A modified nearly exact method for solving low-rank trust region subproblem
Machine scheduling with resource dependent processing times
Equilibria for networks with malicious users