Downloads & Free Reading Options - Results

Computational Complexity by Ieee Conference On Computational Complexity (17th 2002 Montreal%2c Québec)

Read "Computational Complexity" by Ieee Conference On Computational Complexity (17th 2002 Montreal%2c Québec) through these free online access and download options.

Search for Downloads

Search by Title or Author

Books Results

Source: The Internet Archive

The internet Archive Search Results

Available books for downloads and borrow from The internet Archive

1On The Computational Complexity Of Spiking Neural P Systems

By

It is shown that there is no standard spiking neural P system that simulates Turing machines with less than exponential time and space overheads. The spiking neural P systems considered here have a constant number of neurons that is independent of the input length. Following this we construct a universal spiking neural P system with exhaustive use of rules that simulates Turing machines in linear time and has only 10 neurons.

“On The Computational Complexity Of Spiking Neural P Systems” Metadata:

  • Title: ➤  On The Computational Complexity Of Spiking Neural P Systems
  • Author:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 9.68 Mbs, the file-s for this book were downloaded 68 times, the file-s went public at Tue Sep 17 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find On The Computational Complexity Of Spiking Neural P Systems at online marketplaces:


2The Computational Complexity Of Rules For The Character Table Of S_n

By

The Murnaghan-Nakayama rule is the classical formula for computing the character table of S_n. Y. Roichman has recently discovered a rule for the Kazhdan-Lusztig characters of q-Hecke algebras of type A, which can also be used for the character table of S_n. For each of the two rules, we give an algorithm for computing entries in the character table of S_n. We then analyze the computational complexity of the two algorithms, and in the case of characters indexed by partitions in the (k,l)-hook, compare their complexities to each other. It turns out that the algorithm based on the Murnaghan-Nakayama rule requires far less operations than the other algorithm. We note the algorithms' complexities' relation to two enumeration problems of Young diagrams and Young tableaux.

“The Computational Complexity Of Rules For The Character Table Of S_n” Metadata:

  • Title: ➤  The Computational Complexity Of Rules For The Character Table Of S_n
  • Author:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 8.09 Mbs, the file-s for this book were downloaded 78 times, the file-s went public at Sun Sep 22 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find The Computational Complexity Of Rules For The Character Table Of S_n at online marketplaces:


3Calculation Of Computational Complexity For Radix-2p Fast Fourier Transform Algorithms For Medical Signals.

By

This article is from Journal of Medical Signals and Sensors , volume 3 . Abstract Owing to its simplicity radix-2 is a popular algorithm to implement fast fourier transform. Radix-2p algorithms have the same order of computational complexity as higher radices algorithms, but still retain the simplicity of radix-2. By defining a new concept, twiddle factor template, in this paper, we propose a method for exact calculation of multiplicative complexity for radix-2p algorithms. The methodology is described for radix-2, radix-22 and radix-23 algorithms. Results show that radix-22 and radix-23 have significantly less computational complexity compared with radix-2. Another interesting result is that while the number of complex multiplications in radix-23 algorithm is slightly more than radix-22, the number of real multiplications for radix-23 is less than radix-22. This is because of the twiddle factors in the form of which need less number of real multiplications and are more frequent in radix-23 algorithm.

“Calculation Of Computational Complexity For Radix-2p Fast Fourier Transform Algorithms For Medical Signals.” Metadata:

  • Title: ➤  Calculation Of Computational Complexity For Radix-2p Fast Fourier Transform Algorithms For Medical Signals.
  • Author:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 1.38 Mbs, the file-s for this book were downloaded 29 times, the file-s went public at Thu Oct 23 2014.

Available formats:
Archive BitTorrent - EPUB - JSON - Metadata -

Related Links:

Online Marketplaces

Find Calculation Of Computational Complexity For Radix-2p Fast Fourier Transform Algorithms For Medical Signals. at online marketplaces:


4Computational Complexity Of Bilinear Forms : Algebraic Coding Theory And Applications Of Digital Communication Systems

By

This article is from Journal of Medical Signals and Sensors , volume 3 . Abstract Owing to its simplicity radix-2 is a popular algorithm to implement fast fourier transform. Radix-2p algorithms have the same order of computational complexity as higher radices algorithms, but still retain the simplicity of radix-2. By defining a new concept, twiddle factor template, in this paper, we propose a method for exact calculation of multiplicative complexity for radix-2p algorithms. The methodology is described for radix-2, radix-22 and radix-23 algorithms. Results show that radix-22 and radix-23 have significantly less computational complexity compared with radix-2. Another interesting result is that while the number of complex multiplications in radix-23 algorithm is slightly more than radix-22, the number of real multiplications for radix-23 is less than radix-22. This is because of the twiddle factors in the form of which need less number of real multiplications and are more frequent in radix-23 algorithm.

“Computational Complexity Of Bilinear Forms : Algebraic Coding Theory And Applications Of Digital Communication Systems” Metadata:

  • Title: ➤  Computational Complexity Of Bilinear Forms : Algebraic Coding Theory And Applications Of Digital Communication Systems
  • Author:
  • Language: English

“Computational Complexity Of Bilinear Forms : Algebraic Coding Theory And Applications Of Digital Communication Systems” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 371.02 Mbs, the file-s for this book were downloaded 19 times, the file-s went public at Thu May 06 2021.

Available formats:
ACS Encrypted PDF - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Dublin Core - Item Tile - JPEG Thumb - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - OCR Page Index - OCR Search Text - PNG - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - Title Page Detection Log - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Computational Complexity Of Bilinear Forms : Algebraic Coding Theory And Applications Of Digital Communication Systems at online marketplaces:


5Computational Complexity And Rational Belief Updating Behaviour

By

This project investigates the relation between computational complexity and the quality of human belief updating.

“Computational Complexity And Rational Belief Updating Behaviour” Metadata:

  • Title: ➤  Computational Complexity And Rational Belief Updating Behaviour
  • Authors:

Edition Identifiers:

Downloads Information:

The book is available for download in "data" format, the size of the file-s is: 0.48 Mbs, the file-s went public at Mon Jun 30 2025.

Available formats:
Archive BitTorrent - Metadata - ZIP -

Related Links:

Online Marketplaces

Find Computational Complexity And Rational Belief Updating Behaviour at online marketplaces:


6Computational Complexity Of Some Quantum Theories In $1+1$ Dimensions

By

We study the computational complexity of certain integrable quantum theories in 1+1 dimensions. We formalize a model of quantum computation based on these theories. In this model, distinguishable particles start out with known momenta and initial superposition of different configurations. Then the label of these particles are measured at the end. We prove that additive approximation to single amplitudes of these models can be obtained by the one-clean-qubit model, if no initial superpositions are allowed. However, if arbitrary initial states and non-adaptive intermediate measurements are allowed, we show that conditioned on infinite polynomial hierarchy assumption it is hard to sample from the output distribution of these models on a classical randomized computer. A classical analogue of this model is also formalized and its computational power is pinned down within the complexity classes below BPP and NP.

“Computational Complexity Of Some Quantum Theories In $1+1$ Dimensions” Metadata:

  • Title: ➤  Computational Complexity Of Some Quantum Theories In $1+1$ Dimensions
  • Author:

“Computational Complexity Of Some Quantum Theories In $1+1$ Dimensions” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 1.11 Mbs, the file-s for this book were downloaded 19 times, the file-s went public at Thu Jun 28 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find Computational Complexity Of Some Quantum Theories In $1+1$ Dimensions at online marketplaces:


7Computational Complexity And Memory Usage For Multi-frontal Direct Solvers In Structured Mesh Finite Elements

By

The multi-frontal direct solver is the state-of-the-art algorithm for the direct solution of sparse linear systems. This paper provides computational complexity and memory usage estimates for the application of the multi-frontal direct solver algorithm on linear systems resulting from B-spline-based isogeometric finite elements, where the mesh is a structured grid. Specifically we provide the estimates for systems resulting from $C^{p-1}$ polynomial B-spline spaces and compare them to those obtained using $C^0$ spaces.

“Computational Complexity And Memory Usage For Multi-frontal Direct Solvers In Structured Mesh Finite Elements” Metadata:

  • Title: ➤  Computational Complexity And Memory Usage For Multi-frontal Direct Solvers In Structured Mesh Finite Elements
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 4.85 Mbs, the file-s for this book were downloaded 64 times, the file-s went public at Sat Sep 21 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Computational Complexity And Memory Usage For Multi-frontal Direct Solvers In Structured Mesh Finite Elements at online marketplaces:


8DTIC ADA174329: Computational Complexity Of Current GPSG (Generalized Phrase Structure Grammar) Theory,

By

An important goal of computational linguistics has been to use linguistic theory to guide the construction of computationally efficient real-world natural language processing systems. At first glance, generalized phrase structure grammar (GPSG) appears to be a blessing on two counts. First, the precise formalisms of GPSG might be a direct and transparent guide for parser design and implementation. Second, since GPSG has weak context-free generative power and context-free languages can be parsed in by a wide range of algorithms, GPSG parsers would appear to run in polynomial time. This widely-assumed GPSG efficient parsability result is misleading: here we prove that the universal recognition problem of current GPSG theory is exponential-polynomial time hard, and assuredly intractable. The paper pinpoints sources of complexity (e.g. metarules and the theory of syntactic features) in the current GPSG theory and concludes with some linguistically and computationally motivated restrictions on GPSG.

“DTIC ADA174329: Computational Complexity Of Current GPSG (Generalized Phrase Structure Grammar) Theory,” Metadata:

  • Title: ➤  DTIC ADA174329: Computational Complexity Of Current GPSG (Generalized Phrase Structure Grammar) Theory,
  • Author: ➤  
  • Language: English

“DTIC ADA174329: Computational Complexity Of Current GPSG (Generalized Phrase Structure Grammar) Theory,” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 20.50 Mbs, the file-s for this book were downloaded 54 times, the file-s went public at Sun Feb 11 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA174329: Computational Complexity Of Current GPSG (Generalized Phrase Structure Grammar) Theory, at online marketplaces:


9Exploring Heuristic Algorithms For The Knapsack Problem: A Comparative Analysis Of Program Complexity And Computational Efficiency

By

Abstract The knapsack problem is an optimization problem in computer science which involves determining the most valuable combination of items that can be packed into a knapsack (a container) with a limited capacity (weight or volume); the goal is to maximize the total profit of the items included in the knapsack without exceeding its capacity. This study extensively analyzes the knapsack problem, exploring the application of three prevalent heuristics: greedy, dynamic programming, and FPTAS algorithms implemented in Python. The study aims to assess how these algorithms perform differently, focusing on program complexity and computational speed. Our main objective is to compare these algorithms and determine the most effective one for solving the knapsack problem as well as to be chosen by the researchers and developers when dealing similar problem in real-world applications. Our methodology involved solving the knapsack problem using the three algorithms within a unified programming environment. We conducted experiments using varying input datasets and recorded the time complexities of the algorithms in each trial. Additionally, we performed Halstead complexity measurements to derive the volume of each algorithm for this study. Subsequently, we compared program complexity in Halstead metrics and computational speed for the three approaches. The research findings reveal that the Greedy algorithm demonstrates superior computational efficiency compared to both Dynamic Programming (D.P) and FPTAS algorithms across various test cases. To advance understanding of the knapsack problem, future research should focus on investigating the performance of other programming languages in addressing combinatorial optimization problems, which would provide valuable insights into language choice impact. Additionally, integrating parallel computing techniques could accelerate solution processes for large-scale problem instances.

“Exploring Heuristic Algorithms For The Knapsack Problem: A Comparative Analysis Of Program Complexity And Computational Efficiency” Metadata:

  • Title: ➤  Exploring Heuristic Algorithms For The Knapsack Problem: A Comparative Analysis Of Program Complexity And Computational Efficiency
  • Author: ➤  
  • Language: English

“Exploring Heuristic Algorithms For The Knapsack Problem: A Comparative Analysis Of Program Complexity And Computational Efficiency” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 14.52 Mbs, the file-s for this book were downloaded 9 times, the file-s went public at Sat Sep 14 2024.

Available formats:
Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Exploring Heuristic Algorithms For The Knapsack Problem: A Comparative Analysis Of Program Complexity And Computational Efficiency at online marketplaces:


10Sensitivity And Computational Complexity In Financial Networks

By

Modern financial networks exhibit a high degree of interconnectedness and determining the causes of instability and contagion in financial networks is necessary to inform policy and avoid future financial collapse. In the American Economic Review, Elliott, Golub and Jackson proposed a simple model for capturing the dynamics of complex financial networks. In Elliott, Golub and Jackson's model, each institution in the network can buy underlying assets or percentage shares in other institutions (cross-holdings) and if any institution's value drops below a critical threshold value, its value suffers an additional failure cost. This work shows that even in simple model put forward by Elliott, Golub and Jackson there are fundamental barriers to understanding the risks that are inherent in a network. First, if institutions are not required to maintain a minimum amount of self-holdings, an $\epsilon$ change in investments by a single institution can have an arbitrarily magnified influence on the net worth of the institutions in the system. This sensitivity result shows that if institutions have small self-holdings, then estimating the market value of an institution requires almost perfect information about every cross-holding in the system. Second, we show that even if a regulator has complete information about all cross-holdings in the system, it may be computationally intractable to even estimate the number of failures that could be caused by an arbitrarily small shock to the system. Together, these results show that any uncertainty in the cross-holdings or values of the underlying assets can be amplified by the network to arbitrarily large uncertainty in the valuations of institutions in the network.

“Sensitivity And Computational Complexity In Financial Networks” Metadata:

  • Title: ➤  Sensitivity And Computational Complexity In Financial Networks
  • Authors:
  • Language: English

“Sensitivity And Computational Complexity In Financial Networks” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 14.08 Mbs, the file-s for this book were downloaded 39 times, the file-s went public at Wed Jun 27 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - JPEG Thumb - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Sensitivity And Computational Complexity In Financial Networks at online marketplaces:


11Context Semantics, Linear Logic And Computational Complexity

By

We show that context semantics can be fruitfully applied to the quantitative analysis of proof normalization in linear logic. In particular, context semantics lets us define the weight of a proof-net as a measure of its inherent complexity: it is both an upper bound to normalization time (modulo a polynomial overhead, independently on the reduction strategy) and a lower bound to the number of steps to normal form (for certain reduction strategies). Weights are then exploited in proving strong soundness theorems for various subsystems of linear logic, namely elementary linear logic, soft linear logic and light linear logic.

“Context Semantics, Linear Logic And Computational Complexity” Metadata:

  • Title: ➤  Context Semantics, Linear Logic And Computational Complexity
  • Author:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 11.72 Mbs, the file-s for this book were downloaded 94 times, the file-s went public at Mon Sep 23 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Context Semantics, Linear Logic And Computational Complexity at online marketplaces:


12On The Complexity Of The Permanent In Various Computational Models

By

We answer a question in [Landsberg, Ressayre, 2015], showing the regular determinantal complexity of the determinant det_m is O(m^3). We answer questions in, and generalize results of [Aravind, Joglekar, 2015], showing there is no rank one determinantal expression for perm_m or det_m when m >= 3. Finally we state and prove several "folklore" results relating different models of computation.

“On The Complexity Of The Permanent In Various Computational Models” Metadata:

  • Title: ➤  On The Complexity Of The Permanent In Various Computational Models
  • Authors:

“On The Complexity Of The Permanent In Various Computational Models” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.23 Mbs, the file-s for this book were downloaded 17 times, the file-s went public at Fri Jun 29 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find On The Complexity Of The Permanent In Various Computational Models at online marketplaces:


13Computational Depth Complexity Of Measurement-based Quantum Computation

By

We prove that one-way quantum computations have the same computational power as quantum circuits with unbounded fan-out. It demonstrates that the one-way model is not only one of the most promising models of physical realisation, but also a very powerful model of quantum computation. It confirms and completes previous results which have pointed out, for some specific problems, a depth separation between the one-way model and the quantum circuit model. Since one-way model has the same computational power as unbounded quantum fan-out circuits, the quantum Fourier transform can be approximated in constant depth in the one-way model, and thus the factorisation can be done by a polytime probabilistic classical algorithm which has access to a constant-depth one-way quantum computer. The extra power of the one-way model, comparing with the quantum circuit model, comes from its classical-quantum hybrid nature. We show that this extra power is reduced to the capability to perform unbounded classical parity gates in constant depth.

“Computational Depth Complexity Of Measurement-based Quantum Computation” Metadata:

  • Title: ➤  Computational Depth Complexity Of Measurement-based Quantum Computation
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 5.95 Mbs, the file-s for this book were downloaded 72 times, the file-s went public at Thu Sep 19 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Computational Depth Complexity Of Measurement-based Quantum Computation at online marketplaces:


14Computational Complexity And Black Hole Horizons

By

Computational complexity is essential to understanding the properties of black hole horizons. The problem of Alice creating a firewall behind the horizon of Bob's black hole is a problem of computational complexity. In general we find that while creating firewalls is possible, it is extremely difficult and probably impossible for black holes that form in sudden collapse, and then evaporate. On the other hand if the radiation is bottled up then after an exponentially long period of time firewalls may be common. It is possible that gravity will provide tools to study problems of complexity; especially the range of complexity between scrambling and exponential complexity.

“Computational Complexity And Black Hole Horizons” Metadata:

  • Title: ➤  Computational Complexity And Black Hole Horizons
  • Author:

“Computational Complexity And Black Hole Horizons” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.71 Mbs, the file-s for this book were downloaded 29 times, the file-s went public at Sat Jun 30 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find Computational Complexity And Black Hole Horizons at online marketplaces:


15DTIC ADA240670: Practical Computational Complexity.

By

Computational Complexity Analysis is a very powerful tool for use in designing algorithms. Unfortunately, the analysis can sometimes be misleading for the range of input with which the algorithm will actually be used. The aim of this paper is to first give an overview of what computational complexity is, and how to analyse it, and to then explain what parts of complexity analysis can cause confusion, and how to avoid these mistakes. The paper also seeks to investigate ways of solving problems faster by sacrificing certain operating requirements.

“DTIC ADA240670: Practical Computational Complexity.” Metadata:

  • Title: ➤  DTIC ADA240670: Practical Computational Complexity.
  • Author: ➤  
  • Language: English

“DTIC ADA240670: Practical Computational Complexity.” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 10.45 Mbs, the file-s for this book were downloaded 54 times, the file-s went public at Sat Mar 03 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA240670: Practical Computational Complexity. at online marketplaces:


16DTIC ADA127901: A Result On The Computational Complexity Of Heuristic Estimates For The A Algorithm.

By

The performance of a new heuristic search algorithm is analyzed. The algorithm uses a formal representation that contains enough information to compute the heuristic evaluation function h(n), without requiring a human expert to provide it. The new algorithm is shown to be less efficient than the Dijkstra algorithm, according to the complexity measure number of node expansion. Researchers attempt an interpretation of this strong negative result. Other properties of the new algorithm are discussed in references Valt80, GSoma79, GSValt80. A short discussion of related research, some of which is in progress, concludes the paper. (Author)

“DTIC ADA127901: A Result On The Computational Complexity Of Heuristic Estimates For The A Algorithm.” Metadata:

  • Title: ➤  DTIC ADA127901: A Result On The Computational Complexity Of Heuristic Estimates For The A Algorithm.
  • Author: ➤  
  • Language: English

“DTIC ADA127901: A Result On The Computational Complexity Of Heuristic Estimates For The A Algorithm.” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 11.12 Mbs, the file-s for this book were downloaded 88 times, the file-s went public at Thu Jan 11 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA127901: A Result On The Computational Complexity Of Heuristic Estimates For The A Algorithm. at online marketplaces:


17On The Computational Complexity Of Read Once Resolution Decidability In 2CNF Formulas

By

In this paper, we analyze 2CNF formulas from the perspectives of Read-Once resolution (ROR) refutation schemes. We focus on two types of ROR refutations, viz., variable-once refutation and clause-once refutation. In the former, each variable may be used at most once in the derivation of a refutation, while in the latter, each clause may be used at most once. We show that the problem of checking whether a given 2CNF formula has an ROR refutation under both schemes is NP-complete. This is surprising in light of the fact that there exist polynomial refutation schemes (tree-resolution and DAG-resolution) for 2CNF formulas. On the positive side, we show that 2CNF formulas have copy-complexity 2, which means that any unsatisfiable 2CNF formula has a refutation in which any clause needs to be used at most twice.

“On The Computational Complexity Of Read Once Resolution Decidability In 2CNF Formulas” Metadata:

  • Title: ➤  On The Computational Complexity Of Read Once Resolution Decidability In 2CNF Formulas
  • Authors:

“On The Computational Complexity Of Read Once Resolution Decidability In 2CNF Formulas” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.17 Mbs, the file-s for this book were downloaded 19 times, the file-s went public at Fri Jun 29 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find On The Computational Complexity Of Read Once Resolution Decidability In 2CNF Formulas at online marketplaces:


18Computational Complexity Analysis Of Simple Genetic Programming On Two Problems Modeling Isolated Program Semantics

By

Analyzing the computational complexity of evolutionary algorithms for binary search spaces has significantly increased their theoretical understanding. With this paper, we start the computational complexity analysis of genetic programming. We set up several simplified genetic programming algorithms and analyze them on two separable model problems, ORDER and MAJORITY, each of which captures an important facet of typical genetic programming problems. Both analyses give first rigorous insights on aspects of genetic programming design, highlighting in particular the impact of accepting or rejecting neutral moves and the importance of a local mutation operator.

“Computational Complexity Analysis Of Simple Genetic Programming On Two Problems Modeling Isolated Program Semantics” Metadata:

  • Title: ➤  Computational Complexity Analysis Of Simple Genetic Programming On Two Problems Modeling Isolated Program Semantics
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 12.71 Mbs, the file-s for this book were downloaded 721 times, the file-s went public at Sat Jul 20 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Computational Complexity Analysis Of Simple Genetic Programming On Two Problems Modeling Isolated Program Semantics at online marketplaces:


19Logic And Computational Complexity : International Workshop, LCC '94, Indianapolis, IN, USA, October 13-16, 1994 : Selected Papers

Analyzing the computational complexity of evolutionary algorithms for binary search spaces has significantly increased their theoretical understanding. With this paper, we start the computational complexity analysis of genetic programming. We set up several simplified genetic programming algorithms and analyze them on two separable model problems, ORDER and MAJORITY, each of which captures an important facet of typical genetic programming problems. Both analyses give first rigorous insights on aspects of genetic programming design, highlighting in particular the impact of accepting or rejecting neutral moves and the importance of a local mutation operator.

“Logic And Computational Complexity : International Workshop, LCC '94, Indianapolis, IN, USA, October 13-16, 1994 : Selected Papers” Metadata:

  • Title: ➤  Logic And Computational Complexity : International Workshop, LCC '94, Indianapolis, IN, USA, October 13-16, 1994 : Selected Papers
  • Language: English

“Logic And Computational Complexity : International Workshop, LCC '94, Indianapolis, IN, USA, October 13-16, 1994 : Selected Papers” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 1415.85 Mbs, the file-s for this book were downloaded 52 times, the file-s went public at Thu Sep 19 2019.

Available formats:
ACS Encrypted EPUB - ACS Encrypted PDF - Abbyy GZ - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Dublin Core - Item Tile - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - Title Page Detection Log - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Logic And Computational Complexity : International Workshop, LCC '94, Indianapolis, IN, USA, October 13-16, 1994 : Selected Papers at online marketplaces:


20On Computational Complexity Of Riemann Mapping

By

In this paper we consider the computational complexity of uniformizing a domain with a given computable boundary. We give nontrivial upper and lower bounds in two settings: when the approximation of boundary is given either as a list of pixels, or by a Turing Machine.

“On Computational Complexity Of Riemann Mapping” Metadata:

  • Title: ➤  On Computational Complexity Of Riemann Mapping
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 8.29 Mbs, the file-s for this book were downloaded 68 times, the file-s went public at Wed Sep 18 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find On Computational Complexity Of Riemann Mapping at online marketplaces:


21Time, Computational Complexity, And Probability In The Analysis Of Distance-Bounding Protocols

By

Many security protocols rely on the assumptions on the physical properties in which its protocol sessions will be carried out. For instance, Distance Bounding Protocols take into account the round trip time of messages and the transmission velocity to infer an upper bound of the distance between two agents. We classify such security protocols as Cyber-Physical. Time plays a key role in design and analysis of many of these protocols. This paper investigates the foundational differences and the impacts on the analysis when using models with discrete time and models with dense time. We show that there are attacks that can be found by models using dense time, but not when using discrete time. We illustrate this with a novel attack that can be carried out on most Distance Bounding Protocols. In this attack, one exploits the execution delay of instructions during one clock cycle to convince a verifier that he is in a location different from his actual position. We additionally present a probabilistic analysis of this novel attack. As a formal model for representing and analyzing Cyber-Physical properties, we propose a Multiset Rewriting model with dense time suitable for specifying cyber-physical security protocols. We introduce Circle-Configurations and show that they can be used to symbolically solve the reachability problem for our model, and show that for the important class of balanced theories the reachability problem is PSPACE-complete. We also show how our model can be implemented using the computational rewriting tool Maude, the machinery that automatically searches for such attacks.

“Time, Computational Complexity, And Probability In The Analysis Of Distance-Bounding Protocols” Metadata:

  • Title: ➤  Time, Computational Complexity, And Probability In The Analysis Of Distance-Bounding Protocols
  • Authors:

“Time, Computational Complexity, And Probability In The Analysis Of Distance-Bounding Protocols” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.61 Mbs, the file-s for this book were downloaded 22 times, the file-s went public at Sat Jun 30 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find Time, Computational Complexity, And Probability In The Analysis Of Distance-Bounding Protocols at online marketplaces:


22Parallel Dynamics And Computational Complexity Of The Bak-Sneppen Model

By

The parallel computational complexity of the Bak-Sneppen evolution model is studied. It is shown that Bak-Sneppen histories can be generated by a massively parallel computer in a time that is polylogarithmic in the length of the history. In this parallel dynamics, histories are built up via a nested hierarchy of avalanches. Stated in another way, the main result is that the logical depth of producing a Bak-Sneppen history is exponentially less than the length of the history. This finding is surprising because the self-organized critical state of the Bak-Sneppen model has long range correlations in time and space that appear to imply that the dynamics is sequential and history dependent. The parallel dynamics for generating Bak-Sneppen histories is contrasted to standard Bak-Sneppen dynamics. Standard dynamics and an alternate method for generating histories, conditional dynamics, are both shown to be related to P-complete natural decision problems implying that they cannot be efficiently implemented in parallel.

“Parallel Dynamics And Computational Complexity Of The Bak-Sneppen Model” Metadata:

  • Title: ➤  Parallel Dynamics And Computational Complexity Of The Bak-Sneppen Model
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 16.40 Mbs, the file-s for this book were downloaded 66 times, the file-s went public at Wed Sep 18 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Parallel Dynamics And Computational Complexity Of The Bak-Sneppen Model at online marketplaces:


23Computational Complexity In Physics

By

This is a brief review paper summarizing talks at the NATO school on Complexity and Large Deviations in Geilo, Norway, 2001.

“Computational Complexity In Physics” Metadata:

  • Title: ➤  Computational Complexity In Physics
  • Author:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 2.50 Mbs, the file-s for this book were downloaded 80 times, the file-s went public at Mon Sep 23 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Computational Complexity In Physics at online marketplaces:


24Computational Complexity Of Traffic Hijacking Under BGP And S-BGP

By

Harmful Internet hijacking incidents put in evidence how fragile the Border Gateway Protocol (BGP) is, which is used to exchange routing information between Autonomous Systems (ASes). As proved by recent research contributions, even S-BGP, the secure variant of BGP that is being deployed, is not fully able to blunt traffic attraction attacks. Given a traffic flow between two ASes, we study how difficult it is for a malicious AS to devise a strategy for hijacking or intercepting that flow. We show that this problem marks a sharp difference between BGP and S-BGP. Namely, while it is solvable, under reasonable assumptions, in polynomial time for the type of attacks that are usually performed in BGP, it is NP-hard for S-BGP. Our study has several by-products. E.g., we solve a problem left open in the literature, stating when performing a hijacking in S-BGP is equivalent to performing an interception.

“Computational Complexity Of Traffic Hijacking Under BGP And S-BGP” Metadata:

  • Title: ➤  Computational Complexity Of Traffic Hijacking Under BGP And S-BGP
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 9.43 Mbs, the file-s for this book were downloaded 59 times, the file-s went public at Fri Sep 20 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Computational Complexity Of Traffic Hijacking Under BGP And S-BGP at online marketplaces:


25On Computational Complexity Of Length Embeddability Of Graphs

By

A graph $G$ is embeddable in $\mathbb{R}^d$ if vertices of $G$ can be assigned with points of $\mathbb{R}^d$ in such a way that all pairs of adjacent vertices are at the distance 1. We show that verifying embeddability of a given graph in $\mathbb{R}^d$ is NP-hard in the case $d > 2$ for all reasonable notions of embeddability.

“On Computational Complexity Of Length Embeddability Of Graphs” Metadata:

  • Title: ➤  On Computational Complexity Of Length Embeddability Of Graphs
  • Author:

“On Computational Complexity Of Length Embeddability Of Graphs” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.30 Mbs, the file-s for this book were downloaded 15 times, the file-s went public at Sat Jun 30 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find On Computational Complexity Of Length Embeddability Of Graphs at online marketplaces:


26"Computational Complexity And Fundamental Physics" With Scott Aaronson Of MIT

By

Presented by The Aspen Center for Physics Scott Aaronson is Schlumberger Chair of Computer Science and Director, Quantum Information Center, Department of Computer Science at The University of Texas at Austin. In summer 2022 he announced he would be working for a year at OpenAI on theoretical foundations of AI safety. Know Aspen. Watch GrassRoots. GrassRoots TV programming is entirely funded by direct contributions from members of the Roaring Fork Valley community, and through grants from the City of Aspen Community Non-Profit Grant Program, Pitkin County Healthy Community Fund, The Town of Snowmass Village and The Aspen Thrift Shop. Founded by citizens of Aspen, Colorado in 1972, GrassRoots TV is the first and oldest community operated and programmed open-source media center and television station in the United States. Virtually all of the programming is created by local residents, occasionally with world renown guests. In partnership with the American Archive of Public Media and the Library of Congress, GrassRoots is currently cataloguing, restoring and digitally archiving 500 of the most at-risk original video programs out of its 45,000 title Community Video Archive. Help sustain this community treasure by donating now! Go to: https://bit.ly/GRTVContribute Don't forget to SUBSCRIBE, HIT LIKE and leave a COMMENT to let us know if you enjoyed this video, it is important to us and the community for you to become part of the conversation. Thanks for tuning in! Download the GrassRoots Community Network iOS and Android apps Subscribe for more videos: https://bit.ly/2Ycpi4P Facebook: https://www.facebook.com/GrassRootsCommunityNetwork/ Twitter: https://twitter.com/grassrootstv Web: http://www.grassrootstv.org/

“"Computational Complexity And Fundamental Physics" With Scott Aaronson Of MIT” Metadata:

  • Title: ➤  "Computational Complexity And Fundamental Physics" With Scott Aaronson Of MIT
  • Author:
  • Language: English

“"Computational Complexity And Fundamental Physics" With Scott Aaronson Of MIT” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "movies" format, the size of the file-s is: 908.53 Mbs, the file-s went public at Mon Jun 23 2025.

Available formats:
Archive BitTorrent - Item Tile - MP3 - MPEG4 - Metadata - PNG - SubRip - Thumbnail - Web Video Text Tracks - h.264 -

Related Links:

Online Marketplaces

Find "Computational Complexity And Fundamental Physics" With Scott Aaronson Of MIT at online marketplaces:


27P, NP, And NP-completeness : The Basics Of Computational Complexity

By

Presented by The Aspen Center for Physics Scott Aaronson is Schlumberger Chair of Computer Science and Director, Quantum Information Center, Department of Computer Science at The University of Texas at Austin. In summer 2022 he announced he would be working for a year at OpenAI on theoretical foundations of AI safety. Know Aspen. Watch GrassRoots. GrassRoots TV programming is entirely funded by direct contributions from members of the Roaring Fork Valley community, and through grants from the City of Aspen Community Non-Profit Grant Program, Pitkin County Healthy Community Fund, The Town of Snowmass Village and The Aspen Thrift Shop. Founded by citizens of Aspen, Colorado in 1972, GrassRoots TV is the first and oldest community operated and programmed open-source media center and television station in the United States. Virtually all of the programming is created by local residents, occasionally with world renown guests. In partnership with the American Archive of Public Media and the Library of Congress, GrassRoots is currently cataloguing, restoring and digitally archiving 500 of the most at-risk original video programs out of its 45,000 title Community Video Archive. Help sustain this community treasure by donating now! Go to: https://bit.ly/GRTVContribute Don't forget to SUBSCRIBE, HIT LIKE and leave a COMMENT to let us know if you enjoyed this video, it is important to us and the community for you to become part of the conversation. Thanks for tuning in! Download the GrassRoots Community Network iOS and Android apps Subscribe for more videos: https://bit.ly/2Ycpi4P Facebook: https://www.facebook.com/GrassRootsCommunityNetwork/ Twitter: https://twitter.com/grassrootstv Web: http://www.grassrootstv.org/

“P, NP, And NP-completeness : The Basics Of Computational Complexity” Metadata:

  • Title: ➤  P, NP, And NP-completeness : The Basics Of Computational Complexity
  • Author:
  • Language: English

“P, NP, And NP-completeness : The Basics Of Computational Complexity” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 403.19 Mbs, the file-s for this book were downloaded 56 times, the file-s went public at Tue Jan 24 2023.

Available formats:
ACS Encrypted PDF - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Dublin Core - EPUB - Item Tile - JPEG Thumb - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - Metadata Log - OCR Page Index - OCR Search Text - PNG - Page Numbers JSON - RePublisher Final Processing Log - RePublisher Initial Processing Log - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - Title Page Detection Log - chOCR - hOCR -

Related Links:

Online Marketplaces

Find P, NP, And NP-completeness : The Basics Of Computational Complexity at online marketplaces:


28On The Computational Complexity Of Limit Cycles In Dynamical Systems

By

We study the Poincare-Bendixson theorem for two-dimensional continuous dynamical systems in compact domains from the point of view of computation, seeking algorithms for finding the limit cycle promised by this classical result. We start by considering a discrete analogue of this theorem and show that both finding a point on a limit cycle, and determining if a given point is on one, are PSPACE-complete. For the continuous version, we show that both problems are uncomputable in the real complexity sense; i.e., their complexity is arbitrarily high. Subsequently, we introduce a notion of an "approximate cycle" and prove an "approximate" Poincar\'e-Bendixson theorem guaranteeing that some orbits come very close to forming a cycle in the absence of approximate fixpoints; surprisingly, it holds for all dimensions. The corresponding computational problem defined in terms of arithmetic circuits is PSPACE-complete.

“On The Computational Complexity Of Limit Cycles In Dynamical Systems” Metadata:

  • Title: ➤  On The Computational Complexity Of Limit Cycles In Dynamical Systems
  • Authors:

“On The Computational Complexity Of Limit Cycles In Dynamical Systems” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 1.30 Mbs, the file-s for this book were downloaded 19 times, the file-s went public at Thu Jun 28 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find On The Computational Complexity Of Limit Cycles In Dynamical Systems at online marketplaces:


29DTIC ADA214247: A Renormalization Group Approach To Image Processing. A New Computational Method For 3-Dimensional Shapes In Robot Vision, And The Computational Complexity Of The Cooling Algorithms

By

During the period of the contract, 6/15/86-7/31/89, we have develop: I). A parallel multilevel-multiresolution algorithm for Image Processing and low-level Robot vision tasks, II). A Bayesian/Geometric Framework for 3-D shape estimation from 2-D images, appropriate for object recognition and other Robot tasks III). A procedure for rotation and scale invariant representation (coding) and recognition of textures; a computationally efficient algorithm for estimating Markov Random Fields, IV). We have obtained mathematical results concerning convergence and speed of convergence of computational algorithms such as the annealing algorithm, and have studied mathematically the consistency and asymptotic normality of Maximum Likelihood Estimators for Gibbs distributions. Keywords: Computer vision. (KR)

“DTIC ADA214247: A Renormalization Group Approach To Image Processing. A New Computational Method For 3-Dimensional Shapes In Robot Vision, And The Computational Complexity Of The Cooling Algorithms” Metadata:

  • Title: ➤  DTIC ADA214247: A Renormalization Group Approach To Image Processing. A New Computational Method For 3-Dimensional Shapes In Robot Vision, And The Computational Complexity Of The Cooling Algorithms
  • Author: ➤  
  • Language: English

“DTIC ADA214247: A Renormalization Group Approach To Image Processing. A New Computational Method For 3-Dimensional Shapes In Robot Vision, And The Computational Complexity Of The Cooling Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 5.20 Mbs, the file-s for this book were downloaded 48 times, the file-s went public at Fri Feb 23 2018.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA214247: A Renormalization Group Approach To Image Processing. A New Computational Method For 3-Dimensional Shapes In Robot Vision, And The Computational Complexity Of The Cooling Algorithms at online marketplaces:


30The Computational Complexity Of Machine Learning

By

During the period of the contract, 6/15/86-7/31/89, we have develop: I). A parallel multilevel-multiresolution algorithm for Image Processing and low-level Robot vision tasks, II). A Bayesian/Geometric Framework for 3-D shape estimation from 2-D images, appropriate for object recognition and other Robot tasks III). A procedure for rotation and scale invariant representation (coding) and recognition of textures; a computationally efficient algorithm for estimating Markov Random Fields, IV). We have obtained mathematical results concerning convergence and speed of convergence of computational algorithms such as the annealing algorithm, and have studied mathematically the consistency and asymptotic normality of Maximum Likelihood Estimators for Gibbs distributions. Keywords: Computer vision. (KR)

“The Computational Complexity Of Machine Learning” Metadata:

  • Title: ➤  The Computational Complexity Of Machine Learning
  • Author:
  • Language: English

“The Computational Complexity Of Machine Learning” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 467.46 Mbs, the file-s for this book were downloaded 96 times, the file-s went public at Wed May 16 2018.

Available formats:
ACS Encrypted EPUB - ACS Encrypted PDF - Abbyy GZ - Cloth Cover Detection Log - Contents - DjVuTXT - Djvu XML - Dublin Core - Grayscale PDF - Item Tile - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - MARC Source - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Remediated EPUB - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find The Computational Complexity Of Machine Learning at online marketplaces:


31DTIC ADA089177: Computational Complexity,

By

According to the story, which had been picked up from the magazine Science, 'apart from its profound theoretical interest, the discovery may be applicable in weather prediction, complicated industrial processes, petroleum refining, the scheduling of workers at large factories, secret codes and many other thing'. The new York Times coverage generated substantial controversy concerning the merits of the discovery, a new algorithm for doing linear programming. Near the end of this article we will evaluate this algorithm. The new York Times story concerned the 'computational complexity' of the linear programming problem. Although computational complexity does not always make front page news, it is a very active and important research area. Its subject is the determination of the intrinsic difficulty of mathematically posed problems arising in many disciplines. The study of complexity has led to more efficient algorithms than those previously known or suspected. We illustrate some of the important ideas of computational complexity with the example of matrix multiplication. (Author)

“DTIC ADA089177: Computational Complexity,” Metadata:

  • Title: ➤  DTIC ADA089177: Computational Complexity,
  • Author: ➤  
  • Language: English

“DTIC ADA089177: Computational Complexity,” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 7.65 Mbs, the file-s for this book were downloaded 74 times, the file-s went public at Wed Dec 06 2017.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA089177: Computational Complexity, at online marketplaces:


32DTIC ADA035929: Computational Complexity Of One-Step Methods For Systems Of Differential Equations.

By

The problem is to calculate an approximate solution of an initial value problem for an autonomous system of N ordinary differential equations. Using fast power series techniques, we exhibit an algorithm for the pth-order Taylor series method requiring only O((p to the N power) ln p) arithmetic operations per step as p goes to plus infinity. (Moreover, we show that any such algorithm requires at least O(p to the N power) operations per step.) We compute the order which minimizes the complexity bounds for Taylor series and linear Runge-Kutta methods, and show that in all cases, this optimal order increases as the error criterion epsilon decreases, tending to infinity as epsilon tends to zero. Finally, we show that if certain derivatives are easy to evaluate, then Taylor series methods are asymptotically better than linear Runge-Kutta methods for problems of small dimension N. (Author)

“DTIC ADA035929: Computational Complexity Of One-Step Methods For Systems Of Differential Equations.” Metadata:

  • Title: ➤  DTIC ADA035929: Computational Complexity Of One-Step Methods For Systems Of Differential Equations.
  • Author: ➤  
  • Language: English

“DTIC ADA035929: Computational Complexity Of One-Step Methods For Systems Of Differential Equations.” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 41.41 Mbs, the file-s for this book were downloaded 108 times, the file-s went public at Mon Dec 28 2015.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC ADA035929: Computational Complexity Of One-Step Methods For Systems Of Differential Equations. at online marketplaces:


33DTIC AD1033054: Computational Complexity Of Bosons In Linear Networks

By

This project is the first to operating a BOSONSAMPLING device with a bright source of highly-pure single-photon Fock states, using a new kind of solid-state multiphoton source. In detail, the source is emission from an efficient and deterministic quantum dot-micropillar system, demultiplexed into three partially-indistinguishable single-photons, with purity 1g(2)(0) of 0.9900.001 (close to the ideal value of unity), interfering in a 66 linear optics network. Our source is quiet lacking higher-order photon terms that introduce noise allowing the direct exploration of the effect of partial distinguishability in the complexity class of the resulting sampling distribution. Our demultiplexed source is between one and two orders-of-magnitude more efficient than current heralded multiphoton sources based on spontaneous parametric down conversion, allowing us to complete the BOSONSAMPLING experiment far faster than previous equivalent implementations. This intrinsic source superiority places BOSONSAMPLING with larger photon numbers within near reach.

“DTIC AD1033054: Computational Complexity Of Bosons In Linear Networks” Metadata:

  • Title: ➤  DTIC AD1033054: Computational Complexity Of Bosons In Linear Networks
  • Author: ➤  
  • Language: English

“DTIC AD1033054: Computational Complexity Of Bosons In Linear Networks” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 3.79 Mbs, the file-s for this book were downloaded 58 times, the file-s went public at Wed Mar 18 2020.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC AD1033054: Computational Complexity Of Bosons In Linear Networks at online marketplaces:


34Isoperimetric Functions Of Groups And Computational Complexity Of The Word Problem

By

We prove that the word problem of a finitely generated group $G$ is in NP (solvable in polynomial time by a non-deterministic Turing machine) if and only if this group is a subgroup of a finitely presented group $H$ with polynomial isoperimetric function. The embedding can be chosen in such a way that $G$ has bounded distortion in $H$.

“Isoperimetric Functions Of Groups And Computational Complexity Of The Word Problem” Metadata:

  • Title: ➤  Isoperimetric Functions Of Groups And Computational Complexity Of The Word Problem
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 27.84 Mbs, the file-s for this book were downloaded 73 times, the file-s went public at Wed Sep 18 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Isoperimetric Functions Of Groups And Computational Complexity Of The Word Problem at online marketplaces:


35Quantum Computational Complexity In The Presence Of Closed Timelike Curves

By

Quantum computation with quantum data that can traverse closed timelike curves represents a new physical model of computation. We argue that a model of quantum computation in the presence of closed timelike curves can be formulated which represents a valid quantification of resources given the ability to construct compact regions of closed timelike curves. The notion of self-consistent evolution for quantum computers whose components follow closed timelike curves, as pointed out by Deutsch [Phys. Rev. D {\bf 44}, 3197 (1991)], implies that the evolution of the chronology respecting components which interact with the closed timelike curve components is nonlinear. We demonstrate that this nonlinearity can be used to efficiently solve computational problems which are generally thought to be intractable. In particular we demonstrate that a quantum computer which has access to closed timelike curve qubits can solve NP-complete problems with only a polynomial number of quantum gates.

“Quantum Computational Complexity In The Presence Of Closed Timelike Curves” Metadata:

  • Title: ➤  Quantum Computational Complexity In The Presence Of Closed Timelike Curves
  • Author:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 7.31 Mbs, the file-s for this book were downloaded 78 times, the file-s went public at Sun Sep 22 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - JPEG Thumb - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Quantum Computational Complexity In The Presence Of Closed Timelike Curves at online marketplaces:


36Computational Complexity Arising From Degree Correlations In Networks

By

We apply a Bethe-Peierls approach to statistical-mechanics models defined on random networks of arbitrary degree distribution and arbitrary correlations between the degrees of neighboring vertices. Using the NP-hard optimization problem of finding minimal vertex covers on these graphs, we show that such correlations may lead to a qualitatively different solution structure as compared to uncorrelated networks. This results in a higher complexity of the network in a computational sense: Simple heuristic algorithms fail to find a minimal vertex cover in the highly correlated case, whereas uncorrelated networks seem to be simple from the point of view of combinatorial optimization.

“Computational Complexity Arising From Degree Correlations In Networks” Metadata:

  • Title: ➤  Computational Complexity Arising From Degree Correlations In Networks
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 3.71 Mbs, the file-s for this book were downloaded 142 times, the file-s went public at Tue Sep 17 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Computational Complexity Arising From Degree Correlations In Networks at online marketplaces:


37Aspects Of Statistical Physics In Computational Complexity

By

The aim of this review paper is to give a panoramic of the impact of spin glass theory and statistical physics in the study of the K-sat problem. The introduction of spin glass theory in the study of the random K-sat problem has indeed left a mark on the field, leading to some groundbreaking descriptions of the geometry of its solution space, and helping to shed light on why it seems to be so hard to solve. Most of the geometrical intuitions have their roots in the Sherrington-Kirkpatrick model of spin glass. We'll start Chapter 2 by introducing the model from a mathematical perspective, presenting a selection of rigorous results and giving a first intuition about the cavity method. We'll then switch to a physical perspective, to explore concepts like pure states, hierarchical clustering and replica symmetry breaking. Chapter 3 will be devoted to the spin glass formulation of K-sat, while the most important phase transitions of K-sat (clustering, condensation, freezing and SAT/UNSAT) will be extensively discussed in Chapter 4, with respect their complexity, free-entropy density and the Parisi 1RSB parameter. The concept of algorithmic barrier will be presented in Chapter 5 and exemplified in detail on the Belief Propagation (BP) algorithm. The BP algorithm will be introduced and motivated, and numerical analysis of a BP-guided decimation algorithm will be used to show the role of the clustering, condensation and freezing phase transitions in creating an algorithmic barrier for BP. Taking from the failure of BP in the clustered and condensed phases, Chapter 6 will finally introduce the Cavity Method to deal with the shattering of the solution space, and present its application to the development of the Survey Propagation algorithm.

“Aspects Of Statistical Physics In Computational Complexity” Metadata:

  • Title: ➤  Aspects Of Statistical Physics In Computational Complexity
  • Author:

“Aspects Of Statistical Physics In Computational Complexity” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 3.68 Mbs, the file-s for this book were downloaded 23 times, the file-s went public at Sat Jun 30 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find Aspects Of Statistical Physics In Computational Complexity at online marketplaces:


38On The Computational Complexity Of Algebraic Numbers: The Hartmanis--Stearns Problem Revisited

By

We consider the complexity of integer base expansions of algebraic irrational numbers from a computational point of view. We show that the Hartmanis--Stearns problem can be solved in a satisfactory way for the class of multistack machines. In this direction, our main result is that the base-$b$ expansion of an algebraic irrational real number cannot be generated by a deterministic pushdown automaton. We also confirm an old claim of Cobham proving that such numbers cannot be generated by a tag machine with dilation factor larger than one.

“On The Computational Complexity Of Algebraic Numbers: The Hartmanis--Stearns Problem Revisited” Metadata:

  • Title: ➤  On The Computational Complexity Of Algebraic Numbers: The Hartmanis--Stearns Problem Revisited
  • Authors:

“On The Computational Complexity Of Algebraic Numbers: The Hartmanis--Stearns Problem Revisited” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.34 Mbs, the file-s for this book were downloaded 18 times, the file-s went public at Fri Jun 29 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find On The Computational Complexity Of Algebraic Numbers: The Hartmanis--Stearns Problem Revisited at online marketplaces:


39Analysis Of The Computational Complexity Of Solving Random Satisfiability Problems Using Branch And Bound Search Algorithms

By

The computational complexity of solving random 3-Satisfiability (3-SAT) problems is investigated. 3-SAT is a representative example of hard computational tasks; it consists in knowing whether a set of alpha N randomly drawn logical constraints involving N Boolean variables can be satisfied altogether or not. Widely used solving procedures, as the Davis-Putnam-Loveland-Logeman (DPLL) algorithm, perform a systematic search for a solution, through a sequence of trials and errors represented by a search tree. In the present study, we identify, using theory and numerical experiments, easy (size of the search tree scaling polynomially with N) and hard (exponential scaling) regimes as a function of the ratio alpha of constraints per variable. The typical complexity is explicitly calculated in the different regimes, in very good agreement with numerical simulations. Our theoretical approach is based on the analysis of the growth of the branches in the search tree under the operation of DPLL. On each branch, the initial 3-SAT problem is dynamically turned into a more generic 2+p-SAT problem, where p and 1-p are the fractions of constraints involving three and two variables respectively. The growth of each branch is monitored by the dynamical evolution of alpha and p and is represented by a trajectory in the static phase diagram of the random 2+p-SAT problem. Depending on whether or not the trajectories cross the boundary between phases, single branches or full trees are generated by DPLL, resulting in easy or hard resolutions.

“Analysis Of The Computational Complexity Of Solving Random Satisfiability Problems Using Branch And Bound Search Algorithms” Metadata:

  • Title: ➤  Analysis Of The Computational Complexity Of Solving Random Satisfiability Problems Using Branch And Bound Search Algorithms
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 22.36 Mbs, the file-s for this book were downloaded 79 times, the file-s went public at Wed Sep 18 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Analysis Of The Computational Complexity Of Solving Random Satisfiability Problems Using Branch And Bound Search Algorithms at online marketplaces:


40Computational Complexity Of Arranging Music

By

This paper proves that arrangement of music is NP-hard when subject to various constraints: avoiding musical dissonance, limiting how many notes can be played simultaneously, and limiting transition speed between chords. These results imply the computational complexity of related musical problems, including musical choreography and rhythm games.

“Computational Complexity Of Arranging Music” Metadata:

  • Title: ➤  Computational Complexity Of Arranging Music
  • Authors:

“Computational Complexity Of Arranging Music” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.63 Mbs, the file-s for this book were downloaded 39 times, the file-s went public at Fri Jun 29 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find Computational Complexity Of Arranging Music at online marketplaces:


41Some Elementary Rigorous Remark About The Replica Formalism In The Statistical Physics' Approach To Threshold Phenomena In Computational Complexity Theory

By

Some elementary rigorous remark about the replica formalism in the Statistical Physics' approach to threshold phenomena in Computational Complexity Theory is presented.

“Some Elementary Rigorous Remark About The Replica Formalism In The Statistical Physics' Approach To Threshold Phenomena In Computational Complexity Theory” Metadata:

  • Title: ➤  Some Elementary Rigorous Remark About The Replica Formalism In The Statistical Physics' Approach To Threshold Phenomena In Computational Complexity Theory
  • Author:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 2.55 Mbs, the file-s for this book were downloaded 53 times, the file-s went public at Wed Sep 18 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Some Elementary Rigorous Remark About The Replica Formalism In The Statistical Physics' Approach To Threshold Phenomena In Computational Complexity Theory at online marketplaces:


42Computational Complexity Measures Of Multipartite Quantum Entanglement

By

We shed new light on entanglement measures in multipartite quantum systems by taking a computational-complexity approach toward quantifying quantum entanglement with two familiar notions--approximability and distinguishability. Built upon the formal treatment of partial separability, we measure the complexity of an entangled quantum state by determining (i) how hard to approximate it from a fixed classical state and (ii) how hard to distinguish it from all partially separable states. We further consider the Kolmogorovian-style descriptive complexity of approximation and distinction of partial entanglement.

“Computational Complexity Measures Of Multipartite Quantum Entanglement” Metadata:

  • Title: ➤  Computational Complexity Measures Of Multipartite Quantum Entanglement
  • Author:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 6.50 Mbs, the file-s for this book were downloaded 74 times, the file-s went public at Sun Sep 22 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Computational Complexity Measures Of Multipartite Quantum Entanglement at online marketplaces:


43The Computational Complexity Of Truthfulness In Combinatorial Auctions

By

One of the fundamental questions of Algorithmic Mechanism Design is whether there exists an inherent clash between truthfulness and computational tractability: in particular, whether polynomial-time truthful mechanisms for combinatorial auctions are provably weaker in terms of approximation ratio than non-truthful ones. This question was very recently answered for universally truthful mechanisms for combinatorial auctions \cite{D11}, and even for truthful-in-expectation mechanisms \cite{DughmiV11}. However, both of these results are based on information-theoretic arguments for valuations given by a value oracle, and leave open the possibility of polynomial-time truthful mechanisms for succinctly described classes of valuations. This paper is the first to prove {\em computational hardness} results for truthful mechanisms for combinatorial auctions with succinctly described valuations. We prove that there is a class of succinctly represented submodular valuations for which no deterministic truthful mechanism provides an $m^{1/2-\epsilon}$-approximation for a constant $\epsilon>0$, unless $NP=RP$ ($m$ denotes the number of items). Furthermore, we prove that even truthful-in-expectation mechanisms cannot approximate combinatorial auctions with certain succinctly described submodular valuations better than within $n^\gamma$, where $n$ is the number of bidders and $\gamma>0$ some absolute constant, unless $NP \subseteq P/poly$. In addition, we prove computational hardness results for two related problems.

“The Computational Complexity Of Truthfulness In Combinatorial Auctions” Metadata:

  • Title: ➤  The Computational Complexity Of Truthfulness In Combinatorial Auctions
  • Authors:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 17.00 Mbs, the file-s for this book were downloaded 81 times, the file-s went public at Mon Sep 23 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find The Computational Complexity Of Truthfulness In Combinatorial Auctions at online marketplaces:


44Computational Complexity Of Sequential And Parallel Algorithms

By

One of the fundamental questions of Algorithmic Mechanism Design is whether there exists an inherent clash between truthfulness and computational tractability: in particular, whether polynomial-time truthful mechanisms for combinatorial auctions are provably weaker in terms of approximation ratio than non-truthful ones. This question was very recently answered for universally truthful mechanisms for combinatorial auctions \cite{D11}, and even for truthful-in-expectation mechanisms \cite{DughmiV11}. However, both of these results are based on information-theoretic arguments for valuations given by a value oracle, and leave open the possibility of polynomial-time truthful mechanisms for succinctly described classes of valuations. This paper is the first to prove {\em computational hardness} results for truthful mechanisms for combinatorial auctions with succinctly described valuations. We prove that there is a class of succinctly represented submodular valuations for which no deterministic truthful mechanism provides an $m^{1/2-\epsilon}$-approximation for a constant $\epsilon>0$, unless $NP=RP$ ($m$ denotes the number of items). Furthermore, we prove that even truthful-in-expectation mechanisms cannot approximate combinatorial auctions with certain succinctly described submodular valuations better than within $n^\gamma$, where $n$ is the number of bidders and $\gamma>0$ some absolute constant, unless $NP \subseteq P/poly$. In addition, we prove computational hardness results for two related problems.

“Computational Complexity Of Sequential And Parallel Algorithms” Metadata:

  • Title: ➤  Computational Complexity Of Sequential And Parallel Algorithms
  • Author:
  • Language: English

“Computational Complexity Of Sequential And Parallel Algorithms” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 624.54 Mbs, the file-s for this book were downloaded 77 times, the file-s went public at Fri Nov 16 2018.

Available formats:
ACS Encrypted EPUB - ACS Encrypted PDF - Abbyy GZ - Cloth Cover Detection Log - Contents - DjVuTXT - Djvu XML - Dublin Core - Item Tile - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - Log - MARC - MARC Binary - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find Computational Complexity Of Sequential And Parallel Algorithms at online marketplaces:


45Social Choice, Computational Complexity, Gaussian Geometry, And Boolean Functions

By

We describe a web of connections between the following topics: the mathematical theory of voting and social choice; the computational complexity of the Maximum Cut problem; the Gaussian Isoperimetric Inequality and Borell's generalization thereof; the Hypercontractive Inequality of Bonami; and, the analysis of Boolean functions. A major theme is the technique of reducing inequalities about Gaussian functions to inequalities about Boolean functions f : {-1,1}^n -> {-1,1}, and then using induction on n to further reduce to inequalities about functions f : {-1,1} -> {-1,1}. We especially highlight De, Mossel, and Neeman's recent use of this technique to prove the Majority Is Stablest Theorem and Borell's Isoperimetric Inequality simultaneously.

“Social Choice, Computational Complexity, Gaussian Geometry, And Boolean Functions” Metadata:

  • Title: ➤  Social Choice, Computational Complexity, Gaussian Geometry, And Boolean Functions
  • Author:

“Social Choice, Computational Complexity, Gaussian Geometry, And Boolean Functions” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.59 Mbs, the file-s for this book were downloaded 19 times, the file-s went public at Sat Jun 30 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find Social Choice, Computational Complexity, Gaussian Geometry, And Boolean Functions at online marketplaces:


46The Computational Complexity Of Sandpiles

We describe a web of connections between the following topics: the mathematical theory of voting and social choice; the computational complexity of the Maximum Cut problem; the Gaussian Isoperimetric Inequality and Borell's generalization thereof; the Hypercontractive Inequality of Bonami; and, the analysis of Boolean functions. A major theme is the technique of reducing inequalities about Gaussian functions to inequalities about Boolean functions f : {-1,1}^n -> {-1,1}, and then using induction on n to further reduce to inequalities about functions f : {-1,1} -> {-1,1}. We especially highlight De, Mossel, and Neeman's recent use of this technique to prove the Majority Is Stablest Theorem and Borell's Isoperimetric Inequality simultaneously.

“The Computational Complexity Of Sandpiles” Metadata:

  • Title: ➤  The Computational Complexity Of Sandpiles

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 9.75 Mbs, the file-s for this book were downloaded 65 times, the file-s went public at Sat Sep 21 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find The Computational Complexity Of Sandpiles at online marketplaces:


47On The Computational Complexity Of Minimum-concave-cost Flow In A Two-dimensional Grid

By

We study the minimum-concave-cost flow problem on a two-dimensional grid. We characterize the computational complexity of this problem based on the number of rows and columns of the grid, the number of different capacities over all arcs, and the location of sources and sinks. The concave cost over each arc is assumed to be evaluated through an oracle machine, i.e., the oracle machine returns the cost over an arc in a single computational step, given the flow value and the arc index. We propose an algorithm whose running time is polynomial in the number of columns of the grid, for the following cases: (1) the grid has a constant number of rows, a constant number of different capacities over all arcs, and sources and sinks in at most two rows; (2) the grid has two rows and a constant number of different capacities over all arcs connecting rows; (3) the grid has a constant number of rows and all sources in one row, with infinite capacity over each arc. These are presumably the most general polynomially solvable cases, since we show the problem becomes NP-hard when any condition in these cases is removed. Our results apply to abundant variants and generalizations of the dynamic lot sizing model, and answer several questions raised in serial supply chain optimization.

“On The Computational Complexity Of Minimum-concave-cost Flow In A Two-dimensional Grid” Metadata:

  • Title: ➤  On The Computational Complexity Of Minimum-concave-cost Flow In A Two-dimensional Grid
  • Authors:

“On The Computational Complexity Of Minimum-concave-cost Flow In A Two-dimensional Grid” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.60 Mbs, the file-s for this book were downloaded 17 times, the file-s went public at Fri Jun 29 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find On The Computational Complexity Of Minimum-concave-cost Flow In A Two-dimensional Grid at online marketplaces:


48High-order Time Stepping For The Navier-Stokes Equations With Minimal Computational Complexity

By

In this paper we present extensions of the schemes proposed in \cite{GM14} that lead to a decoupling of the velocity components in the momentum equation. The new schemes reduce the solution of the incompressible Navier-Stokes equations to a set of classical uncoupled parabolic problems for each Cartesian component of the velocity. The pressure is explicitly recovered after the velocity is computed.

“High-order Time Stepping For The Navier-Stokes Equations With Minimal Computational Complexity” Metadata:

  • Title: ➤  High-order Time Stepping For The Navier-Stokes Equations With Minimal Computational Complexity
  • Authors:

“High-order Time Stepping For The Navier-Stokes Equations With Minimal Computational Complexity” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 0.26 Mbs, the file-s for this book were downloaded 18 times, the file-s went public at Fri Jun 29 2018.

Available formats:
Archive BitTorrent - Metadata - Text PDF -

Related Links:

Online Marketplaces

Find High-order Time Stepping For The Navier-Stokes Equations With Minimal Computational Complexity at online marketplaces:


49Duality Gap, Computational Complexity And NP Completeness: A Survey

By

We survey research that studies the connection between the computational complexity of optimization problems on the one hand, and the duality gap between the primal and dual optimization problems on the other. To our knowledge, this is the first survey that connects the two very important areas. We further look at a similar phenomenon in finite model theory relating to complexity and optimization.

“Duality Gap, Computational Complexity And NP Completeness: A Survey” Metadata:

  • Title: ➤  Duality Gap, Computational Complexity And NP Completeness: A Survey
  • Author:
  • Language: English

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 7.03 Mbs, the file-s for this book were downloaded 66 times, the file-s went public at Mon Sep 23 2013.

Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Duality Gap, Computational Complexity And NP Completeness: A Survey at online marketplaces:


50The Computational Complexity Of Machine Learning

By

We survey research that studies the connection between the computational complexity of optimization problems on the one hand, and the duality gap between the primal and dual optimization problems on the other. To our knowledge, this is the first survey that connects the two very important areas. We further look at a similar phenomenon in finite model theory relating to complexity and optimization.

“The Computational Complexity Of Machine Learning” Metadata:

  • Title: ➤  The Computational Complexity Of Machine Learning
  • Author:
  • Language: English

“The Computational Complexity Of Machine Learning” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 230.36 Mbs, the file-s for this book were downloaded 95 times, the file-s went public at Mon May 21 2012.

Available formats:
ACS Encrypted PDF - Abbyy GZ - Animated GIF - Cloth Cover Detection Log - DjVuTXT - Djvu XML - Dublin Core - EPUB - Item Tile - JSON - LCP Encrypted EPUB - LCP Encrypted PDF - MARC - MARC Binary - MARC Source - Metadata - Metadata Log - OCLC xISBN JSON - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Original JP2 Tar - Single Page Processed JP2 ZIP - Text PDF - WARC CDX Index - Web ARChive GZ - chOCR - hOCR -

Related Links:

Online Marketplaces

Find The Computational Complexity Of Machine Learning at online marketplaces:


Buy “Computational Complexity” online:

Shop for “Computational Complexity” on popular online marketplaces.