Search results for "000 Computer science"

showing 10 items of 18 documents

Variable time amplitude amplification and quantum algorithms for linear algebra problems

2012

Quantum amplitude amplification is a method of increasing a success probability of an algorithm from a small epsilon>0 to Theta(1) with less repetitions than classically. In this paper, we generalize quantum amplitude amplification to the case when parts of the algorithm that is being amplified stop at different times. We then apply the new variable time amplitude amplification to give two new quantum algorithms for linear algebra problems. Our first algorithm is an improvement of Harrow et al. algorithm for solving systems of linear equations. We improve the running time of the algorithm from O(k^2 log N) to O(k log^3 k log N) where k is the condition number of the system of equations. …

000 Computer science knowledge general works010201 computation theory & mathematics0103 physical sciencesComputer Science[INFO.INFO-CC] Computer Science [cs]/Computational Complexity [cs.CC][INFO.INFO-DS] Computer Science [cs]/Data Structures and Algorithms [cs.DS]0102 computer and information scienceslinear equations010306 general physicsquantum algorithmsamplitude amplification01 natural sciencesquantum computing
researchProduct

Computer Science Meets Ecology (Dagstuhl Seminar 17091)

2017

This report summarizes the program and main outcomes of the Dagstuhl Seminar 17091 entitled ``Computer Science Meets Ecolog''. Ecology is a discipline that poses many challenging problems involving big data collection, provenance and integration, as well as difficulties in data analysis, prediction and understanding. All these issues are precisely the arena where computer science is concerned. The seminar motivation was rooted in the belief that ecology could largely benefit from modern computer science. The seminar attracted scientists from both fields who discussed important topics in ecology (e.g. botany, animal science, biogeochemistry) and how to approach them with machine learning, co…

000 Computer science knowledge general works4. EducationComputer ScienceComputingMilieux_COMPUTERSANDEDUCATION
researchProduct

FO^2 with one transitive relation is decidable

2013

We show that the satisfiability problem for the two-variable first-order logic, FO^2, over transitive structures when only one relation is required to be transitive, is decidable. The result is optimal, as FO^2 over structures with two transitive relations, or with one transitive and one equivalence relation, are known to be undecidable, so in fact, our result completes the classification of FO^2-logics over transitive structures with respect to decidability. We show that the satisfiability problem is in 2-NExpTime. Decidability of the finite satisfiability problem remains open.

000 Computer science knowledge general worksComputer ScienceComputer Science::Formal Languages and Automata Theory
researchProduct

Detecting mutations by eBWT

2018

In this paper we develop a theory describing how the extended Burrows-Wheeler Transform (eBWT) of a collection of DNA fragments tends to cluster together the copies of nucleotides sequenced from a genome G. Our theory accurately predicts how many copies of any nucleotide are expected inside each such cluster, and how an elegant and precise LCP array based procedure can locate these clusters in the eBWT. Our findings are very general and can be applied to a wide range of different problems. In this paper, we consider the case of alignment-free and reference-free SNPs discovery in multiple collections of reads. We note that, in accordance with our theoretical results, SNPs are clustered in th…

0301 basic medicineFOS: Computer and information sciences000 Computer science knowledge general worksBWT LCP Array SNPs Reference-free Assembly-freeLCP ArraySettore INF/01 - Informatica[SDV]Life Sciences [q-bio]Reference-freeAssembly-freeSNP03 medical and health sciences030104 developmental biologyBWTBWT; LCP Array; SNPs; Reference-free; Assembly-freeComputer ScienceComputer Science - Data Structures and AlgorithmsData Structures and Algorithms (cs.DS)[INFO]Computer Science [cs]SoftwareSNPs
researchProduct

Quine’s Fluted Fragment is Non-elementary

2016

We study the fluted fragment, a decidable fragment of first-order logic with an unbounded number of variables, originally identified by W.V. Quine. We show that the satisfiability problem for this fragment has non-elementary complexity, thus refuting an earlier published claim by W.C. Purdy that it is in NExpTime. More precisely, we consider, for all m greater than 1, the intersectionof the fluted fragment and the m-variable fragment of first-order logic. We show that this subfragment forces (m/2)-tuply exponentially large models, and that its satisfiability problem is (m/2)-NExpTime-hard. We round off by using a corrected version of Purdy’s construction to show that the m-variable fluted f…

060201 languages & linguistics000 Computer science knowledge general worksdecidabilityQuinefluted fragment06 humanities and the arts02 engineering and technologysatisfiabilityPurdy0602 languages and literatureComputer Science0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingnon-elementary
researchProduct

Retrieving Monitoring and Accounting Information from Constrained Devices in Internet-of-Things Applications

2013

Part 6: Monitoring Mechanisms; International audience; Internet-of-Things (IoT) is envisioned to provide connectivity to a vast number of sensing or actuating devices with limited computational and communication capabilities. For the organizations that manage these constrained devices, the monitoring of each device’s operational status and performance level as well as the accounting of their resource usage are of great importance. However, monitoring and accounting support is lacking in today’s IoT platforms. Hence, this paper studies the applicability of the Constrained Application Protocol (CoAP), a lightweight transfer protocol under development by IETF, for efficiently retrieving monito…

10009 Department of InformaticsComputer scienceDistributed computingInternet of ThingsReal-time computingMonitoring and Accounting Infrastructure020206 networking & telecommunications02 engineering and technology000 Computer science knowledge & systemsSimple Network Management ProtocolConstrained Application ProtocolSecurity Assertion Markup Language[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Resource (project management)CoAPAccounting information system0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]esineiden internet020201 artificial intelligence & image processing1700 General Computer Science2614 Theoretical Computer ScienceWireless sensor networkProtocol (object-oriented programming)
researchProduct

Factors in the global assimilation of collaborative information technologies: an exploratory investigation in five regions

2008

The diffusion of innovation theory is deployed to investigate the global assimilation of collaborative information technologies (CITs). Based on the concepts of IT acquisition and utilization, an assimilation framework is presented to highlight four states (limited, focused, lagging, and pervasive) that capture the assimilation of conferencing and groupware CITs. Data collected from 538 organizations in the United States, Australia, Hong Kong, Norway, and Switzerland are aggregated and analyzed to explore assimilation patterns and the influence of decision-making pattern, functional integration, promotion of collaboration, organization size, and IT function size on the assimilation of CITs.…

Collaborative softwareInformation Systems and ManagementKnowledge managementDiffusion of innovation theory10009 Department of Informaticsbusiness.industrymedia_common.quotation_subjectInformation technologyAssimilation (biology)1803 Management Science and Operations Research000 Computer science knowledge & systemsManagement Science and Operations ResearchComputer Science ApplicationsManagement Information Systems1404 Management Information SystemsPromotion (rank)Geography1706 Computer Science Applications1802 Information Systems and ManagementbusinessLaggingFunction (engineering)media_common
researchProduct

K4-free Graphs as a Free Algebra

2017

International audience; Graphs of treewidth at most two are the ones excluding the clique with four vertices (K4) as a minor, or equivalently, the graphs whose biconnected components are series-parallel. We turn those graphs into a finitely presented free algebra, answering positively a question by Courcelle and Engelfriet, in the case of treewidth two. First we propose a syntax for denoting these graphs: in addition to parallel composition and series composition, it suffices to consider the neutral elements of those operations and a unary transpose operation. Then we give a finite equational presentation and we prove it complete: two terms from the syntax are congruent if and only if they …

Completeness000 Computer science knowledge general worksGraph minors[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM]Graph theoryTree decompositions[INFO.INFO-DM] Computer Science [cs]/Discrete Mathematics [cs.DM]Àlgebra universalUniversal Algebra[INFO.INFO-FL]Computer Science [cs]/Formal Languages and Automata Theory [cs.FL]Computer Science::Discrete MathematicsComputer ScienceAxiomatisation[INFO.INFO-FL] Computer Science [cs]/Formal Languages and Automata Theory [cs.FL]
researchProduct

Provable Advantage for Quantum Strategies in Random Symmetric XOR Games

2013

Non-local games are widely studied as a model to investigate the properties of quantum mechanics as opposed to classical mechanics. In this paper, we consider a subset of non-local games: symmetric XOR games of $n$ players with 0-1 valued questions. For this class of games, each player receives an input bit and responds with an output bit without communicating to the other players. The winning condition only depends on XOR of output bits and is constant w.r.t. permutation of players. We prove that for almost any $n$-player symmetric XOR game the entangled value of the game is $\Theta (\frac{\sqrt{\ln{n}}}{n^{1/4}})$ adapting an old result by Salem and Zygmund on the asymptotics of random tr…

Computer Science::Computer Science and Game TheoryQuantum Physics000 Computer science knowledge general worksComputer ScienceComputingMilieux_PERSONALCOMPUTINGTheoryofComputation_GENERAL
researchProduct

On the Inner Product Predicate and a Generalization of Matching Vector Families

2018

Motivated by cryptographic applications such as predicate encryption, we consider the problem of representing an arbitrary predicate as the inner product predicate on two vectors. Concretely, fix a Boolean function $P$ and some modulus $q$. We are interested in encoding $x$ to $\vec x$ and $y$ to $\vec y$ so that $$P(x,y) = 1 \Longleftrightarrow \langle\vec x,\vec y\rangle= 0 \bmod q,$$ where the vectors should be as short as possible. This problem can also be viewed as a generalization of matching vector families, which corresponds to the equality predicate. Matching vector families have been used in the constructions of Ramsey graphs, private information retrieval (PIR) protocols, and mor…

FOS: Computer and information sciences060201 languages & linguistics000 Computer science knowledge general worksComputer Science - Cryptography and Security06 humanities and the arts02 engineering and technologyComputational Complexity (cs.CC)Computer Science - Computational Complexity0602 languages and literatureComputer ScienceFOS: Mathematics0202 electrical engineering electronic engineering information engineeringMathematics - Combinatorics020201 artificial intelligence & image processingCombinatorics (math.CO)Cryptography and Security (cs.CR)
researchProduct