Latest version: v0.0.2
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
This package maximizes the total prize with a budget constraint for an undirected node-weighted rooted graph loosely inspired by Bateni 2018 algorithm from DOI:10.1137/15M102695X
No known vulnerabilities found