 document

Schwind, Nicolas (author), Demirović, E. (author), Inoue, Katsumi (author), Lagniez, Jean Marie (author)In one of its simplest forms, Team Formation involves deploying the least expensive team of agents while covering a set of skills. While current algorithms are reasonably successful in computing the best teams, the resilience to change of such solutions remains an important concern: Once a team has been formed, some of the agents considered...journal article 2023
 document

Dahlberg, E.A. (author), Helsen, J. (author), Wehner, S.D.C. (author)A graph H is a vertexminor of a graph G if it can be reached from G by the successive application of local complementations and vertex deletions. Vertexminors have been the subject of intense study in graph theory over the last decades and have found applications in other fields such as quantum information theory. Therefore it is natural to...journal article 2022
 document

Dutta, Shamak (author), Wilde, N. (author), Smith, Stephen L. (author)In this paper, we consider a subset selection problem in a spatial field where we seek to find a set of k locations whose observations provide the best estimate of the field value at a finite set of prediction locations. The measurements can be taken at any location in the continuous field, and the covariance between the field values at...conference paper 2022
 document

Zhang, Yu (author), Wang, Yue (author), Tian, Zhi (author), Leus, G.J.T. (author), Zhang, Gong (author)This paper develops an efficient solution for superresolution twodimensional (2D) harmonic retrieval from multiple measurement vectors (MMV). Given the sample covariance matrix constructed from the MMV, a gridless compressed sensing approach is proposed based on the atomic norm minimization (ANM). In the approach, our key step is to perform...journal article 2022
 document

Stobbe, P.J. (author), Keijzer, T. (author), Ferrari, Riccardo M.G. (author)Fully Homomorphic Encryption (FHE) has made it possible to perform addition and multiplication operations on encrypted data. Using FHE in control thus has the advantage that control effort for a plant can be calculated remotely without ever decrypting the exchanged information. FHE in its current form is however not practically applicable for...conference paper 2022
 document

Li, Jingqi (author), Chen, Ximing (author), Gonçalves Melo Pequito, S.D. (author), Pappas, George J. (author), Preciado, Victor M. (author)In this article, we study the target controllability problem of networked dynamical systems,in which we are tasked to steer a subset of network nodes toward a desired objective. More specifically, we derive necessary and sufficient conditions for the structural target controllability of linear timeinvariant (LTI) systems with symmetric state...journal article 2021
 document

Nabi, H.N. (author), de Visser, C.C. (author), Pavel, M.D. (author), Quaranta, Giuseppe (author)The research presented in this paper focuses on the development of a quasiLinear Parameter Varying (qLPV) model for the XV15 tiltrotor aircraft. The specific category of qLPV modeling technique, known as the model stitching technique, is employed to model the timevarying dynamics of XV15 tiltrotor aircraft over the entire flight envelope....journal article 2021
 document

van Kreveld, Ivo (author)Cooperative game theory studies multiagent environments where agents are able to make binding agreements. A lot has been written about dividing goods or other positive gains among the agents. This study investigates ways to distribute tasks with a negative utility in a strategyproof way. The intended application is a group of people or...master thesis 2020
 document

Gijswijt, Dion (author), Smit, Harry J. (author), van der Wegen, Marieke (author)There are several notions of gonality for graphs. The divisorial gonality dgon(G) of a graph G is the smallest degree of a divisor of positive rank in the sense of BakerNorine. The stable gonality sgon(G) of a graph G is the minimum degree of a finite harmonic morphism from a refinement of G to a tree, as defined by Cornelissen, Kato and Kool....journal article 2020
 document

Klassen, J.D. (author), Marvian, Milad (author), Piddock, Stephen (author), Ioannou, Marios (author), Hen, Itay (author), Terhal, B.M. (author)We examine the problem of determining whether a multiqubit twolocal Hamiltonian can be made stoquastic by singlequbit unitary transformations. We prove that when such a Hamiltonian contains onelocal terms, then this task can be NPhard. This is shown by constructing a class of Hamiltonians for which performing this task is equivalent to...journal article 2020
 document

Molengraaf, Constantijn (author)In the range of applications opened by quantum technology, often a highly entangled source state is needed as an input for a protocol (target state). The easiest example of such an application is QKD, other examples are quantum secret sharing and measurement based quantum computing. Generating a nonlocal entangled state is however not trivial....master thesis 2019
 document

Dahlberg, E.A. (author), Wehner, S.D.C. (author)Stabilizer states form an important class of states in quantum information, and are of central importance in quantum error correction. Here, we provide an algorithm for deciding whether one stabilizer (target) state can be obtained from another stabilizer (source) state by singlequbit Clifford operations (LC), singlequbit Pauli measurements...journal article 2018
 document

Prins, Peter J. (author), Wahls, S. (author)Nonlinear Fourier Transforms (NFTs) enable the analysis of signals governed by certain nonlinear evolution equations in a way that is analogous to how the conventional Fourier transform is used to analyse linear wave equations. Recently, fast numerical algorithms have been derived for the numerical computation of certain NFTs. In this paper,...conference paper 2018
 document

Janssen, T.M.L. (author)This thesis was a combined project of the CWI (the national research institute for mathematics and computer science in the Netherlands) and the NLR (National Aerospace Laboratory of the Netherlands). In this thesis we examine noise pollution around airports. Given an airport we will consider the problem maximizing the number of flights, while...master thesis 2013
 document

Bielecki, M. (author), Hidders, J. (author), Paredaens, J. (author), Spielmann, M. (author), Tyszkiewicz, J. (author), Van den Bussche, J. (author)We investigate the computational capabilities of Web browsers, when equipped with a standard finite automaton. We observe that Web browsers are Turingcomplete. We introduce the notion of a navigational problem, and investigate the complexity of solving Web queries and navigational problems by Web browsers, where complexity is measured by the...journal article 2010
 document

Verwer, S.E. (author)This thesis contains a study in a subfield of artificial intelligence, learning theory, machine learning, and statistics, known as system (or language) identification. System identification is concerned with constructing (mathematical) models from observations. Such a model is an intuitive description of a complex system. One of the main nice...doctoral thesis 2010
 document

De Weerdt, M.M. (author), Zhang, Y. (author), Klos, T. (author)This paper proposes a new variant of the task allocation problem, where the agents are connected in a social network and tasks arrive at the agents distributed over the network. We show that the complexity of this problem remains NPhard. Moreover, it is not approximable within some factor. We develop an algorithm based on the contractnet...conference paper 2007