Academia.eduAcademia.edu

Computational Complexity

20,528 papers
67,287 followers
AI Powered
Computational Complexity is a branch of computer science that studies the resources required to solve computational problems, particularly in terms of time and space. It classifies problems based on their inherent difficulty and the efficiency of algorithms, often using complexity classes such as P, NP, and NP-complete to categorize problem-solving capabilities.
Currently in most global meteorological applications, low-order finite difference or finite element methods, or the spectral transform method are used. The spectral transform method, which yields high-order approximations, requires... more
A thesis submitted in conformity wit h the requirements for the degree of Master of Science Graduate Department of Computer Science University of Toronto Copyright @ 2000 by Kit Sun Ng The author has gcanted a nonexclusive licence dîowing... more
In Ramsey theory, very large numbers and fast-growing functions are more of a rule than an exception. The classical Ramsey numbers R(n,m) are known to be of exponential size: the original proof directly gives the upper bound R(n,m) ≤ (... more
A reconfigurable space-time coding technique is investigated, for a high-speed downlink packet access multiple-antenna network, which combats the effects of antenna correlation. Reconfigurability is achieved at the link level by... more
Mobility tracking based on data from wireless cellular networks is a key challenge that has been recently investigated both from a theoretical and practical point of view. This paper proposes Monte Carlo techniques for mobility tracking... more
Evolutionary data has been traditionally modeled via phylogenetic trees; however, branching alone cannot model conflicting phylogenetic signals, so networks are used instead. Ancestral recombination graphs (ARGs) are used to model the... more
An extractor is a function that receives some randomness and either "improves" it or produces "new" randomness. There are statistical and algorithmical specifications of this notion. We study an algorithmical one called Kolmogorov... more
Purpose Mesh Parameterization is central to reverse engineering, tool path planning, etc. This work synthesizes parameterizations with un-constrained borders, overall minimum angle plus area distortion. This study aims to present an... more
Face Recognition plays a major role in Biometrics. Feature selection is a measure issue in face recognition. This paper proposes a survey on face recognition. There are many methods to extract face features. In some advanced methods it... more
In orthogonal frequency division multiplexing (OFDM), carrier frequency offset (CFO) must be mitigated since it generates interference between received symbols transmitted through different sub-carriers. This paper presents a new... more
This article presents a low-complexity parametric algorithm for the estimation of the carrier frequency offset (CFO) in orthogonal frequency division multiplexing systems. The proposed algorithm is equivalent to the Unitary ESPRIT... more
This work presents a new version, with reduced computational complexity, of the covariance-based direction-of-arrival (CB-DoA) algorithm. The new algorithm incorporates the concept of beamspace projection before performing the DoA... more
We consider multicarrier transmission schemes in which the elementary signal pulses relate to the elements of a Weyl-Heisenberg system, i.e., resulting from a prototype function shifted in time and frequency. The overlapping of the... more
One of the most popular clustering techniques is the k-means clustering algorithm. However, the utilization of the k-means is severely limited by its high computational complexity. In this study, we propose a new strategy to accelerate... more
Transcoding is a fast technique for video adaptation, which offers great flexibility for changing the characteristics of already coded video sequences in order to match the properties of the terminal display devices and the bandwidth... more
In this paper, efficient solutions for requantization transcoding in H.264/AVC are presented. By requantizing residual coefficients in the bitstream, different error components can appear in the transcoded video stream. Firstly, a... more
In this paper, we discuss motion-refined rewriting of single-layer H.264/AVC streams to SVC streams with multiple quality layers. First, we elaborate on techniques we developed for efficient rewriting of residual data from H.264/AVC to... more
D'Agostino et al. recently launched book in the College Publication series on Logic and Bounded Rationality is reviewed. Applications to human-oriented AI are emphasized.
Control systems that help the driver avoid accidents, or limit the damage in case of an accident, have become ubiquitous in modern passenger cars. For example, new cars typically have an anti-lock braking system (ABS), which prevents the... more
machine-independent) complexity theory is basically a theory which establishes limits on what may be said about the complexity of specific recursive functions. (For example, the speed-up theorem shows that it is not always possible to... more
The main result of this paper is that, given a Turing machine with several readwrite heads per tape, one can effectively construct an equivalent multitape Turing machine with a single read-write head per tape, which runs at precisely the... more
Width parameterizations of SAT, such as tree-width and path-width, enable the study of computationally more tractable and practical SAT instances. We give two simple algorithms. One that runs simultaneously in time-space O * (2 2T W(φ) ),... more
We give new characterizations and lower bounds relating classes in the communication complexity polynomial hierarchy and circuit complexity to limited memory communication models. We introduce the notion of rectangle overlay complexity of... more
In this paper, we show that it is possible to accomplish belief revision in any logic which is translatable to classical logic. We give the example of the propositional modal logic K and show that a belief operation in K dened in terms of... more
Resumo. Neste trabalho, mostramos que o reticulado Λ D obtido via Construção D a partir de uma cadeia de códigos lineares q-ários é igual ao reticulado qΛ * D ⊥ , onde Λ D ⊥ é o reticulado obtido via Construção D a partir da cadeia de... more
Parametric coding is a technique in which data is processed to extract meaningful information and then representing it compactly using appropriate parameters. Parametric Coding exploits redundancy in information to provide a very compact... more
Digital twins are enjoying widespread and growing success in both theoretical and practical applications. A recent development that is gaining increasing traction is the application of digital twins to cities. The aim of this article is... more
In this paper we analyze the notion of "stopping time complexity", the amount of information needed to specify when to stop while reading an infinite sequence. This notion was introduced by Vovk and Pavlovic . It turns out that plain... more
The signature recognition is a topic of intensive research due to its great importance, among others, in the financial system. However it does not exist yet an enough reliable method for signature recognition and verification, especially... more
The signature recognition is a topic of intensive research due to its great importance, among others, in the financial system. However it does not exist yet an enough reliable method for signature recognition and verification, especially... more
Antunes, Fortnow, van Melkebeek and Vinodchandran captured the notion of non-random information by computational depth, the difference between the polynomialtime-bounded Kolmogorov complexity and traditional Kolmogorov complexity. We show... more
Esta obra colectiva tiene como objetivo explorar las posibilidades epistemológicas y metodológicas de la sociología computacional a través de estudios de caso, reflexiones teóricas y propuestas aplicadas. El enfoque central del libro se... more
This paper presents an informative gene set selection approach to tumor diagnosis based on the Distance Sensitive Rival Penalized Competitive Learning (DSRPCL) algorithm and redundancy analysis. Since the DSRPCL algorithm can allocate an... more
Physical-based control using center of mass, center of pressure, and foot placement is used to enable a simulated twelve -degree of freedom, seven-link, three-dimensional bipedal robot to lean sideways, pick up its foot and start walking... more
This paper presents an approximate Maximum Common Subgraph (MCS) algorithm, specifically for directed, cyclic graphs representing digital circuits. Because of the application domain, the graphs have nice properties: they are very sparse;... more
For many systems of realistic size the computational complexity of complete model-based diagnosis is prohibitive. In order to overcome this computational hurdle, approximation-based approaches do not solve the complete problem, but... more
We investigate the concepts of analyticity, a priori and necessity, propose a new theory based on computability and logicism and critically examine some standard arguments against the analytic vs. synthetic distinction and against... more
In this paper we investigate the training of time-lagged recurrent networks having multiple feedback paths and tapped-delay inputs. Network structures of this type are useful in approximating nonlinear dynamical systems. The introduction... more
Chordal graphs, which are intersection graph of subtrees of a tree, can be represented on trees. Some representation of a chordal graph often reduces the size of the data structure needed to store the graph, permitting the use of... more
For building a linear prediction model, Backward Elimination (BE) is a computationally suitable stepwise procedure for sequencing the candidate predictors. This method yields poor results when data contain outliers and other... more
Statistical data used in the analysis of environmental problems are very often presented in an imprecise way. We make a distinction between random uncertainty that can be described by stochastic models and linguistic lack of precision... more
Competent Genetic Algorithms can efficiently address problems in which the linkage between variables is limited to a small order k. Problems with higher order dependencies can only be addressed efficiently if further problem properties... more
In this paper, we develop a discrete wavelet Petrov–Galerkin method for integral equations of the second kind with weakly singular kernels suitable for solving boundary integral equations. A compression strategy for the design of a fast... more
We consider the problem of finding optimal, fair and distributed power-rate strategies to achieve the sum capacity of the Gaussian multiple-access block-fading channel. In here, the transmitters have access to only their own fading... more
In this paper, we present an efficient complex event processing system tailored toward monitoring a large-scale setup of manufacturing equipment. In particular, the key challenge in the equipment monitoring is to develop an eventbased... more
In this paper, we derive an analytical model for the evaluation of the performance of a Video on Demand (VoD) system. The model estimates the mean waiting time achievable by the Popularity-Aware Partial cAching (PAPA) algorithm from our... more