Search results for "Computation"

showing 10 items of 7362 documents

Asymmetric Comparison and Querying of Biological Networks

2011

Comparing and querying the protein-protein interaction (PPI) networks of different organisms is important to infer knowledge about conservation across species. Known methods that perform these tasks operate symmetrically, i.e., they do not assign a distinct role to the input PPI networks. However, in most cases, the input networks are indeed distinguishable on the basis of how the corresponding organism is biologically well characterized. In this paper a new idea is developed, that is, to exploit differences in the characterization of organisms at hand in order to devise methods for comparing their PPI networks. We use the PPI network (called Master) of the best characterized organism as a …

Theoretical computer scienceFinite-state machineMatching (graph theory)Computer scienceApplied MathematicsFingerprint (computing)Process (computing)Computational BiologyViterbi algorithmModels BiologicalAutomatonBioinformatics network analysissymbols.namesakeSequence Analysis ProteinLinearizationProtein Interaction MappingGeneticssymbolsProtein Interaction Domains and MotifsSequence AlignmentAlgorithmsBiological networkBiotechnologyIEEE/ACM Transactions on Computational Biology and Bioinformatics
researchProduct

Algorithmic Analysis of Programs with Well Quasi-ordered Domains

2000

AbstractOver the past few years increasing research effort has been directed towards the automatic verification of infinite-state systems. This paper is concerned with identifying general mathematical structures which can serve as sufficient conditions for achieving decidability. We present decidability results for a class of systems (called well-structured systems) which consist of a finite control part operating on an infinite data domain. The results assume that the data domain is equipped with a preorder which is a well quasi-ordering, such that the transition relation is “monotonic” (a simulation) with respect to the preorder. We show that the following properties are decidable for wel…

Theoretical computer scienceFinite-state machineReachability problemData domainPreorderPetri netComputer Science ApplicationsTheoretical Computer ScienceDecidabilityComputational Theory and MathematicsReachabilityMathematical structureComputer Science::Formal Languages and Automata TheoryInformation SystemsMathematicsInformation and Computation
researchProduct

Quantum Computers and Quantum Automata

2000

Quantum computation is a most challenging project involving research both by physicists and computer scientists. The principles of quantum computation differ from the principles of classical computation very much. When quantum computers become available, the public-key cryptography will change radically. It is no exaggeration to assert that building a quantum computer means building a universal code-breaking machine. Quantum finite automata are expected to appear much sooner. They do not generalize deterministic finite automata. Their capabilities are incomparable.

Theoretical computer scienceFinite-state machinebusiness.industryComputationTheoryofComputation_GENERALCryptographyQuantum circuitDeterministic finite automatonRegular languageComputerSystemsOrganization_MISCELLANEOUSQuantum finite automatabusinessMathematicsQuantum computer
researchProduct

Extracting string motif bases for quorum higher than two

2012

Bases of generators of motifs consisting of strings in which some positions can be occupied by a don’t care provide a useful conceptual tool for their description and a way to reduce the time and space involved in the discovery process. In the last few years, a few algorithms have been proposed for the extraction of a basis, building in large part on combinatorial properties of strings and their autocorrelations. Currently, the most efficient techniques for binary alphabets and quorum q = 2 require time quadratic in the length of the host string. The present paper explores properties of motif bases for quorum q ≥ 2, both with binary and general alphabets, by also showing that important resu…

Theoretical computer scienceGeneral Computer ScienceBasis (linear algebra)Computational complexity theorySpacetimeString (computer science)Binary numberTheoretical Computer ScienceBusiness process discoverySet (abstract data type)Quadratic equationpattern discovery string motif basisComputer Science(all)MathematicsTheoretical Computer Science
researchProduct

Code Interoperability and Standard Data Formats in Quantum Chemistry and Quantum Dynamics: The Q5/Q5cost Data Model

2014

Code interoperability and the search for domain-specific standard data formats represent critical issues in many areas of computational science. The advent of novel computing infrastructures such as computational grids and clouds make these issues even more urgent. The design and implementation of a common data format for quantum chemistry (QC) and quantum dynamics (QD) computer programs is discussed with reference to the research performed in the course of two Collaboration in Science and Technology Actions. The specific data models adopted, Q5Cost and D5Cost, are shown to work for a number of interoperating codes, regardless of the type and amount of information (small or large datasets) …

Theoretical computer scienceGrid ComputingComputer scienceDistributed computingInteroperability010402 general chemistrycomputer.software_genre01 natural sciencesData typegrid computingData modelingquantum chemistryquantum dynamicQuantum DynamicsCode interoperability0103 physical sciencesprogram interoperabilityCommon Data FormatComputingMilieux_MISCELLANEOUSdata format010304 chemical physicsChemistry (all)General ChemistryQuantum ChemistryGridData Format0104 chemical sciences[CHIM.THEO]Chemical Sciences/Theoretical and/or physical chemistryComputational MathematicsGrid computingData modelProof of conceptcomputerCode interoperability; Quantum Chemistry; Quantum Dynamics; Data Format; Grid ComputingJ. Comput. Chem.
researchProduct

On the Influence of Technology on Learning Processes

2014

Probabilistic computations and frequency computations were invented for the same purpose, namely, to study possible advantages of technology involving random choices. Recently several authors have discovered close relationships of these generalizations of deterministic computations to computations taking advice. Various forms of computation taking advice were studied by Karp and Lipton [1], Damm and Holzer [2], and Freivalds [3]. In the present paper, we apply the nonconstructive, probabilistic, and frequency methods to an inductive inference paradigm originally due to Gold [4] and investigate their impact on the resulting learning models. Several trade-offs with respect to the resulting l…

Theoretical computer scienceHardware and ArchitectureComputer scienceLearnabilityComputationProbabilistic logicLearning modelsInductive reasoningAdvice (complexity)SoftwareTheoretical Computer ScienceParallel Processing Letters
researchProduct

Some models of inductive syntactical synthesis from sample computations

2005

The paper is a survey of several models of inductive program synthesis from sample computations. Synthesis tools are basically syntactical: the synthesis is based on the detection of "regular" fragments related with "shuffled" arithmetical progressions. Input sample computations are supposed to be "representative": they have to "reflect" all loops occurring in the target program. Programs are synthesized in nontraditional form of "generalized" regular expressions having Cleene stars and unions for loops and CASE-like operators. However, if input samples are somehow "annotated" (we consider two different approaches), then loops can be synthesized in more traditional WHILE-form, where loop co…

Theoretical computer scienceLOOP (programming language)ComputationSample (material)Arithmetic functionRegular expressionProgram synthesisMathematics
researchProduct

Approximate supervised learning of quantum gates via ancillary qubits

2018

We present strategies for the training of a qubit network aimed at the ancilla-assisted synthesis of multi-qubit gates based on a set of restricted resources. By assuming the availability of only time-independent single and two-qubit interactions, we introduce and describe a supervised learning strategy implemented through momentum-stochastic gradient descent with automatic differentiation methods. We demonstrate the effectiveness of the scheme by discussing the implementation of non-trivial three qubit operations, including a Quantum Fourier Transform (QFT) and a half-adder gate.

Theoretical computer sciencePhysics and Astronomy (miscellaneous)Computer scienceSupervised learningQuantum Physicsquantum-computation01 natural sciencesSettore FIS/03 - Fisica Della Materia010305 fluids & plasmasSet (abstract data type)Quantum-informationComputer Science::Emerging TechnologiesQuantum gatemachine learningquantum informationQubit0103 physical sciences/dk/atira/pure/subjectarea/asjc/3100/3101Hardware_ARITHMETICANDLOGICSTRUCTURESQuantum informationquantum-gates010306 general physicsQuantum computer
researchProduct

Multiple SIP strategies and bottom-up adorning in logic query optimization

1990

Preprocessing methods called “readorning” and “bottom-up adorning” are introduced as means of enlarging the application domain of magic sets and related query optimization strategies for logic databases. Readorning tries to make possible the simultaneous use of multiple sideways information passing (sip) strategies defined for a rule, thus yielding an optimization effect that may not be achieved by any particular choice of sip strategies. Bottom-up adorning is used to make magic sets applicable to cases in which potential optimizations can be derived from bindings coming upwards from rule bodies to rule heads in bottom-up evaluation. These include the cases in which we know that some base r…

Theoretical computer scienceRelation (database)Programming languageComputer science0102 computer and information sciences02 engineering and technologyTop-down and bottom-up designBase (topology)computer.software_genreQuery optimization01 natural sciencesDomain (software engineering)Datalog010201 computation theory & mathematicsApplication domain020204 information systems0202 electrical engineering electronic engineering information engineeringPreprocessorcomputercomputer.programming_language
researchProduct

Correlation Analysis of Node and Edge Centrality Measures in Artificial Complex Networks

2021

The role of an actor in a social network is identified through a set of measures called centrality. Degree centrality, betweenness centrality, closeness centrality, and clustering coefficient are the most frequently used metrics to compute the node centrality. Their computational complexity in some cases makes unfeasible, when not practically impossible, their computations. For this reason, we focused on two alternative measures, WERW-Kpath and Game of Thieves, which are at the same time highly descriptive and computationally affordable. Our experiments show that a strong correlation exists between WERW-Kpath and Game of Thieves and the classical centrality measures. This may suggest the po…

Theoretical computer scienceSettore INF/01 - InformaticaComputational complexity theorySocial networkComputer sciencebusiness.industryNode (networking)Complex networksComplex networkSocial network analysisK-pathBetweenness centralityCentrality measuresCorrelation coefficientsCentralitybusinessSocial network analysisClustering coefficient
researchProduct