Academia.eduAcademia.edu

Computational Complexity

20,598 papers
68,204 followers
AI Powered
Computational Complexity is a branch of computer science that studies the resources required to solve computational problems, particularly in terms of time and space. It classifies problems based on their inherent difficulty and the efficiency of algorithms, often using complexity classes such as P, NP, and NP-complete to categorize problem-solving capabilities.
The Vassiliev conjecture states that the Vassiliev invariants are dense in the space of all numerical link invariants in the sense that any link invariant is a pointwise limit of Vassiliev invariants. In this article, we prove that the... more
In this paper, a uniform approach to maximal permissiveness in modular control of discrete-event systems is proposed. It is based on three important concepts of modular closed-loops: monotonicity, distributivity, and exchangeability.... more
For supervisory control of large-scale modular DES the possibility of performing control-related computation locally (in components) is of utmost importance to computational complexity. Unlike our previous results, where the specification... more
Modular supervisory control of discrete-event systems (DES), where the global DES is composed of local components that run concurrently, is considered. For supervisory control of large-scale modular DES the possibility of performing... more
Control of modular and distributed discrete-event systems appears as an approach to handle computational complexity of synthesizing supervisory controllers for large scale systems. For both modular and distributed discrete-event systems... more
A design procedure for frequency-response masking (FRM) prototype filters of cosine-modulated filter banks (CMFBs) is proposed. In the given method, we perform minimization of the maximum attenuation level in the filter's stopband,... more
This paper presents an extension of Observer Theory within the context of the Ruliad, using a mathematically rigorous formalization with category theory as the unifying framework. This paper demonstrates how the interaction between... more
This is a philosophical paper. It claims that there is a gap to be filled in the relationship between complexity theory (CT) and quantum theory (QT). This gap concerns two very distinct understandings of time. The paper provides the... more
As ecologists and foresters produce an increasing range of probabilistic data, mathematical techniques that address the fundamental interactions between stochastic events and spatial landscape features have the potential to provide... more
Cost control for the Internet access providers (AP) influences not only the nominal speeds offered to the customers, but also other, more controversial, policies related to traffic shaping and discrimination. Given that the cost for the... more
Smart antenna is recognized as promising technologies for higher user capacity in 3G wireless networks by effectively reducing multipath and co-channel interference. Advent of powerful, low-cost, digital processing components and the... more
This paper investigates the computational complexity of approximating several NPoptimization problems using the number of queries to an NP oracle as a complexity measure. The results show a trade-off between the closeness of the... more
We show that any 1-round 2-server Private Information Retrieval Protocol where the answers are 1-bit long must ask questions that are at least n -2 bits long, which is nearly equal to the known n -1 upper bound. This improves upon the... more
The paper considers scheduling problems for parallel dedicated machines subject to resource constraints. A fairly complete computational complexity classiÿcation is obtained, a number of polynomial-time algorithms are designed. For the... more
Green manufacturing is the process of producing product by minimizing natural resource use, reducing environmental pollution or wastes. Garment industry in Bangladesh plays a vital role in the country's economy. But most of these... more
In this paper a government form is modeled as an effectivity function scheme (EFS) i.e. a parameterized family of effectivity functions having admissible (strong) weight-profiles as the relevant parameters. Working in a 2-jurisdiction... more
Owing to numerous potential applications, wireless sensor networks have been attracting significant research effort recently. The critical challenge that wireless sensor networks often face is to sustain long-term operation on limited... more
Viewing Dehn's algorithm as a rewriting system, we generalise to allow an alphabet containing letters which do not necessarily represent group elements. This extends the class of groups for which the algorithm solves the word problem to... more
Viewing Dehn's algorithm as a rewriting system, we generalise to allow an alphabet containing letters which do not necessarily represent group elements. This extends the class of groups for which the algorithm solves the word problem to... more
This paper presents a unified theoretical framework that derives classical, quantum, and relativistic physics from the first principles of conscious observation and resonance coherence, formally integrating these into the Omniological... more
We present a stochastic approach for solving the quantumkinetic equation introduced in Part I. A Monte Carlo method based on backward time evolution of the numerical trajectories is developed. The computational complexity and the... more
The in ation GI of a graph G is the line graph of the subdivision of G. If G is a complete graph the equality ir(GI) = (GI) was proved by Favaron in 1998. We conjectured that the equality holds when G is any graph of radius 1. But it... more
We investigate the computational complexity of deciding the occurrence of many different dynamical behaviours in reaction systems, with an emphasis on biologically relevant problems (i.e., existence of fixed points and fixed point... more
on computers. Indeed, computer simulations and practical applications of CA usually take place in these subspaces. The second origin is connected to the question of suitability of the classical Cantor topology for the study of chaotic... more
This paper presents a novel approach to data classification using polymorphic graph computing, which self-organizes at runtime during both training and inference. Inspired by biological neural networks, the proposed class of classifiers... more
In this paper we are proposing an interleaver design i.e. power rotational interleaver. The basic purpose of this design is to reduce the bandwidth occupied by the interleaver. This approach provides an efficient result for multiple... more
Web spam is a big challenge for quality of search engine results. It is very important for search engines to detect web spam accurately. In this paper we present 32 low cost quality factors to classify spam and ham pages on real time... more
The Stop Number Problem arises in the management of a dial-a-ride system served by a fleet of autonomous electric vehicles. In such a system, clients request for a ride from an origin station to a destination station, and a fleet of... more
We give the basic properties of discrete convolution in the space of complexity functions and its dual space. Two inequalities are identified, and defined in the general context of an arbitrary binary operation in any weighted... more
In this paper, the problem of maximizing the number of active users satisfying a required quality of service (QoS) in n-user interference channels is investigated. This problem is known as an NP-complete problem. We introduce an efficient... more
This paper proposes a traffic model and a parameter fitting procedure that are capable of achieving accurate prediction of the queuing behavior for IP traffic exhibiting long-range dependence. The modeling process is a discrete-time batch... more
Brain Computer Interface (BCI) systems translate brain rhythms into signals comprehensible by computers. BCI has numerous applications in the clinical domain, the computer gaming, and the military. Real-time analysis of single trial brain... more
Context-based Adaptive Binary Arithmetic Coder (CABAC) is the advanced entropy coding tool employed by main and higher profiles of H.264/AVC. In these applications, hardware acceleration is needed as the computational load of CABAC is... more
Abstract—The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the... more
When numerical simulations are time consuming, the simulator is replaced by a simple (meta-)model which approximates its behavior. This surrogate model is adjusted on a set of carefully chosen computer experiments, or Design of... more
Justification Logic is an emerging field that studies provability, knowledge, and belief via explicit proofs or justifications that are part of the language. There exist many justification logics closely related to modal epistemic logics... more
We first show that the optimal and undominated outcomes of an unconstrained (and possibly cyclic) CP-net are the solutions of a set of hard constraints. We then propose a new algorithm for finding the optimal outcomes of a constrained... more
We show that any two pseudoconfigurations of n points in general position in the plane are transformable into each other by a finite sequence of elementary transformations of two types, generalizing a theorem of Ringel. This result is... more
We show that any two pseudoconfigurations of n points in general position in the plane are transformable into each other by a finite sequence of elementary transformations of two types, generalizing a theorem of Ringel. This result is... more
Game boards are described in the Ludii general game system by their underlying graphs, based on tiling, shape and graph operators, with the automatic detection of important properties such as topological relationships between graph... more
Clustering techniques are very attractive for identifying and extracting patterns of interests from datasets. However, their application to very large spatial datasets presents numerous challenges such as high-dimensionality,... more
We propose a unified formalism that identifies the event horizon, the Riemann Hypothesis critical line, and symbolic resonance collapse as structurally equivalent phenomena marking the transition from quantized identity to continuous... more
The problem addressed in this work is that of enhancing speech signals corrupted by additive noise and improving the performance of automatic speech recognizers in noisy conditions. The enhanced speech signals can also improve the... more
A critique of attempts to define biological life in terms of information theory.
We present a formal synthesis between Möbius Collapse Logic (MCL) and the Entropic Resonance framework. While MCL models computation as a topological field collapse structured by resonance weight hierarchies and Möbius... more