Downloads & Free Reading Options - Results

Algorithms And Complexity by G. Ausiello

Read "Algorithms And Complexity" by G. Ausiello through these free online access and download options.

Search for Downloads

Search by Title or Author

Books Results

Source: The Internet Archive

The internet Archive Search Results

Available books for downloads and borrow from The internet Archive

1Path Computation In Multi-layer Networks: Complexity And Algorithms

By

Carrier-grade networks comprise several layers where different protocols coexist. Nowadays, most of these networks have different control planes to manage routing on different layers, leading to a suboptimal use of the network resources and additional operational costs. However, some routers are able to encapsulate, decapsulate and convert protocols and act as a liaison between these layers. A unified control plane would be useful to optimize the use of the network resources and automate the routing configurations. Software-Defined Networking (SDN) based architectures, such as OpenFlow, offer a chance to design such a control plane. One of the most important problems to deal with in this design is the path computation process. Classical path computation algorithms cannot resolve the problem as they do not take into account encapsulations and conversions of protocols. In this paper, we propose algorithms to solve this problem and study several cases: Path computation without bandwidth constraint, under bandwidth constraint and under other Quality of Service constraints. We study the complexity and the scalability of our algorithms and evaluate their performances on real topologies. The results show that they outperform the previous ones proposed in the literature.

“Path Computation In Multi-layer Networks: Complexity And Algorithms” Metadata:

  • Title: ➤  Path Computation In Multi-layer Networks: Complexity And Algorithms
  • Authors:

“Path Computation In Multi-layer Networks: Complexity And Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.84 Mbs, the file-s for this book were downloaded 25 times, the file-s went public at Fri Jun 29 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find Path Computation In Multi-layer Networks: Complexity And Algorithms at online marketplaces:


2DTIC ADA431591: Change Detection And Estimation In Large Scale Sensor Networks: Linear Complexity Algorithms

By

We propose algorithms for nonparametric sample-based spacial change detection and estimation in large scale sensor networks. We collect random samples containing the location of sensors and their local decisions, and assume that the local decisions can be stimulated or normal , reflecting the local strength of some stimulating agent. Then change in the location of the agent manifests itself by a change in the distribution of stimulated sensors. In this paper, we are aiming at developing a test that, given two collections of samples, can decide whether the distribution generating the samples has changed or not, and give an estimated changed area if a change is indeed detected. The focus of this paper is to reduce the complexity of the detection and estimation algorithm. We propose two fast algorithms with almost linear complexity and analyze their completeness, flexibility and robustness.

“DTIC ADA431591: Change Detection And Estimation In Large Scale Sensor Networks: Linear Complexity Algorithms” Metadata:

  • Title: ➤  DTIC ADA431591: Change Detection And Estimation In Large Scale Sensor Networks: Linear Complexity Algorithms
  • Author: ➤  
  • Language: English

“DTIC ADA431591: Change Detection And Estimation In Large Scale Sensor Networks: Linear Complexity Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 4.50 Mbs, the file-s for this book were downloaded 53 times, the file-s went public at Thu May 24 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - JPEG Thumb - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA431591: Change Detection And Estimation In Large Scale Sensor Networks: Linear Complexity Algorithms at online marketplaces:


3The Jones Polynomial: Quantum Algorithms And Applications In Quantum Complexity Theory

By

We analyze relationships between quantum computation and a family of generalizations of the Jones polynomial. Extending recent work by Aharonov et al., we give efficient quantum circuits for implementing the unitary Jones-Wenzl representations of the braid group. We use these to provide new quantum algorithms for approximately evaluating a family of specializations of the HOMFLYPT two-variable polynomial of trace closures of braids. We also give algorithms for approximating the Jones polynomial of a general class of closures of braids at roots of unity. Next we provide a self-contained proof of a result of Freedman et al. that any quantum computation can be replaced by an additive approximation of the Jones polynomial, evaluated at almost any primitive root of unity. Our proof encodes two-qubit unitaries into the rectangular representation of the eight-strand braid group. We then give QCMA-complete and PSPACE-complete problems which are based on braids. We conclude with direct proofs that evaluating the Jones polynomial of the plat closure at most primitive roots of unity is a #P-hard problem, while learning its most significant bit is PP-hard, circumventing the usual route through the Tutte polynomial and graph coloring.

“The Jones Polynomial: Quantum Algorithms And Applications In Quantum Complexity Theory” Metadata:

  • Title: ➤  The Jones Polynomial: Quantum Algorithms And Applications In Quantum Complexity Theory
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 17.22 Mbs, the file-s for this book were downloaded 86 times, the file-s went public at Sun Sep 22 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find The Jones Polynomial: Quantum Algorithms And Applications In Quantum Complexity Theory at online marketplaces:


4DTIC ADA418278: Low-Complexity Interior Point Algorithms For Stochastic Programming: Derivation Analysis And Performance Evaluation

By

The broad purpose of this project was to investigate low-complexity interior point decomposition algorithms for stochastic programming. A specific objective was to evaluate algorithms using test problems arising from useful applications. The important direct results of this project include: (1) a new test problem collection that includes problem instances from a variety of application areas; (2) a new package of C-routines for converting SMPS input data into data structures more suitable for implementing algorithms; (3) a new software package, CPA, for two-stage stochastic linear programs. The test problems and input conversion routines have been developed in a general manner to be useful to other researchers. CPA includes volumetric center algorithms that proved to be successful in our computational evaluations. To the best of our knowledge, CPA is the only software for stochastic programming that includes volumetric center algorithms. Items (1), (2) and (3) are freely accessible over the Internet. The important theoretical results of this project include: (4) a new characterization of convexity-preserving maps; (5) a new coordinate-free foundation for projective spaces; (6) a new geometric characterization of one-dimensional projective spaces; (7) new algorithms for bound-constrained nonlinear optimization. These theoretical results are likely to be useful in computational optimization in general.

“DTIC ADA418278: Low-Complexity Interior Point Algorithms For Stochastic Programming: Derivation Analysis And Performance Evaluation” Metadata:

  • Title: ➤  DTIC ADA418278: Low-Complexity Interior Point Algorithms For Stochastic Programming: Derivation Analysis And Performance Evaluation
  • Author: ➤  
  • Language: English

“DTIC ADA418278: Low-Complexity Interior Point Algorithms For Stochastic Programming: Derivation Analysis And Performance Evaluation” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 30.05 Mbs, the file-s for this book were downloaded 60 times, the file-s went public at Mon May 14 2018.

Available formats:
Abbyy GZ - Additional Text PDF - Archive BitTorrent - DjVuTXT - Djvu XML - Image Container PDF - JPEG Thumb - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA418278: Low-Complexity Interior Point Algorithms For Stochastic Programming: Derivation Analysis And Performance Evaluation at online marketplaces:


5Easy And Hard Constraint Ranking In OT: Algorithms And Complexity

By

We consider the problem of ranking a set of OT constraints in a manner consistent with data. We speed up Tesar and Smolensky's RCD algorithm to be linear on the number of constraints. This finds a ranking so each attested form x_i beats or ties a particular competitor y_i. We also generalize RCD so each x_i beats or ties all possible competitors. Alas, this more realistic version of learning has no polynomial algorithm unless P=NP! Indeed, not even generation does. So one cannot improve qualitatively upon brute force: Merely checking that a single (given) ranking is consistent with given forms is coNP-complete if the surface forms are fully observed and Delta_2^p-complete if not. Indeed, OT generation is OptP-complete. As for ranking, determining whether any consistent ranking exists is coNP-hard (but in Delta_2^p) if the forms are fully observed, and Sigma_2^p-complete if not. Finally, we show that generation and ranking are easier in derivational theories: in P, and NP-complete.

“Easy And Hard Constraint Ranking In OT: Algorithms And Complexity” Metadata:

  • Title: ➤  Easy And Hard Constraint Ranking In OT: Algorithms And Complexity
  • Author:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 11.15 Mbs, the file-s for this book were downloaded 71 times, the file-s went public at Thu Sep 19 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - JPEG Thumb - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Easy And Hard Constraint Ranking In OT: Algorithms And Complexity at online marketplaces:


6DTIC ADA1022259: Research In Complexity Theory And Combinatorial Algorithms

By

Since October 1, 1979, research in Complexity Theory and Combinatorial Algorithms at the Department of Computer Science at the University of Illinois was supported by the Office of Naval Research. During this period of time, research work was carried out in the areas of Computational Complexity Theory, Scheduling Algorithms, Graph Algorithms, Dynamic Programming, and Fault- Tolerance Computing. We summarize here our accomplishments and our future plans, and we wish to request continued support for the period of October 1, 1980 - September 30, 1982 from ONR for research in these areas. Scheduling to meet deadlines -- The problem of scheduling jobs to meet their deadlines was studied. Given a set of jobs each of which is specified by three parameters, ready time, deadline, and computation time, we want to schedule them on a computer system so that, if possible, all deadlines will be met. Furthermore, if indeed all deadlines can be met, we want to know the possibility of completing the executing of each job so that there will be a 'slack time' between the time of completion and the deadline. In particular, the following model is used: There is a single processor in the computing system. Each job consists of an infinite stream of periodic and identical requests. A request is ready when it arrives and should be completed prior to the arrival of the next request of the same job. The execution of a job can be interrupted and be resumed later on.

“DTIC ADA1022259: Research In Complexity Theory And Combinatorial Algorithms” Metadata:

  • Title: ➤  DTIC ADA1022259: Research In Complexity Theory And Combinatorial Algorithms
  • Author: ➤  
  • Language: English

“DTIC ADA1022259: Research In Complexity Theory And Combinatorial Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 9.11 Mbs, the file-s for this book were downloaded 49 times, the file-s went public at Sun Feb 02 2020.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA1022259: Research In Complexity Theory And Combinatorial Algorithms at online marketplaces:


7On The Trade-off Between Complexity And Correlation Decay In Structural Learning Algorithms

By

We consider the problem of learning the structure of Ising models (pairwise binary Markov random fields) from i.i.d. samples. While several methods have been proposed to accomplish this task, their relative merits and limitations remain somewhat obscure. By analyzing a number of concrete examples, we show that low-complexity algorithms often fail when the Markov random field develops long-range correlations. More precisely, this phenomenon appears to be related to the Ising model phase transition (although it does not coincide with it).

“On The Trade-off Between Complexity And Correlation Decay In Structural Learning Algorithms” Metadata:

  • Title: ➤  On The Trade-off Between Complexity And Correlation Decay In Structural Learning Algorithms
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 21.71 Mbs, the file-s for this book were downloaded 98 times, the file-s went public at Mon Sep 23 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find On The Trade-off Between Complexity And Correlation Decay In Structural Learning Algorithms at online marketplaces:


8Algorithms, Their Complexity And Efficiency

By

We consider the problem of learning the structure of Ising models (pairwise binary Markov random fields) from i.i.d. samples. While several methods have been proposed to accomplish this task, their relative merits and limitations remain somewhat obscure. By analyzing a number of concrete examples, we show that low-complexity algorithms often fail when the Markov random field develops long-range correlations. More precisely, this phenomenon appears to be related to the Ising model phase transition (although it does not coincide with it).

“Algorithms, Their Complexity And Efficiency” Metadata:

  • Title: ➤  Algorithms, Their Complexity And Efficiency
  • Author:
  • Language: English

“Algorithms, Their Complexity And Efficiency” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 643.71 Mbs, the file-s for this book were downloaded 94 times, the file-s went public at Thu Oct 08 2020.

Available formats:
ACS Encrypted EPUB - ACS Encrypted PDF - Abbyy GZ - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Dublin Core - EPUB - Item Tile - JPEG Thumb - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - OCR Page Index - OCR Search Text - PNG - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - Title Page Detection Log - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Algorithms, Their Complexity And Efficiency at online marketplaces:


9State Space Search : Algorithms, Complexity, And Applications

By

We consider the problem of learning the structure of Ising models (pairwise binary Markov random fields) from i.i.d. samples. While several methods have been proposed to accomplish this task, their relative merits and limitations remain somewhat obscure. By analyzing a number of concrete examples, we show that low-complexity algorithms often fail when the Markov random field develops long-range correlations. More precisely, this phenomenon appears to be related to the Ising model phase transition (although it does not coincide with it).

“State Space Search : Algorithms, Complexity, And Applications” Metadata:

  • Title: ➤  State Space Search : Algorithms, Complexity, And Applications
  • Author:
  • Language: English

“State Space Search : Algorithms, Complexity, And Applications” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 574.89 Mbs, the file-s for this book were downloaded 14 times, the file-s went public at Tue Jul 25 2023.

Available formats:
ACS Encrypted PDF - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Dublin Core - Item Tile - JPEG Thumb - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - OCR Page Index - OCR Search Text - PNG - Page Numbers JSON - RePublisher Final Processing Log - RePublisher Initial Processing Log - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - Title Page Detection Log - chOCR - hOCR -

Related Links:

Online Marketplaces

Find State Space Search : Algorithms, Complexity, And Applications at online marketplaces:


10Computational Complexity Of Sequential And Parallel Algorithms

By

We consider the problem of learning the structure of Ising models (pairwise binary Markov random fields) from i.i.d. samples. While several methods have been proposed to accomplish this task, their relative merits and limitations remain somewhat obscure. By analyzing a number of concrete examples, we show that low-complexity algorithms often fail when the Markov random field develops long-range correlations. More precisely, this phenomenon appears to be related to the Ising model phase transition (although it does not coincide with it).

“Computational Complexity Of Sequential And Parallel Algorithms” Metadata:

  • Title: ➤  Computational Complexity Of Sequential And Parallel Algorithms
  • Author:
  • Language: English

“Computational Complexity Of Sequential And Parallel Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 624.54 Mbs, the file-s for this book were downloaded 77 times, the file-s went public at Fri Nov 16 2018.

Available formats:
ACS Encrypted EPUB - ACS Encrypted PDF - Abbyy GZ - Cloth Cover Detection Log - Contents - DjVuTXT - Djvu XML - Dublin Core - Item Tile - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Computational Complexity Of Sequential And Parallel Algorithms at online marketplaces:


11Complexity Results And Practical Algorithms For Logics In Knowledge Representation

By

Description Logics (DLs) are used in knowledge-based systems to represent and reason about terminological knowledge of the application domain in a semantically well-defined manner. In this thesis, we establish a number of novel complexity results and give practical algorithms for expressive DLs that provide different forms of counting quantifiers. We show that, in many cases, adding local counting in the form of qualifying number restrictions to DLs does not increase the complexity of the inference problems, even if binary coding of numbers in the input is assumed. On the other hand, we show that adding different forms of global counting restrictions to a logic may increase the complexity of the inference problems dramatically. We provide exact complexity results and a practical, tableau based algorithm for the DL SHIQ, which forms the basis of the highly optimized DL system iFaCT. Finally, we describe a tableau algorithm for the clique guarded fragment (CGF), which we hope will serve as the basis for an efficient implementation of a CGF reasoner.

“Complexity Results And Practical Algorithms For Logics In Knowledge Representation” Metadata:

  • Title: ➤  Complexity Results And Practical Algorithms For Logics In Knowledge Representation
  • Author:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 105.07 Mbs, the file-s for this book were downloaded 133 times, the file-s went public at Sun Sep 22 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Complexity Results And Practical Algorithms For Logics In Knowledge Representation at online marketplaces:


12Matchings With Lower Quotas: Algorithms And Complexity

By

We study a natural generalization of the maximum weight many-to-one matching problem. We are given an undirected bipartite graph $G= (A \cup P, E)$ with weights on the edges in $E$, and with lower and upper quotas on the vertices in $P$. We seek a maximum weight many-to-one matching satisfying two sets of constraints: vertices in $A$ are incident to at most one matching edge, while vertices in $P$ are either unmatched or they are incident to a number of matching edges between their lower and upper quota. This problem, which we call maximum weight many-to-one matching with lower and upper quotas (WMLQ), has applications to the assignment of students to projects within university courses, where there are constraints on the minimum and maximum numbers of students that must be assigned to each project. In this paper, we provide a comprehensive analysis of the complexity of WMLQ from the viewpoints of classic polynomial time algorithms, fixed-parameter tractability, as well as approximability. We draw the line between NP-hard and polynomially tractable instances in terms of degree and quota constraints and provide efficient algorithms to solve the tractable ones. We further show that the problem can be solved in polynomial time for instances with bounded treewidth; however, the corresponding runtime is exponential in the treewidth with the maximum upper quota $u_{max}$ as basis, and we prove that this dependence is necessary unless FPT = W[1]. The approximability of WMLQ is also discussed: we present an approximation algorithm for the general case with performance guarantee $u_{\max}+1$, which is asymptotically best possible unless P = NP. Finally, we elaborate on how most of our positive results carry over to matchings in arbitrary graphs with lower quotas.

“Matchings With Lower Quotas: Algorithms And Complexity” Metadata:

  • Title: ➤  Matchings With Lower Quotas: Algorithms And Complexity
  • Authors:

“Matchings With Lower Quotas: Algorithms And Complexity” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.31 Mbs, the file-s for this book were downloaded 21 times, the file-s went public at Sat Jun 30 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find Matchings With Lower Quotas: Algorithms And Complexity at online marketplaces:


13Microsoft Research Audio 104292: Dispersion Of Mass And The Complexity Of Randomized Algorithms

By

How much can randomness help computation? Motivated by this general question and by volume computation, one of the few instances where randomness probably helps, we analyze a notion of dispersion and connect it to asymptotic convex geometry. We obtain a nearly quadratic lower bound on the complexity of randomized volume algorithms for convex bodies in R n (the current best algorithm has complexity roughly n 4 and is conjectured to be n 3 ). Our main tools, dispersion of random determinants and dispersion of the length of a random point from a convex body, are of independent interest and applicable more generally; in particular, the latter is closely related to the variance hypothesis from convex geometry. This geometric dispersion also leads to lower bounds for matrix problems and property testing. This is joint work with Luis Rademacher. ©2006 Microsoft Corporation. All rights reserved.

“Microsoft Research Audio 104292: Dispersion Of Mass And The Complexity Of Randomized Algorithms” Metadata:

  • Title: ➤  Microsoft Research Audio 104292: Dispersion Of Mass And The Complexity Of Randomized Algorithms
  • Author:
  • Language: English

“Microsoft Research Audio 104292: Dispersion Of Mass And The Complexity Of Randomized Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "audio" format, the size of the file-s is: 47.56 Mbs, the file-s for this book were downloaded 5 times, the file-s went public at Sat Nov 23 2013.

Available formats:
Archive BitTorrent - Item Tile - Metadata - Ogg Vorbis - PNG - VBR MP3 -

Related Links:

Online Marketplaces

Find Microsoft Research Audio 104292: Dispersion Of Mass And The Complexity Of Randomized Algorithms at online marketplaces:


14Optimal Embedding Of Functions For In-Network Computation: Complexity Analysis And Algorithms

By

We consider optimal distributed computation of a given function of distributed data. The input (data) nodes and the sink node that receives the function form a connected network that is described by an undirected weighted network graph. The algorithm to compute the given function is described by a weighted directed acyclic graph and is called the computation graph. An embedding defines the computation communication sequence that obtains the function at the sink. Two kinds of optimal embeddings are sought, the embedding that---(1)~minimizes delay in obtaining function at sink, and (2)~minimizes cost of one instance of computation of function. This abstraction is motivated by three applications---in-network computation over sensor networks, operator placement in distributed databases, and module placement in distributed computing. We first show that obtaining minimum-delay and minimum-cost embeddings are both NP-complete problems and that cost minimization is actually MAX SNP-hard. Next, we consider specific forms of the computation graph for which polynomial time solutions are possible. When the computation graph is a tree, a polynomial time algorithm to obtain the minimum delay embedding is described. Next, for the case when the function is described by a layered graph we describe an algorithm that obtains the minimum cost embedding in polynomial time. This algorithm can also be used to obtain an approximation for delay minimization. We then consider bounded treewidth computation graphs and give an algorithm to obtain the minimum cost embedding in polynomial time.

“Optimal Embedding Of Functions For In-Network Computation: Complexity Analysis And Algorithms” Metadata:

  • Title: ➤  Optimal Embedding Of Functions For In-Network Computation: Complexity Analysis And Algorithms
  • Authors:

“Optimal Embedding Of Functions For In-Network Computation: Complexity Analysis And Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.54 Mbs, the file-s for this book were downloaded 25 times, the file-s went public at Sat Jun 30 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find Optimal Embedding Of Functions For In-Network Computation: Complexity Analysis And Algorithms at online marketplaces:


15Evangelism In Social Networks: Algorithms And Complexity

By

We consider a population of interconnected individuals that, with respect to a piece of information, at each time instant can be subdivided into three (time-dependent) categories: agnostics, influenced, and evangelists. A dynamical process of information diffusion evolves among the individuals of the population according to the following rules. Initially, all individuals are agnostic. Then, a set of people is chosen from the outside and convinced to start evangelizing, i.e., to start spreading the information. When a number of evangelists, greater than a given threshold, communicate with a node v, the node v becomes influenced, whereas, as soon as the individual v is contacted by a sufficiently much larger number of evangelists, it is itself converted into an evangelist and consequently it starts spreading the information. The question is: How to choose a bounded cardinality initial set of evangelists so as to maximize the final number of influenced individuals? We prove that the problem is hard to solve, even in an approximate sense. On the positive side, we present exact polynomial time algorithms for trees and complete graphs. For general graphs, we derive exact parameterized algorithms. We also investigate the problem when the objective is to select a minimum number of evangelists capable of influencing the whole network. Our motivations to study these problems come from the areas of Viral Marketing and the analysis of quantitative models of spreading of influence in social networks.

“Evangelism In Social Networks: Algorithms And Complexity” Metadata:

  • Title: ➤  Evangelism In Social Networks: Algorithms And Complexity
  • Authors:

“Evangelism In Social Networks: Algorithms And Complexity” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.26 Mbs, the file-s for this book were downloaded 24 times, the file-s went public at Fri Jun 29 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find Evangelism In Social Networks: Algorithms And Complexity at online marketplaces:


16DTIC ADA564645: The Average Network Flow Problem: Shortest Path And Minimum Cost Flow Formulations, Algorithms, Heuristics, And Complexity

By

Integrating value focused thinking with the shortest path problem results in a unique formulation called the multiobjective average shortest path problem. We prove this is NP-complete for general graphs. For directed acyclic graphs, an efficient algorithm and even faster heuristic are proposed. While the worst case error of the heuristic is proven unbounded, its average performance on random graphs is within 3% of the optimal solution. Additionally, a special case of the more general biobjective average shortest path problem is given, allowing tradeoffs between decreases in arc set cardinality and increases in multiobjective value; the algorithm to solve the average shortest path problem provides all the information needed to solve this more difficult biobjective problem. These concepts are then extended to the minimum cost flow problem creating a new formulation we name the multiobjective average minimum cost flow. This problem is proven NP-complete as well. For directed acyclic graphs, two efficient heuristics are developed, and although we prove the error of any successive average shortest path heuristic is in theory unbounded, they both perform very well on random graphs. Furthermore, we define a general biobjective average minimum cost flow problem. The information from the heuristics can be used to estimate the efficient frontier in a special case of this problem trading off total flow and multiobjective value. Finally, several variants of these two problems are discussed. Proofs are conjectured showing the conditions under which the problems are solvable in polynomial time and when they remain NP-complete.

“DTIC ADA564645: The Average Network Flow Problem: Shortest Path And Minimum Cost Flow Formulations, Algorithms, Heuristics, And Complexity” Metadata:

  • Title: ➤  DTIC ADA564645: The Average Network Flow Problem: Shortest Path And Minimum Cost Flow Formulations, Algorithms, Heuristics, And Complexity
  • Author: ➤  
  • Language: English

“DTIC ADA564645: The Average Network Flow Problem: Shortest Path And Minimum Cost Flow Formulations, Algorithms, Heuristics, And Complexity” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 93.17 Mbs, the file-s for this book were downloaded 59 times, the file-s went public at Mon Sep 03 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA564645: The Average Network Flow Problem: Shortest Path And Minimum Cost Flow Formulations, Algorithms, Heuristics, And Complexity at online marketplaces:


17DTIC ADA579191: Complexity Analysis And Algorithms For Optimal Resource Allocation In Wireless Networks

By

This project considers the dynamic spectrum management (DSM) problem whereby multiple users sharing a common frequency band must choose their transmit power spectra jointly in response to physical channel conditions including the effects of interference. The goal of the users is to maximize a system-wide utility function (e.g., weighted sum-rate of all users), subject to individual power constraints. The proposed work will focus on a general DSM problem formulation which allows correlated signaling rather than being restricted to the conventional independent orthogonal signaling such as OFDM. The general formulation will exploit the concept of 'interference alignment' which is known to provide substantial rate gain over OFDM signalling for general interference channels. We have successfully analyzed the complexity to characterize the optimal spectrum sharing policies and beamforming strategies in interfering broadcast networks and developed efficient computational methods for optimal resource allocations in such networks.

“DTIC ADA579191: Complexity Analysis And Algorithms For Optimal Resource Allocation In Wireless Networks” Metadata:

  • Title: ➤  DTIC ADA579191: Complexity Analysis And Algorithms For Optimal Resource Allocation In Wireless Networks
  • Author: ➤  
  • Language: English

“DTIC ADA579191: Complexity Analysis And Algorithms For Optimal Resource Allocation In Wireless Networks” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 7.67 Mbs, the file-s for this book were downloaded 50 times, the file-s went public at Mon Sep 10 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA579191: Complexity Analysis And Algorithms For Optimal Resource Allocation In Wireless Networks at online marketplaces:


18ICE: A General And Validated Energy Complexity Model For Multithreaded Algorithms

By

Like time complexity models that have significantly contributed to the analysis and development of fast algorithms, energy complexity models for parallel algorithms are desired as crucial means to develop energy efficient algorithms for ubiquitous multicore platforms. Ideal energy complexity models should be validated on real multicore platforms and applicable to a wide range of parallel algorithms. However, existing energy complexity models for parallel algorithms are either theoretical without model validation or algorithm-specific without ability to analyze energy complexity for a wide-range of parallel algorithms. This paper presents a new general validated energy complexity model for parallel (multithreaded) algorithms. The new model abstracts away possible multicore platforms by their static and dynamic energy of computational operations and data access, and derives the energy complexity of a given algorithm from its work, span and I/O complexity. The new model is validated by different sparse matrix vector multiplication (SpMV) algorithms and dense matrix multiplication (matmul) algorithms running on high performance computing (HPC) platforms (e.g., Intel Xeon and Xeon Phi). The new energy complexity model is able to characterize and compare the energy consumption of SpMV and matmul kernels according to three aspects: different algorithms, different input matrix types and different platforms. The prediction of the new model regarding which algorithm consumes more energy with different inputs on different platforms, is confirmed by the experimental results. In order to improve the usability and accuracy of the new model for a wide range of platforms, the platform parameters of ICE model are provided for eleven platforms including HPC, accelerator and embedded platforms.

“ICE: A General And Validated Energy Complexity Model For Multithreaded Algorithms” Metadata:

  • Title: ➤  ICE: A General And Validated Energy Complexity Model For Multithreaded Algorithms
  • Authors:

“ICE: A General And Validated Energy Complexity Model For Multithreaded Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.56 Mbs, the file-s for this book were downloaded 18 times, the file-s went public at Fri Jun 29 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find ICE: A General And Validated Energy Complexity Model For Multithreaded Algorithms at online marketplaces:


19User-Base Station Association In HetSNets: Complexity And Efficient Algorithms

By

This work considers the problem of user association to small-cell base stations (SBSs) in a heterogeneous and small-cell network (HetSNet). Two optimization problems are investigated, which are maximizing the set of associated users to the SBSs (the unweighted problem) and maximizing the set of weighted associated users to the SBSs (the weighted problem), under signal-to-interference-plus-noise ratio (SINR) constraints. Both problems are formulated as linear integer programs. The weighted problem is known to be NP-hard and, in this paper, the unweighted problem is proved to be NP-hard as well. Therefore, this paper develops two heuristic polynomial-time algorithms to solve both problems. The computational complexity of the proposed algorithms is evaluated and is shown to be far more efficient than the complexity of the optimal brute-force (BF) algorithm. Moreover, the paper benchmarks the performance of the proposed algorithms against the BF algorithm, the branch-and-bound (B\&B) algorithm and standard algorithms, through numerical simulations. The results demonstrate the close-to-optimal performance of the proposed algorithms. They also show that the weighted problem can be solved to provide solutions that are fair between users or to balance the load among SBSs.

“User-Base Station Association In HetSNets: Complexity And Efficient Algorithms” Metadata:

  • Title: ➤  User-Base Station Association In HetSNets: Complexity And Efficient Algorithms
  • Authors:

“User-Base Station Association In HetSNets: Complexity And Efficient Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.45 Mbs, the file-s for this book were downloaded 20 times, the file-s went public at Sat Jun 30 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find User-Base Station Association In HetSNets: Complexity And Efficient Algorithms at online marketplaces:


20Complexity Of And Algorithms For Borda Manipulation

By

We prove that it is NP-hard for a coalition of two manipulators to compute how to manipulate the Borda voting rule. This resolves one of the last open problems in the computational complexity of manipulating common voting rules. Because of this NP-hardness, we treat computing a manipulation as an approximation problem where we try to minimize the number of manipulators. Based on ideas from bin packing and multiprocessor scheduling, we propose two new approximation methods to compute manipulations of the Borda rule. Experiments show that these methods significantly outperform the previous best known %existing approximation method. We are able to find optimal manipulations in almost all the randomly generated elections tested. Our results suggest that, whilst computing a manipulation of the Borda rule by a coalition is NP-hard, computational complexity may provide only a weak barrier against manipulation in practice.

“Complexity Of And Algorithms For Borda Manipulation” Metadata:

  • Title: ➤  Complexity Of And Algorithms For Borda Manipulation
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 5.81 Mbs, the file-s for this book were downloaded 97 times, the file-s went public at Mon Sep 23 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - JPEG Thumb - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Complexity Of And Algorithms For Borda Manipulation at online marketplaces:


21Gröbner Bases Of Bihomogeneous Ideals Generated By Polynomials Of Bidegree (1,1): Algorithms And Complexity

By

Solving multihomogeneous systems, as a wide range of structured algebraic systems occurring frequently in practical problems, is of first importance. Experimentally, solving these systems with Gr\"obner bases algorithms seems to be easier than solving homogeneous systems of the same degree. Nevertheless, the reasons of this behaviour are not clear. In this paper, we focus on bilinear systems (i.e. bihomogeneous systems where all equations have bidegree (1,1)). Our goal is to provide a theoretical explanation of the aforementionned experimental behaviour and to propose new techniques to speed up the Gr\"obner basis computations by using the multihomogeneous structure of those systems. The contributions are theoretical and practical. First, we adapt the classical F5 criterion to avoid reductions to zero which occur when the input is a set of bilinear polynomials. We also prove an explicit form of the Hilbert series of bihomogeneous ideals generated by generic bilinear polynomials and give a new upper bound on the degree of regularity of generic affine bilinear systems. This leads to new complexity bounds for solving bilinear systems. We propose also a variant of the F5 Algorithm dedicated to multihomogeneous systems which exploits a structural property of the Macaulay matrix which occurs on such inputs. Experimental results show that this variant requires less time and memory than the classical homogeneous F5 Algorithm.

“Gröbner Bases Of Bihomogeneous Ideals Generated By Polynomials Of Bidegree (1,1): Algorithms And Complexity” Metadata:

  • Title: ➤  Gröbner Bases Of Bihomogeneous Ideals Generated By Polynomials Of Bidegree (1,1): Algorithms And Complexity
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 17.22 Mbs, the file-s for this book were downloaded 84 times, the file-s went public at Sun Sep 22 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Gröbner Bases Of Bihomogeneous Ideals Generated By Polynomials Of Bidegree (1,1): Algorithms And Complexity at online marketplaces:


22Convex Optimization: Algorithms And Complexity

By

This monograph presents the main complexity theorems in convex optimization and their corresponding algorithms. Starting from the fundamental theory of black-box optimization, the material progresses towards recent advances in structural optimization and stochastic optimization. Our presentation of black-box optimization, strongly influenced by Nesterov's seminal book and Nemirovski's lecture notes, includes the analysis of cutting plane methods, as well as (accelerated) gradient descent schemes. We also pay special attention to non-Euclidean settings (relevant algorithms include Frank-Wolfe, mirror descent, and dual averaging) and discuss their relevance in machine learning. We provide a gentle introduction to structural optimization with FISTA (to optimize a sum of a smooth and a simple non-smooth term), saddle-point mirror prox (Nemirovski's alternative to Nesterov's smoothing), and a concise description of interior point methods. In stochastic optimization we discuss stochastic gradient descent, mini-batches, random coordinate descent, and sublinear algorithms. We also briefly touch upon convex relaxation of combinatorial problems and the use of randomness to round solutions, as well as random walks based methods.

“Convex Optimization: Algorithms And Complexity” Metadata:

  • Title: ➤  Convex Optimization: Algorithms And Complexity
  • Author:

“Convex Optimization: Algorithms And Complexity” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 1.13 Mbs, the file-s for this book were downloaded 137 times, the file-s went public at Sat Jun 30 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find Convex Optimization: Algorithms And Complexity at online marketplaces:


23Algorithms And Complexity : Second Italian Conference, CIAC '94, Rome, Italy, February 23-25, 1994 : Proceedings

By

This monograph presents the main complexity theorems in convex optimization and their corresponding algorithms. Starting from the fundamental theory of black-box optimization, the material progresses towards recent advances in structural optimization and stochastic optimization. Our presentation of black-box optimization, strongly influenced by Nesterov's seminal book and Nemirovski's lecture notes, includes the analysis of cutting plane methods, as well as (accelerated) gradient descent schemes. We also pay special attention to non-Euclidean settings (relevant algorithms include Frank-Wolfe, mirror descent, and dual averaging) and discuss their relevance in machine learning. We provide a gentle introduction to structural optimization with FISTA (to optimize a sum of a smooth and a simple non-smooth term), saddle-point mirror prox (Nemirovski's alternative to Nesterov's smoothing), and a concise description of interior point methods. In stochastic optimization we discuss stochastic gradient descent, mini-batches, random coordinate descent, and sublinear algorithms. We also briefly touch upon convex relaxation of combinatorial problems and the use of randomness to round solutions, as well as random walks based methods.

“Algorithms And Complexity : Second Italian Conference, CIAC '94, Rome, Italy, February 23-25, 1994 : Proceedings” Metadata:

  • Title: ➤  Algorithms And Complexity : Second Italian Conference, CIAC '94, Rome, Italy, February 23-25, 1994 : Proceedings
  • Author: ➤  
  • Language: English

“Algorithms And Complexity : Second Italian Conference, CIAC '94, Rome, Italy, February 23-25, 1994 : Proceedings” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 436.59 Mbs, the file-s for this book were downloaded 11 times, the file-s went public at Tue May 02 2023.

Available formats:
ACS Encrypted PDF - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Dublin Core - EPUB - Extra Metadata JSON - Item Tile - JPEG Thumb - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - Metadata Log - OCR Page Index - OCR Search Text - PNG - Page Numbers JSON - RePublisher Final Processing Log - RePublisher Initial Processing Log - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - Title Page Detection Log - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Algorithms And Complexity : Second Italian Conference, CIAC '94, Rome, Italy, February 23-25, 1994 : Proceedings at online marketplaces:


24DTIC ADA1022251: Research In Complexity Theory And Combinatorial Algorithms

By

Since October 1, 1979, research in Complexity Theory and Combinatorial Algorithms at the Department of Computer Science at the University of Illinois was supported by the Office of Naval Research. During this period of time, research work was carried out in the areas of Computational Complexity Theory, Scheduling Algorithms, Graph Algorithms, Dynamic Programming, and Fault- Tolerance Computing. We summarize here our accomplishments and our future plans, and we wish to request continued support for the period of October 1, 1980 - September 30, 1982 from ONR for research in these areas. Scheduling to meet deadlines -- The problem of scheduling jobs to meet their deadlines was studied. Given a set of jobs each of which is specified by three parameters, ready time, deadline, and computation time, we want to schedule them on a computer system so that, if possible, all deadlines will be met. Furthermore, if indeed all deadlines can be met, we want to know the possibility of completing the executing of each job so that there will be a 'slack time' between the time of completion and the deadline. In particular, the following model is used: There is a single processor in the computing system. Each job consists of an infinite stream of periodic and identical requests. A request is ready when it arrives and should be completed prior to the arrival of the next request of the same job. The execution of a job can be interrupted and be resumed later on.

“DTIC ADA1022251: Research In Complexity Theory And Combinatorial Algorithms” Metadata:

  • Title: ➤  DTIC ADA1022251: Research In Complexity Theory And Combinatorial Algorithms
  • Author: ➤  
  • Language: English

“DTIC ADA1022251: Research In Complexity Theory And Combinatorial Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 9.11 Mbs, the file-s for this book were downloaded 51 times, the file-s went public at Sun Feb 02 2020.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA1022251: Research In Complexity Theory And Combinatorial Algorithms at online marketplaces:


25DTIC ADA1022250: Research In Complexity Theory And Combinatorial Algorithms

By

Since October 1, 1979, research in Complexity Theory and Combinatorial Algorithms at the Department of Computer Science at the University of Illinois was supported by the Office of Naval Research. During this period of time, research work was carried out in the areas of Computational Complexity Theory, Scheduling Algorithms, Graph Algorithms, Dynamic Programming, and Fault- Tolerance Computing. We summarize here our accomplishments and our future plans, and we wish to request continued support for the period of October 1, 1980 - September 30, 1982 from ONR for research in these areas. Scheduling to meet deadlines -- The problem of scheduling jobs to meet their deadlines was studied. Given a set of jobs each of which is specified by three parameters, ready time, deadline, and computation time, we want to schedule them on a computer system so that, if possible, all deadlines will be met. Furthermore, if indeed all deadlines can be met, we want to know the possibility of completing the executing of each job so that there will be a 'slack time' between the time of completion and the deadline. In particular, the following model is used: There is a single processor in the computing system. Each job consists of an infinite stream of periodic and identical requests. A request is ready when it arrives and should be completed prior to the arrival of the next request of the same job. The execution of a job can be interrupted and be resumed later on.

“DTIC ADA1022250: Research In Complexity Theory And Combinatorial Algorithms” Metadata:

  • Title: ➤  DTIC ADA1022250: Research In Complexity Theory And Combinatorial Algorithms
  • Author: ➤  
  • Language: English

“DTIC ADA1022250: Research In Complexity Theory And Combinatorial Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 9.11 Mbs, the file-s for this book were downloaded 52 times, the file-s went public at Sun Feb 02 2020.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA1022250: Research In Complexity Theory And Combinatorial Algorithms at online marketplaces:


26DTIC ADA1022252: Research In Complexity Theory And Combinatorial Algorithms

By

Since October 1, 1979, research in Complexity Theory and Combinatorial Algorithms at the Department of Computer Science at the University of Illinois was supported by the Office of Naval Research. During this period of time, research work was carried out in the areas of Computational Complexity Theory, Scheduling Algorithms, Graph Algorithms, Dynamic Programming, and Fault- Tolerance Computing. We summarize here our accomplishments and our future plans, and we wish to request continued support for the period of October 1, 1980 - September 30, 1982 from ONR for research in these areas. Scheduling to meet deadlines -- The problem of scheduling jobs to meet their deadlines was studied. Given a set of jobs each of which is specified by three parameters, ready time, deadline, and computation time, we want to schedule them on a computer system so that, if possible, all deadlines will be met. Furthermore, if indeed all deadlines can be met, we want to know the possibility of completing the executing of each job so that there will be a 'slack time' between the time of completion and the deadline. In particular, the following model is used: There is a single processor in the computing system. Each job consists of an infinite stream of periodic and identical requests. A request is ready when it arrives and should be completed prior to the arrival of the next request of the same job. The execution of a job can be interrupted and be resumed later on.

“DTIC ADA1022252: Research In Complexity Theory And Combinatorial Algorithms” Metadata:

  • Title: ➤  DTIC ADA1022252: Research In Complexity Theory And Combinatorial Algorithms
  • Author: ➤  
  • Language: English

“DTIC ADA1022252: Research In Complexity Theory And Combinatorial Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 9.11 Mbs, the file-s for this book were downloaded 43 times, the file-s went public at Sun Feb 02 2020.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA1022252: Research In Complexity Theory And Combinatorial Algorithms at online marketplaces:


27DTIC ADA282724: Minimal Fixturing Of Frictionless Assemblies: Complexity And Algorithms

By

In many assembly tasks, it is necessary to insure the stability of a subcollection of contacting object. To achieve stability, it is often necessary to introduce fixture elements (also called fingers in some work) to help hold objects in place. In this paper, the complexity of stabilizing multiple contacting bodies with the fewest number of fixture elements possible is considered. Standard fixture elements of the type explored in previous single- object grasping work are considered, along with two generalized fixture element variants. The types of stability considered are: form-closure (complete immobility of the assembly); stability with respect to a specific external force and torque on each body; and stability in the neighborhood of a specific external force and torque on each body. The major result is that for most of the combinations of fixture element varieties, and types of stability considered, achieving an optimal solution (that is, finding a smallest set of fixture elements yielding stability) is NP-hard. However, for many fixturing problems it seems likely that suboptimal, yet acceptably small solutions can be found in polynomial time, and some candidate algorithms are presented

“DTIC ADA282724: Minimal Fixturing Of Frictionless Assemblies: Complexity And Algorithms” Metadata:

  • Title: ➤  DTIC ADA282724: Minimal Fixturing Of Frictionless Assemblies: Complexity And Algorithms
  • Author: ➤  
  • Language: English

“DTIC ADA282724: Minimal Fixturing Of Frictionless Assemblies: Complexity And Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 32.55 Mbs, the file-s for this book were downloaded 54 times, the file-s went public at Mon Mar 19 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA282724: Minimal Fixturing Of Frictionless Assemblies: Complexity And Algorithms at online marketplaces:


28DTIC ADA214247: A Renormalization Group Approach To Image Processing. A New Computational Method For 3-Dimensional Shapes In Robot Vision, And The Computational Complexity Of The Cooling Algorithms

By

During the period of the contract, 6/15/86-7/31/89, we have develop: I). A parallel multilevel-multiresolution algorithm for Image Processing and low-level Robot vision tasks, II). A Bayesian/Geometric Framework for 3-D shape estimation from 2-D images, appropriate for object recognition and other Robot tasks III). A procedure for rotation and scale invariant representation (coding) and recognition of textures; a computationally efficient algorithm for estimating Markov Random Fields, IV). We have obtained mathematical results concerning convergence and speed of convergence of computational algorithms such as the annealing algorithm, and have studied mathematically the consistency and asymptotic normality of Maximum Likelihood Estimators for Gibbs distributions. Keywords: Computer vision. (KR)

“DTIC ADA214247: A Renormalization Group Approach To Image Processing. A New Computational Method For 3-Dimensional Shapes In Robot Vision, And The Computational Complexity Of The Cooling Algorithms” Metadata:

  • Title: ➤  DTIC ADA214247: A Renormalization Group Approach To Image Processing. A New Computational Method For 3-Dimensional Shapes In Robot Vision, And The Computational Complexity Of The Cooling Algorithms
  • Author: ➤  
  • Language: English

“DTIC ADA214247: A Renormalization Group Approach To Image Processing. A New Computational Method For 3-Dimensional Shapes In Robot Vision, And The Computational Complexity Of The Cooling Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 5.20 Mbs, the file-s for this book were downloaded 49 times, the file-s went public at Fri Feb 23 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA214247: A Renormalization Group Approach To Image Processing. A New Computational Method For 3-Dimensional Shapes In Robot Vision, And The Computational Complexity Of The Cooling Algorithms at online marketplaces:


29DTIC ADA1022256: Research In Complexity Theory And Combinatorial Algorithms

By

Since October 1, 1979, research in Complexity Theory and Combinatorial Algorithms at the Department of Computer Science at the University of Illinois was supported by the Office of Naval Research. During this period of time, research work was carried out in the areas of Computational Complexity Theory, Scheduling Algorithms, Graph Algorithms, Dynamic Programming, and Fault- Tolerance Computing. We summarize here our accomplishments and our future plans, and we wish to request continued support for the period of October 1, 1980 - September 30, 1982 from ONR for research in these areas. Scheduling to meet deadlines -- The problem of scheduling jobs to meet their deadlines was studied. Given a set of jobs each of which is specified by three parameters, ready time, deadline, and computation time, we want to schedule them on a computer system so that, if possible, all deadlines will be met. Furthermore, if indeed all deadlines can be met, we want to know the possibility of completing the executing of each job so that there will be a 'slack time' between the time of completion and the deadline. In particular, the following model is used: There is a single processor in the computing system. Each job consists of an infinite stream of periodic and identical requests. A request is ready when it arrives and should be completed prior to the arrival of the next request of the same job. The execution of a job can be interrupted and be resumed later on.

“DTIC ADA1022256: Research In Complexity Theory And Combinatorial Algorithms” Metadata:

  • Title: ➤  DTIC ADA1022256: Research In Complexity Theory And Combinatorial Algorithms
  • Author: ➤  
  • Language: English

“DTIC ADA1022256: Research In Complexity Theory And Combinatorial Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 9.11 Mbs, the file-s for this book were downloaded 49 times, the file-s went public at Sun Feb 02 2020.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA1022256: Research In Complexity Theory And Combinatorial Algorithms at online marketplaces:


30DTIC ADA534847: Coordinated Beamforming For MISO Interference Channel: Complexity Analysis And Efficient Algorithms

By

In a cellular wireless system, users located at cell edges often suffer significant out-of-cell interference. Assuming each base station is equipped with multiple antennas, we can model this scenario as a multiple-input single-output (MISO) interference channel. In this paper we consider a coordinated beamforming approach whereby multiple base stations jointly optimize their downlink beamforming vectors in order to simultaneously improve the data rates of a given group of cell edge users. Assuming perfect channel knowledge, we formulate this problem as the maximization of a system utility (which balances user fairness and average user rates), subject to individual power constraints at each base station. We show that, for the single carrier case and when the number of antennas at each base station is at least two, the optimal coordinated beamforming problem is NP-hard for both the harmonic mean utility and the proportional fairness utility. For general utilities, we propose a cyclic coordinate descent algorithm, which enables each transmitter to update its beamformer locally with limited information exchange, and establish its global convergence to a stationary point. We illustrate its effectiveness in computer simulations by using the space matched beamformer as a benchmark.

“DTIC ADA534847: Coordinated Beamforming For MISO Interference Channel: Complexity Analysis And Efficient Algorithms” Metadata:

  • Title: ➤  DTIC ADA534847: Coordinated Beamforming For MISO Interference Channel: Complexity Analysis And Efficient Algorithms
  • Author: ➤  
  • Language: English

“DTIC ADA534847: Coordinated Beamforming For MISO Interference Channel: Complexity Analysis And Efficient Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 18.32 Mbs, the file-s for this book were downloaded 71 times, the file-s went public at Sun Aug 05 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA534847: Coordinated Beamforming For MISO Interference Channel: Complexity Analysis And Efficient Algorithms at online marketplaces:


31DTIC ADA606538: Center For Quantum Algorithms And Complexity

By

How efficiently can the ground state of a local Hamiltonian be computed? This is a question that lies at the heart of an emerging area called quantum Hamiltonian complexity, that addresses fundamental issues in both quantum complexity theory and condensed matter physics. Of particular importance are 1D Hamiltonians. We give a new combinatorial approach to proving the area law for 1D systems via the detectability lemma, in the process exponentially improving on Hastings' bounds in the frustration free case. We also give an efficient algorithm for finding an MPS approximation to the ground state, in the case of constant bond dimension. Entanglement is a fundamental feature of quantum systems, and understanding its nature is a basic challenge in quantum computation. We study it in a number of basic contexts, including the complexity of parallel repetition of entangled games, and Bell-inequalities distinguishing non-locality versus entanglement. We show how to use entanglement to give a way of generating certifiably random numbers which are provably secure even against a quantum adversary. The method is based on an earlier paper in which we report an implementation of optimal extractors against quantum storage.

“DTIC ADA606538: Center For Quantum Algorithms And Complexity” Metadata:

  • Title: ➤  DTIC ADA606538: Center For Quantum Algorithms And Complexity
  • Author: ➤  
  • Language: English

“DTIC ADA606538: Center For Quantum Algorithms And Complexity” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 7.46 Mbs, the file-s for this book were downloaded 62 times, the file-s went public at Sat Sep 22 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA606538: Center For Quantum Algorithms And Complexity at online marketplaces:


32New Complexity Results And Algorithms For The Minimum Tollbooth Problem

By

The inefficiency of the Wardrop equilibrium of nonatomic routing games can be eliminated by placing tolls on the edges of a network so that the socially optimal flow is induced as an equilibrium flow. A solution where the minimum number of edges are tolled may be preferable over others due to its ease of implementation in real networks. In this paper we consider the minimum tollbooth (MINTB) problem, which seeks social optimum inducing tolls with minimum support. We prove for single commodity networks with linear latencies that the problem is NP-hard to approximate within a factor of $1.1377$ through a reduction from the minimum vertex cover problem. Insights from network design motivate us to formulate a new variation of the problem where, in addition to placing tolls, it is allowed to remove unused edges by the social optimum. We prove that this new problem remains NP-hard even for single commodity networks with linear latencies, using a reduction from the partition problem. On the positive side, we give the first exact polynomial solution to the MINTB problem in an important class of graphs---series-parallel graphs. Our algorithm solves MINTB by first tabulating the candidate solutions for subgraphs of the series-parallel network and then combining them optimally.

“New Complexity Results And Algorithms For The Minimum Tollbooth Problem” Metadata:

  • Title: ➤  New Complexity Results And Algorithms For The Minimum Tollbooth Problem
  • Authors:
  • Language: English

“New Complexity Results And Algorithms For The Minimum Tollbooth Problem” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 12.21 Mbs, the file-s for this book were downloaded 34 times, the file-s went public at Thu Jun 28 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - JPEG Thumb - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find New Complexity Results And Algorithms For The Minimum Tollbooth Problem at online marketplaces:


33Internal Diffusion-Limited Aggregation: Parallel Algorithms And Complexity

By

The computational complexity of internal diffusion-limited aggregation (DLA) is examined from both a theoretical and a practical point of view. We show that for two or more dimensions, the problem of predicting the cluster from a given set of paths is complete for the complexity class CC, the subset of P characterized by circuits composed of comparator gates. CC-completeness is believed to imply that, in the worst case, growing a cluster of size n requires polynomial time in n even on a parallel computer. A parallel relaxation algorithm is presented that uses the fact that clusters are nearly spherical to guess the cluster from a given set of paths, and then corrects defects in the guessed cluster through a non-local annihilation process. The parallel running time of the relaxation algorithm for two-dimensional internal DLA is studied by simulating it on a serial computer. The numerical results are compatible with a running time that is either polylogarithmic in n or a small power of n. Thus the computational resources needed to grow large clusters are significantly less on average than the worst-case analysis would suggest. For a parallel machine with k processors, we show that random clusters in d dimensions can be generated in O((n/k + log k) n^{2/d}) steps. This is a significant speedup over explicit sequential simulation, which takes O(n^{1+2/d}) time on average. Finally, we show that in one dimension internal DLA can be predicted in O(log n) parallel time, and so is in the complexity class NC.

“Internal Diffusion-Limited Aggregation: Parallel Algorithms And Complexity” Metadata:

  • Title: ➤  Internal Diffusion-Limited Aggregation: Parallel Algorithms And Complexity
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 13.43 Mbs, the file-s for this book were downloaded 93 times, the file-s went public at Mon Sep 23 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Internal Diffusion-Limited Aggregation: Parallel Algorithms And Complexity at online marketplaces:


34Analysis Of The Computational Complexity Of Solving Random Satisfiability Problems Using Branch And Bound Search Algorithms

By

The computational complexity of solving random 3-Satisfiability (3-SAT) problems is investigated. 3-SAT is a representative example of hard computational tasks; it consists in knowing whether a set of alpha N randomly drawn logical constraints involving N Boolean variables can be satisfied altogether or not. Widely used solving procedures, as the Davis-Putnam-Loveland-Logeman (DPLL) algorithm, perform a systematic search for a solution, through a sequence of trials and errors represented by a search tree. In the present study, we identify, using theory and numerical experiments, easy (size of the search tree scaling polynomially with N) and hard (exponential scaling) regimes as a function of the ratio alpha of constraints per variable. The typical complexity is explicitly calculated in the different regimes, in very good agreement with numerical simulations. Our theoretical approach is based on the analysis of the growth of the branches in the search tree under the operation of DPLL. On each branch, the initial 3-SAT problem is dynamically turned into a more generic 2+p-SAT problem, where p and 1-p are the fractions of constraints involving three and two variables respectively. The growth of each branch is monitored by the dynamical evolution of alpha and p and is represented by a trajectory in the static phase diagram of the random 2+p-SAT problem. Depending on whether or not the trajectories cross the boundary between phases, single branches or full trees are generated by DPLL, resulting in easy or hard resolutions.

“Analysis Of The Computational Complexity Of Solving Random Satisfiability Problems Using Branch And Bound Search Algorithms” Metadata:

  • Title: ➤  Analysis Of The Computational Complexity Of Solving Random Satisfiability Problems Using Branch And Bound Search Algorithms
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 22.36 Mbs, the file-s for this book were downloaded 82 times, the file-s went public at Wed Sep 18 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Analysis Of The Computational Complexity Of Solving Random Satisfiability Problems Using Branch And Bound Search Algorithms at online marketplaces:


35Algorithms And Complexity Presentation

By

Presentation slides 

“Algorithms And Complexity Presentation” Metadata:

  • Title: ➤  Algorithms And Complexity Presentation
  • Author: ➤  
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 1.31 Mbs, the file-s for this book were downloaded 87 times, the file-s went public at Wed Feb 02 2022.

Available formats:
Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Algorithms And Complexity Presentation at online marketplaces:


36Sparsity-aware Sphere Decoding: Algorithms And Complexity Analysis

By

Integer least-squares problems, concerned with solving a system of equations where the components of the unknown vector are integer-valued, arise in a wide range of applications. In many scenarios the unknown vector is sparse, i.e., a large fraction of its entries are zero. Examples include applications in wireless communications, digital fingerprinting, and array-comparative genomic hybridization systems. Sphere decoding, commonly used for solving integer least-squares problems, can utilize the knowledge about sparsity of the unknown vector to perform computationally efficient search for the solution. In this paper, we formulate and analyze the sparsity-aware sphere decoding algorithm that imposes $\ell_0$-norm constraint on the admissible solution. Analytical expressions for the expected complexity of the algorithm for alphabets typical of sparse channel estimation and source allocation applications are derived and validated through extensive simulations. The results demonstrate superior performance and speed of sparsity-aware sphere decoder compared to the conventional sparsity-unaware sphere decoding algorithm. Moreover, variance of the complexity of the sparsity-aware sphere decoding algorithm for binary alphabets is derived. The search space of the proposed algorithm can be further reduced by imposing lower bounds on the value of the objective function. The algorithm is modified to allow for such a lower bounding technique and simulations illustrating efficacy of the method are presented. Performance of the algorithm is demonstrated in an application to sparse channel estimation, where it is shown that sparsity-aware sphere decoder performs close to theoretical lower limits.

“Sparsity-aware Sphere Decoding: Algorithms And Complexity Analysis” Metadata:

  • Title: ➤  Sparsity-aware Sphere Decoding: Algorithms And Complexity Analysis
  • Authors:

“Sparsity-aware Sphere Decoding: Algorithms And Complexity Analysis” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 1.08 Mbs, the file-s for this book were downloaded 18 times, the file-s went public at Sat Jun 30 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find Sparsity-aware Sphere Decoding: Algorithms And Complexity Analysis at online marketplaces:


37Algorithms And Complexity For Turaev-Viro Invariants

By

The Turaev-Viro invariants are a powerful family of topological invariants for distinguishing between different 3-manifolds. They are invaluable for mathematical software, but current algorithms to compute them require exponential time. The invariants are parameterised by an integer $r \geq 3$. We resolve the question of complexity for $r=3$ and $r=4$, giving simple proofs that computing Turaev-Viro invariants for $r=3$ is polynomial time, but for $r=4$ is \#P-hard. Moreover, we give an explicit fixed-parameter tractable algorithm for arbitrary $r$, and show through concrete implementation and experimentation that this algorithm is practical---and indeed preferable---to the prior state of the art for real computation.

“Algorithms And Complexity For Turaev-Viro Invariants” Metadata:

  • Title: ➤  Algorithms And Complexity For Turaev-Viro Invariants
  • Authors:
  • Language: English

“Algorithms And Complexity For Turaev-Viro Invariants” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 8.95 Mbs, the file-s for this book were downloaded 36 times, the file-s went public at Wed Jun 27 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - JPEG Thumb - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Algorithms And Complexity For Turaev-Viro Invariants at online marketplaces:


38Complexity And Algorithms For Computing Voronoi Cells Of Lattices

By

In this paper we are concerned with finding the vertices of the Voronoi cell of a Euclidean lattice. Given a basis of a lattice, we prove that computing the number of vertices is a #P-hard problem. On the other hand we describe an algorithm for this problem which is especially suited for low dimensional (say dimensions at most 12) and for highly-symmetric lattices. We use our implementation, which drastically outperforms those of current computer algebra systems, to find the vertices of Voronoi cells and quantizer constants of some prominent lattices.

“Complexity And Algorithms For Computing Voronoi Cells Of Lattices” Metadata:

  • Title: ➤  Complexity And Algorithms For Computing Voronoi Cells Of Lattices
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 9.46 Mbs, the file-s for this book were downloaded 71 times, the file-s went public at Sat Jul 20 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Complexity And Algorithms For Computing Voronoi Cells Of Lattices at online marketplaces:


39Algorithms And Complexity Results For Persuasive Argumentation

By

The study of arguments as abstract entities and their interaction as introduced by Dung (Artificial Intelligence 177, 1995) has become one of the most active research branches within Artificial Intelligence and Reasoning. A main issue for abstract argumentation systems is the selection of acceptable sets of arguments. Value-based argumentation, as introduced by Bench-Capon (J. Logic Comput. 13, 2003), extends Dung's framework. It takes into account the relative strength of arguments with respect to some ranking representing an audience: an argument is subjectively accepted if it is accepted with respect to some audience, it is objectively accepted if it is accepted with respect to all audiences. Deciding whether an argument is subjectively or objectively accepted, respectively, are computationally intractable problems. In fact, the problems remain intractable under structural restrictions that render the main computational problems for non-value-based argumentation systems tractable. In this paper we identify nontrivial classes of value-based argumentation systems for which the acceptance problems are polynomial-time tractable. The classes are defined by means of structural restrictions in terms of the underlying graphical structure of the value-based system. Furthermore we show that the acceptance problems are intractable for two classes of value-based systems that where conjectured to be tractable by Dunne (Artificial Intelligence 171, 2007).

“Algorithms And Complexity Results For Persuasive Argumentation” Metadata:

  • Title: ➤  Algorithms And Complexity Results For Persuasive Argumentation
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 13.25 Mbs, the file-s for this book were downloaded 84 times, the file-s went public at Sat Sep 21 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Algorithms And Complexity Results For Persuasive Argumentation at online marketplaces:


40Dispersion Of Mass And The Complexity Of Randomized Geometric Algorithms

By

How much can randomness help computation? Motivated by this general question and by volume computation, one of the few instances where randomness provably helps, we analyze a notion of dispersion and connect it to asymptotic convex geometry. We obtain a nearly quadratic lower bound on the complexity of randomized volume algorithms for convex bodies in R^n (the current best algorithm has complexity roughly n^4, conjectured to be n^3). Our main tools, dispersion of random determinants and dispersion of the length of a random point from a convex body, are of independent interest and applicable more generally; in particular, the latter is closely related to the variance hypothesis from convex geometry. This geometric dispersion also leads to lower bounds for matrix problems and property testing.

“Dispersion Of Mass And The Complexity Of Randomized Geometric Algorithms” Metadata:

  • Title: ➤  Dispersion Of Mass And The Complexity Of Randomized Geometric Algorithms
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 13.93 Mbs, the file-s for this book were downloaded 77 times, the file-s went public at Fri Sep 20 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Dispersion Of Mass And The Complexity Of Randomized Geometric Algorithms at online marketplaces:


41Counting, Sampling And Integrating : Algorithms And Complexity

By

How much can randomness help computation? Motivated by this general question and by volume computation, one of the few instances where randomness provably helps, we analyze a notion of dispersion and connect it to asymptotic convex geometry. We obtain a nearly quadratic lower bound on the complexity of randomized volume algorithms for convex bodies in R^n (the current best algorithm has complexity roughly n^4, conjectured to be n^3). Our main tools, dispersion of random determinants and dispersion of the length of a random point from a convex body, are of independent interest and applicable more generally; in particular, the latter is closely related to the variance hypothesis from convex geometry. This geometric dispersion also leads to lower bounds for matrix problems and property testing.

“Counting, Sampling And Integrating : Algorithms And Complexity” Metadata:

  • Title: ➤  Counting, Sampling And Integrating : Algorithms And Complexity
  • Author:
  • Language: English

“Counting, Sampling And Integrating : Algorithms And Complexity” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 318.20 Mbs, the file-s for this book were downloaded 18 times, the file-s went public at Tue Mar 14 2023.

Available formats:
ACS Encrypted PDF - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Dublin Core - Extra Metadata JSON - Item Tile - JPEG Thumb - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - Metadata Log - OCR Page Index - OCR Search Text - PNG - Page Numbers JSON - RePublisher Final Processing Log - RePublisher Initial Processing Log - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - Title Page Detection Log - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Counting, Sampling And Integrating : Algorithms And Complexity at online marketplaces:


42Asynchronous Parallel Algorithms For Nonconvex Big-Data Optimization. Part II: Complexity And Numerical Results

By

We present complexity and numerical results for a new asynchronous parallel algorithmic method for the minimization of the sum of a smooth nonconvex function and a convex nonsmooth regularizer, subject to both convex and nonconvex constraints. The proposed method hinges on successive convex approximation techniques and a novel probabilistic model that captures key elements of modern computational architectures and asynchronous implementations in a more faithful way than state-of-the-art models. In the companion paper we provided a detailed description on the probabilistic model and gave convergence results for a diminishing stepsize version of our method. Here, we provide theoretical complexity results for a fixed stepsize version of the method and report extensive numerical comparisons on both convex and nonconvex problems demonstrating the efficiency of our approach.

“Asynchronous Parallel Algorithms For Nonconvex Big-Data Optimization. Part II: Complexity And Numerical Results” Metadata:

  • Title: ➤  Asynchronous Parallel Algorithms For Nonconvex Big-Data Optimization. Part II: Complexity And Numerical Results
  • Authors:

“Asynchronous Parallel Algorithms For Nonconvex Big-Data Optimization. Part II: Complexity And Numerical Results” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.63 Mbs, the file-s for this book were downloaded 27 times, the file-s went public at Sat Jun 30 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find Asynchronous Parallel Algorithms For Nonconvex Big-Data Optimization. Part II: Complexity And Numerical Results at online marketplaces:


43Complexity Of Sequential And Parallel Numerical Algorithms [proceedings]

By

We present complexity and numerical results for a new asynchronous parallel algorithmic method for the minimization of the sum of a smooth nonconvex function and a convex nonsmooth regularizer, subject to both convex and nonconvex constraints. The proposed method hinges on successive convex approximation techniques and a novel probabilistic model that captures key elements of modern computational architectures and asynchronous implementations in a more faithful way than state-of-the-art models. In the companion paper we provided a detailed description on the probabilistic model and gave convergence results for a diminishing stepsize version of our method. Here, we provide theoretical complexity results for a fixed stepsize version of the method and report extensive numerical comparisons on both convex and nonconvex problems demonstrating the efficiency of our approach.

“Complexity Of Sequential And Parallel Numerical Algorithms [proceedings]” Metadata:

  • Title: ➤  Complexity Of Sequential And Parallel Numerical Algorithms [proceedings]
  • Author: ➤  
  • Language: English

“Complexity Of Sequential And Parallel Numerical Algorithms [proceedings]” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 489.36 Mbs, the file-s for this book were downloaded 8 times, the file-s went public at Tue Oct 10 2023.

Available formats:
ACS Encrypted PDF - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Dublin Core - EPUB - Item Tile - JPEG Thumb - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - OCR Page Index - OCR Search Text - PNG - Page Numbers JSON - RePublisher Final Processing Log - RePublisher Initial Processing Log - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - Title Page Detection Log - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Complexity Of Sequential And Parallel Numerical Algorithms [proceedings] at online marketplaces:


44On Practical Algorithms For Entropy Estimation And The Improved Sample Complexity Of Compressed Counting

By

Estimating the p-th frequency moment of data stream is a very heavily studied problem. The problem is actually trivial when p = 1, assuming the strict Turnstile model. The sample complexity of our proposed algorithm is essentially O(1) near p=1. This is a very large improvement over the previously believed O(1/eps^2) bound. The proposed algorithm makes the long-standing problem of entropy estimation an easy task, as verified by the experiments included in the appendix.

“On Practical Algorithms For Entropy Estimation And The Improved Sample Complexity Of Compressed Counting” Metadata:

  • Title: ➤  On Practical Algorithms For Entropy Estimation And The Improved Sample Complexity Of Compressed Counting
  • Author:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 10.87 Mbs, the file-s for this book were downloaded 63 times, the file-s went public at Sun Sep 22 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find On Practical Algorithms For Entropy Estimation And The Improved Sample Complexity Of Compressed Counting at online marketplaces:


45Complexity And Algorithms For Euler Characteristic Of Simplicial Complexes

By

We consider the problem of computing the Euler characteristic of an abstract simplicial complex given by its vertices and facets. We show that this problem is #P-complete and present two new practical algorithms for computing Euler characteristic. The two new algorithms are derived using combinatorial commutative algebra and we also give a second description of them that requires no algebra. We present experiments showing that the two new algorithms can be implemented to be faster than previous Euler characteristic implementations by a large margin.

“Complexity And Algorithms For Euler Characteristic Of Simplicial Complexes” Metadata:

  • Title: ➤  Complexity And Algorithms For Euler Characteristic Of Simplicial Complexes
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 16.08 Mbs, the file-s for this book were downloaded 87 times, the file-s went public at Tue Sep 24 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Complexity And Algorithms For Euler Characteristic Of Simplicial Complexes at online marketplaces:


46Convergence Radius And Sample Complexity Of ITKM Algorithms For Dictionary Learning

By

In this work we show that iterative thresholding and K-means (ITKM) algorithms can recover a generating dictionary with K atoms from noisy $S$ sparse signals up to an error $\tilde \varepsilon$ as long as the initialisation is within a convergence radius, that is up to a $\log K$ factor inversely proportional to the dynamic range of the signals, and the sample size is proportional to $K \log K \tilde \varepsilon^{-2}$. The results are valid for arbitrary target errors if the sparsity level is of the order of the square root of the signal dimension $d$ and for target errors down to $K^{-\ell}$ if $S$ scales as $S \leq d/(\ell \log K)$.

“Convergence Radius And Sample Complexity Of ITKM Algorithms For Dictionary Learning” Metadata:

  • Title: ➤  Convergence Radius And Sample Complexity Of ITKM Algorithms For Dictionary Learning
  • Author:
  • Language: English

“Convergence Radius And Sample Complexity Of ITKM Algorithms For Dictionary Learning” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 21.30 Mbs, the file-s for this book were downloaded 36 times, the file-s went public at Wed Jun 27 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - JPEG Thumb - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Convergence Radius And Sample Complexity Of ITKM Algorithms For Dictionary Learning at online marketplaces:


47Joint User Grouping And Linear Virtual Beamforming: Complexity, Algorithms And Approximation Bounds

By

In a wireless system with a large number of distributed nodes, the quality of communication can be greatly improved by pooling the nodes to perform joint transmission/reception. In this paper, we consider the problem of optimally selecting a subset of nodes from potentially a large number of candidates to form a virtual multi-antenna system, while at the same time designing their joint linear transmission strategies. We focus on two specific application scenarios: 1) multiple single antenna transmitters cooperatively transmit to a receiver; 2) a single transmitter transmits to a receiver with the help of a number of cooperative relays. We formulate the joint node selection and beamforming problems as cardinality constrained optimization problems with both discrete variables (used for selecting cooperative nodes) and continuous variables (used for designing beamformers). For each application scenario, we first characterize the computational complexity of the joint optimization problem, and then propose novel semi-definite relaxation (SDR) techniques to obtain approximate solutions. We show that the new SDR algorithms have a guaranteed approximation performance in terms of the gap to global optimality, regardless of channel realizations. The effectiveness of the proposed algorithms is demonstrated via numerical experiments.

“Joint User Grouping And Linear Virtual Beamforming: Complexity, Algorithms And Approximation Bounds” Metadata:

  • Title: ➤  Joint User Grouping And Linear Virtual Beamforming: Complexity, Algorithms And Approximation Bounds
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 15.48 Mbs, the file-s for this book were downloaded 68 times, the file-s went public at Wed Sep 18 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Joint User Grouping And Linear Virtual Beamforming: Complexity, Algorithms And Approximation Bounds at online marketplaces:


48Algebraic Diagonals And Walks: Algorithms, Bounds, Complexity

By

The diagonal of a multivariate power series F is the univariate power series Diag(F) generated by the diagonal terms of F. Diagonals form an important class of power series; they occur frequently in number theory, theoretical physics and enumerative combinatorics. We study algorithmic questions related to diagonals in the case where F is the Taylor expansion of a bivariate rational function. It is classical that in this case Diag(F) is an algebraic function. We propose an algorithm that computes an annihilating polynomial for Diag(F). We give a precise bound on the size of this polynomial and show that generically, this polynomial is the minimal polynomial and that its size reaches the bound. The algorithm runs in time quasi-linear in this bound, which grows exponentially with the degree of the input rational function. We then address the related problem of enumerating directed lattice walks. The insight given by our study leads to a new method for expanding the generating power series of bridges, excursions and meanders. We show that their first N terms can be computed in quasi-linear complexity in N, without first computing a very large polynomial equation.

“Algebraic Diagonals And Walks: Algorithms, Bounds, Complexity” Metadata:

  • Title: ➤  Algebraic Diagonals And Walks: Algorithms, Bounds, Complexity
  • Authors:

“Algebraic Diagonals And Walks: Algorithms, Bounds, Complexity” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.75 Mbs, the file-s for this book were downloaded 27 times, the file-s went public at Thu Jun 28 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find Algebraic Diagonals And Walks: Algorithms, Bounds, Complexity at online marketplaces:


49Algorithms And Complexity

By

The diagonal of a multivariate power series F is the univariate power series Diag(F) generated by the diagonal terms of F. Diagonals form an important class of power series; they occur frequently in number theory, theoretical physics and enumerative combinatorics. We study algorithmic questions related to diagonals in the case where F is the Taylor expansion of a bivariate rational function. It is classical that in this case Diag(F) is an algebraic function. We propose an algorithm that computes an annihilating polynomial for Diag(F). We give a precise bound on the size of this polynomial and show that generically, this polynomial is the minimal polynomial and that its size reaches the bound. The algorithm runs in time quasi-linear in this bound, which grows exponentially with the degree of the input rational function. We then address the related problem of enumerating directed lattice walks. The insight given by our study leads to a new method for expanding the generating power series of bridges, excursions and meanders. We show that their first N terms can be computed in quasi-linear complexity in N, without first computing a very large polynomial equation.

“Algorithms And Complexity” Metadata:

  • Title: Algorithms And Complexity
  • Author:
  • Language: English

“Algorithms And Complexity” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 505.19 Mbs, the file-s for this book were downloaded 131 times, the file-s went public at Thu Jul 16 2020.

Available formats:
ACS Encrypted PDF - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Dublin Core - EPUB - Item Tile - JPEG Thumb - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - OCR Page Index - OCR Search Text - PNG - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - Title Page Detection Log - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Algorithms And Complexity at online marketplaces:


50DTIC ADA114875: The Expected Time Complexity Of Parallel Graph And Digraph Algorithms.

By

This paper determines upper bounds on the expected time complexity for a variety of known parallel algorithms for graph problems. For connectivity of both undirected and directed graphs, transitive closure and all pairs minimum cost paths, we prove the expected time is O(loglog n) for a parallel RAM model (RP-RAM) which allows random resolution of write conflicts, and expected time O(log n loglog n) for the P-RAM of (Wyllie, 79), which allows no write conflicts. We show that the expected parallel time for biconnected components and minimum spanning trees is O(loglog n)(2) for the RP-RAM and O(log n. (loglog n) (2)) for the P-RAM. Also we show that the problem of random graph isomorphism has expected parallel time O(loglog n) and O(log n) for the above parallel models, respectively. Our results also improve known upper bounds on the expected space required tor sequential graph algorithms. For example, we show that the problems of finding strong components, transitive closure and minimum cost paths have expected sequential space O(log-loglog n) with n (O)(1) time on a Turing Machine given random graphs as inputs.

“DTIC ADA114875: The Expected Time Complexity Of Parallel Graph And Digraph Algorithms.” Metadata:

  • Title: ➤  DTIC ADA114875: The Expected Time Complexity Of Parallel Graph And Digraph Algorithms.
  • Author: ➤  
  • Language: English

“DTIC ADA114875: The Expected Time Complexity Of Parallel Graph And Digraph Algorithms.” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 28.41 Mbs, the file-s for this book were downloaded 71 times, the file-s went public at Thu Jan 04 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA114875: The Expected Time Complexity Of Parallel Graph And Digraph Algorithms. at online marketplaces:


Buy “Algorithms And Complexity” online:

Shop for “Algorithms And Complexity” on popular online marketplaces.