Search results for " complexity."

showing 10 items of 603 documents

Forbidden Factors and Fragment Assembly

2001

In this paper methods and results related to the notion of minimal forbidden words are applied to the fragment assembly problem. The fragment assembly problem can be formulated, in its simplest form, as follows: reconstruct a word w from a given set I of substrings (fragments ) of a word w . We introduce an hypothesis involving the set of fragments I and the maximal length m(w) of the minimal forbidden factors of w . Such hypothesis allows us to reconstruct uniquely the word w from the set I in linear time. We prove also that, if w is a word randomly generated by a memoryless source with identical symbol probabilities, m(w) is logarithmic with respect to the size of w . This result shows th…

CombinatoricsSet (abstract data type)Fragment (logic)LogarithmDeterministic automatonSymbol (programming)General MathematicsTime complexitySoftwareWord (computer architecture)SubstringComputer Science ApplicationsMathematicsRAIRO - Theoretical Informatics and Applications
researchProduct

O(n 2 log n) Time On-Line Construction of Two-Dimensional Suffix Trees

2005

The two-dimensional suffix tree of an n × n square matrix A is a compacted trie that represents all square submatrices of Ai¾?[9]. For the off-line case, i.e., A is given in advance to the algorithm, it is known how to build it in optimal time, for any type of alphabet sizei¾?[9,15]. Motivated by applications in Image Compressioni¾?[18], Giancarlo and Guaianai¾?[12] considered the on-line version of the two-dimensional suffix tree and presented an On2log2n-time algorithm, which we refer to as GG. That algorithm is a non-trivial generalization of Ukkonen's on-line algorithm for standard suffix trees [19]. The main contribution in this paper is an Olog n factor improvement in the time complex…

CombinatoricsSet (abstract data type)lawSuffix treeTrieGeneralized suffix treeBlock matrixUkkonen's algorithmSuffixTime complexityMathematicslaw.invention
researchProduct

Entropic Profiles, Maximal Motifs and the Discovery of Significant Repetitions in Genomic Sequences

2014

The degree of predictability of a sequence can be measured by its entropy and it is closely related to its repetitiveness and compressibility. Entropic profiles are useful tools to study the under- and over-representation of subsequences, providing also information about the scale of each conserved DNA region. On the other hand, compact classes of repetitive motifs, such as maximal motifs, have been proved to be useful for the identification of significant repetitions and for the compression of biological sequences. In this paper we show that there is a relationship between entropic profiles and maximal motifs, and in particular we prove that the former are a subset of the latter. As a furt…

CombinatoricsSpeedupSettore INF/01 - InformaticaLinear spacePattern discovery maximal motifsEntropy (information theory)PredictabilityTime complexityMathematics
researchProduct

Quantum Identification of Boolean Oracles

2004

The oracle identification problem (OIP) is, given a set S of M Boolean oracles out of 2 N ones, to determine which oracle in S is the current black-box oracle. We can exploit the information that candidates of the current oracle is restricted to S. The OIP contains several concrete problems such as the original Grover search and the Bernstein-Vazirani problem. Our interest is in the quantum query complexity, for which we present several upper bounds. They are quite general and mostly optimal: (i) The query complexity of OIP is \(O(\sqrt{N {\rm log} M {\rm log} N}{\rm log log} M)\) for anyS such that M = |S| > N, which is better than the obvious bound N if M \(< 2^{N/log^3 N}\). (ii) It is \…

CombinatoricsStatistics::TheoryLog-log plotTheoryofComputation_GENERALQuantum walkQuantum algorithmComputer Science::Computational ComplexityBoolean functionUpper and lower boundsOracleQuantum computerMathematicsRandom oracle
researchProduct

A Guaranteed performance of a green data center based on the contribution of vital nodes

2016

International audience; In order to satisfy the need for the critical computing resources, many data center architectures proposed to house a huge number of network devices. These devices are used to achieve the highest performance in case of full utilization of the network. However, the peak capacity of the network is rarely reached. Consequently, many devices are set into idle state and cause a huge energy waste leading to a non-proportionality between the network load and the energy consumed. In this paper, we propose a power-aware routing algorithm that saves energy consumption with a negligible trade-off on the performance of the network. The idea is to keep active only the source and …

Computation timeComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Network02 engineering and technology01 natural sciences7. Clean energySet (abstract data type)Idle[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][ SPI.NRJ ] Engineering Sciences [physics]/Electric powerenergy savingEnergy saving0103 physical sciences0202 electrical engineering electronic engineering information engineeringTime complexity010302 applied physicsEnergy[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryvital nodes[SPI.NRJ]Engineering Sciences [physics]/Electric powercomputation timeVital nodes020206 networking & telecommunicationsEnergy consumptionData center networkNetworking hardwareState (computer science)businessEnergy (signal processing)[SPI.NRJ] Engineering Sciences [physics]/Electric powerComputer network
researchProduct

On the Computational Complexity of Binary and Analog Symmetric Hopfield Nets

2000

We investigate the computational properties of finite binary- and analog-state discrete-time symmetric Hopfield nets. For binary networks, we obtain a simulation of convergent asymmetric networks by symmetric networks with only a linear increase in network size and computation time. Then we analyze the convergence time of Hopfield nets in terms of the length of their bit representations. Here we construct an analog symmetric network whose convergence time exceeds the convergence time of any binary Hopfield net with the same representation length. Further, we prove that the MIN ENERGY problem for analog Hopfield nets is NP-hard and provide a polynomial time approximation algorithm for this p…

Computational complexity theoryCognitive NeuroscienceComputationBinary numberHopfield networkTuring machinesymbols.namesakeRecurrent neural networkArts and Humanities (miscellaneous)Convergence (routing)symbolsTime complexityAlgorithmMathematicsNeural Computation
researchProduct

Descriptive Complexity, Lower Bounds and Linear Time

1999

This paper surveys two related lines of research: Logical characterizations of (non-deterministic) linear time complexity classes, and non-expressibility results concerning sublogics of existential second-order logic. Starting from Fagin’s fundamental work there has been steady progress in both fields with the effect that the weakest logics that are used in characterizations of linear time complexity classes are closely related to the strongest logics for which inexpressibility proofs for concrete problems have been obtained. The paper sketches these developments and highlights their connections as well as the obstacles that prevent us from closing the remaining gap between both kinds of lo…

Computational complexity theoryComputer scienceDescriptive complexity theoryMathematical proofCombinatoricsTuring machinesymbols.namesakeTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESRegular languageCalculusComplexity classsymbolsUnary functionTime complexity
researchProduct

Efficient and accurate methodology for solving multiserver retrial systems

2005

Proposed is a novel methodology for solving retrial systems which is based on the aggregation of levels of the Markov model beyond a given one. Its evaluation concludes that it is more accurate than previous approximations while requiring a low computational cost.

Computational complexity theoryComputer scienceDistributed computingCellular trafficElectrical and Electronic EngineeringMarkov modelElectronics Letters
researchProduct

Use of wavelet for image processing in smart cameras with low hardware resources

2013

International audience; Images from embedded sensors need digital processing to recover high-quality images and to extract features of a scene. Depending on the properties of the sensor and on the application, the designer fits together different algorithms to process images. In the context of embedded devices, the hardware supporting those applications is very constrained in terms of power consumption and silicon area. Thus, the algorithms have to be compliant with the embedded specifications i.e. reduced computational complexity and low memory requirements. We investigate the opportunity to use the wavelet representation to perform good quality image processing algorithms at a lower compu…

Computational complexity theoryComputer scienceImage qualityEmbedded systemsComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processing02 engineering and technology[SPI]Engineering Sciences [physics]WaveletDigital image processing0202 electrical engineering electronic engineering information engineering[ SPI ] Engineering Sciences [physics]Computer visionSmart cameraDWTDigital signal processingDenoisingDemosaicingbusiness.industry020202 computer hardware & architectureDemosaicingRecognitionHardware and Architecture020201 artificial intelligence & image processingArtificial intelligencebusinessWaveletSoftwareComputer hardware
researchProduct

New super-orthogonal space-time trellis codes using differential M-PSK for noncoherent mobile communication systems with two transmit antennas

2010

Published version of an article in the journal: Annals of Telecommunications-Annales Des Telecommunications. Also available from the publisher at: http://dx.doi.org/10.1007/s12243-010-0191-1 In this paper, we develop super-orthogonal space-time trellis codes (SOSTTCs) using differential binary phase-shift keying, quadriphase-shift keying and eight-phase shift keying for noncoherent communication systems with two transmit antennas without channel state information at the receiver. Based on a differential encoding scheme proposed by Tarokh and Jafarkhani, we propose a new decoding algorithm with reduced decoding complexity. To evaluate the performance of the SOSTTCs by way of computer simulat…

Computational complexity theoryComputer scienceList decodingKeyingVDP::Technology: 500::Information and communication technology: 550Sequential decodingData_CODINGANDINFORMATIONTHEORYChannel state informationElectronic engineeringElectrical and Electronic Engineeringdifferential detection noncoherent communications super-orthogonal space-time trellies codesAlgorithmDifferential codingDecoding methodsComputer Science::Information TheoryPhase-shift keying
researchProduct