, Stephen P.Recent advances in learning and control. Lecture notes in control and information sciences. 2008, pp 95-110, issn 0170-8643, isbn 978-1-8480-0154-1, 1Vol, 16 p.Book Chapter
Robust classification and regression using support vector machines : Optimization and data miningTRAFALIS, Theodore B; GILBERT, Robin C.European journal of operational research. 2006, Vol 173, Num 3, pp 893-909, issn 0377-2217, 17 p.Conference Paper
Lifting for conic mixed-integer programmingATAMTÜRK, Alper; NARAYANAN, Vishnu.Mathematical programming (Print). 2011, Vol 126, Num 2, pp 351-363, issn 0025-5610, 13 p.Article
Conic Programming for Multitask LearningKATO, Tsuyoshi; KASHIMA, Hisahi; SUGIYAMA, Masashi et al.IEEE transactions on knowledge and data engineering. 2010, Vol 22, Num 7, pp 957-958, issn 1041-4347, 2 p.Article
Polynomial time solvability of non-symmetric semidefinite programmingHU, Sheng-Long; HUANG, Zheng-Hai.Operations research letters. 2010, Vol 38, Num 5, pp 358-360, issn 0167-6377, 3 p.Article
Proximal-Like Algorithm Using the Quasi D-Function for Convex Second-Order Cone ProgrammingPAN, S. H; CHEN, J. S.Journal of optimization theory and applications. 2008, Vol 138, Num 1, pp 95-113, issn 0022-3239, 19 p.Article