Computational complexity theory

Results: 2049



#Item
941Structure / Entertainment / Computational complexity theory / Complexity / Isorhythm / Repetition / Process music / P / Music theory / Music / Rhythm / Complex systems theory

This article was downloaded by:[University of Western Sydney] On: 21 June 2008 Access Details: [subscription number[removed]Publisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Number: 10

Add to Reading List

Source URL: katestevens.weebly.com

Language: English - Date: 2010-09-25 05:12:25
942Applied mathematics / L / Time complexity / P / FO / NC / Theoretical computer science / Computational complexity theory / Complexity classes

Vol. 00 no[removed]Pages 1–3 BIOINFORMATICS Supplementary Material for TFBS Identification Based on Genetic Algorithm with

Add to Reading List

Source URL: www.cse.cuhk.edu.hk

Language: English - Date: 2007-10-26 00:26:46
943Theoretical computer science / Applied mathematics / Greedy algorithm / Operations research / Mathematical optimization / How to Solve It / Computational complexity theory / Mathematics / Algorithm / Mathematical logic

Secrets of the Mathematical Contest in Modeling

Add to Reading List

Source URL: www.carroll.edu

Language: English - Date: 2011-03-24 13:17:30
944Probabilistic complexity theory / Computational complexity theory / Mathematical optimization / Structural complexity theory / NP-complete / Complexity / NP / P versus NP problem / Probabilistically checkable proof / Theoretical computer science / Applied mathematics / Complexity classes

1 A brief overview of Complexity Theory The following brief overview is intended as a teaser for students in an introductory course on Complexity Theory. Out of the tough came forth sweetness1

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2014-06-22 06:25:17
945Complexity classes / Cryptographic protocols / Probabilistic complexity theory / Zero-knowledge proof / Interactive proof system / IP / NP / Secret sharing / Randomized algorithm / Theoretical computer science / Computational complexity theory / Applied mathematics

From Statistical Zero Knowledge to Secret Sharing Vinod Vaikuntanathan∗ MIT CSAIL Prashant Nalini Vasudevan†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 23:55:10
946Computational complexity theory / Probabilistic complexity theory / Analysis of algorithms / Randomized algorithm / Communication complexity / Factorial / Logarithm / SL / Random self-reducibility / Theoretical computer science / Mathematics / Applied mathematics

The space complexity of approximating the frequency moments Noga Alon † Yossi Matias

Add to Reading List

Source URL: www.tau.ac.il

Language: English - Date: 2002-02-21 20:13:33
947Mathematics / Theoretical computer science / Information / Information theory / Computational complexity theory / List decoding / Concatenated error correction code / BCH code / Chernoff bound / Coding theory / Error detection and correction / Finite fields

On collusion-secure codes for copyright protection Hans Georg Schaathun Abstract With a digital fingerprinting scheme a vendor of digital copies of copyrighted material marks each individual copy with a unique fingerprin

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2004-12-12 14:20:25
948Cognitive science / Human–machine interaction / Switch / Mental model / Network switch / Computational complexity theory / Problem solving / Ethology / Mind / Information

Synthetic Reasoning and the Reverse Engineering of Boolean Circuits N. Y. Louis Lee ([removed]) Department of Psychology, Princeton University Princeton, NJ[removed]USA P. N. Johnson-Laird (phil@princeton

Add to Reading List

Source URL: mentalmodels.princeton.edu

Language: English - Date: 2012-06-14 22:38:47
949Digital circuits / Pseudorandomness / Circuit complexity / Electronic engineering / NC / Circuit / Electronic circuit / Boolean circuit / State / Theoretical computer science / Applied mathematics / Computational complexity theory

Private Circuits: Securing Hardware against Probing Attacks Yuval Ishai1 , Amit Sahai2 , and David Wagner3 1 Technion — Israel Institute of Technology,? [removed]

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
UPDATE