Search results for "Theoretical Computer Science"

showing 10 items of 1151 documents

A multi-step finite-state automaton for arbitrarily deterministic Tsetlin Machine learning

2021

Computational Theory and MathematicsArtificial IntelligenceControl and Systems EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Theoretical Computer Science
researchProduct

How Low Can Approximate Degree and Quantum Query Complexity Be for Total Boolean Functions?

2012

It has long been known that any Boolean function that depends on n input variables has both degree and exact quantum query complexity of Omega(log n), and that this bound is achieved for some functions. In this paper we study the case of approximate degree and bounded-error quantum query complexity. We show that for these measures the correct lower bound is Omega(log n / loglog n), and we exhibit quantum algorithms for two functions where this bound is achieved.

Computational complexity theoryGeneral MathematicsFOS: Physical sciences0102 computer and information sciences02 engineering and technology01 natural sciencesUpper and lower boundsTheoretical Computer ScienceComplexity indexCombinatorics0202 electrical engineering electronic engineering information engineeringBoolean functionMathematicsQuantum computerDiscrete mathematicsQuantum PhysicsApproximation theoryDegree (graph theory)TheoryofComputation_GENERALApproximation algorithmComputational MathematicsComputational Theory and Mathematics010201 computation theory & mathematics020201 artificial intelligence & image processingQuantum algorithmQuantum Physics (quant-ph)Quantum complexity theory2013 IEEE Conference on Computational Complexity
researchProduct

Equivalence closure in the two-variable guarded fragment

2015

We consider the satisfiability and finite satisfiability problems for the extension of the two-variable guarded fragment in which an equivalence closure operator can be applied to two distinguished binary predicates. We show that the satisfiability and finite satisfiability problems for this logic are 2-ExpTime-complete. This contrasts with an earlier result that the corresponding problems for the full two-variable logic with equivalence closures of two binary predicates are 2-NExpTime-complete.

Computational complexity theoryLogiccomputational complexityguarded fragmentsatisfiability problemBinary numberTheoretical Computer ScienceCombinatoricsArts and Humanities (miscellaneous)Computer Science::Logic in Computer ScienceClosure operatorEquivalence (formal languages)MathematicsDiscrete mathematicssatisfiability problemcomputational complexitydecidabilityequivalence closureSatisfiabilityDecidabilityTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESClosure (computer programming)Hardware and ArchitectureTheoryofComputation_LOGICSANDMEANINGSOFPROGRAMSBoolean satisfiability problemSoftwareJournal of Logic and Computation
researchProduct

[Editorial] Special issue on computational intelligence and nature-inspired algorithms for real-world data analytics and pattern recognition

2018

Cagnoni, S., & Castelli, M. (2018). [Editorial]. Special issue on computational intelligence and nature-inspired algorithms for real-world data analytics and pattern recognition. Algorithms, 11(3), 1-2. DOI: 10.3390/a11030025 This special issue of Algorithms is devoted to the study of Computational Intelligence and Nature-Inspired Algorithms for Real-World Data Analytics and Pattern Recognition. The special issue considered both theoretical contributions able to advance the state-of-the-art in this field and practical applications that describe novel approaches for solving real-world problems. published

Computational intelligenceNumerical AnalysisComputational MathematicsComputational Theory and MathematicsData analyticsPattern recognitionNature-inspired algorithmsTheoretical Computer Science
researchProduct

Learning Automata-based Misinformation Mitigation via Hawkes Processes

2021

AbstractMitigating misinformation on social media is an unresolved challenge, particularly because of the complexity of information dissemination. To this end, Multivariate Hawkes Processes (MHP) have become a fundamental tool because they model social network dynamics, which facilitates execution and evaluation of mitigation policies. In this paper, we propose a novel light-weight intervention-based misinformation mitigation framework using decentralized Learning Automata (LA) to control the MHP. Each automaton is associated with a single user and learns to what degree that user should be involved in the mitigation strategy by interacting with a corresponding MHP, and performing a joint ra…

Computer Networks and CommunicationsComputer scienceDistributed computingStochastic optimizationSocial media Misinformation02 engineering and technologyCrisis mitigationArticleTheoretical Computer ScienceLearning automata020204 information systemsConvergence (routing)0202 electrical engineering electronic engineering information engineeringState spaceSocial mediaMisinformationVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Social networkLearning automatabusiness.industryAutomaton020201 artificial intelligence & image processingStochastic optimizationbusinessHawkes processesSoftwareInformation Systems
researchProduct

Secure random number generation in wireless sensor networks

2014

The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most diverse applications, ranging from environmental monitoring to home automation, has raised more and more attention to the issues related to the design of specifically customized security mechanisms. The scarcity of computational, storage, and bandwidth resources cannot definitely be disregarded in such context, and this makes the implementation of security algorithms particularly challenging. This paper proposes a security framework for the generation of true random numbers, which are paramount as the core building block for many security algorithms; the intrinsic nature of wireless sensor no…

Computer Networks and CommunicationsComputer scienceRandom number generationNetwork securitybusiness.industryDistributed computingRangingComputer Science ApplicationsTheoretical Computer ScienceKey distribution in wireless sensor networksComputational Theory and MathematicsRobustness (computer science)Home automationWirelessbusinessWireless sensor networkSoftwareConcurrency and Computation: Practice and Experience
researchProduct

Seeking Information on Social Commerce: An Examination of the Impact of User- and Marketer-generated Content Through an Eye-tracking Study

2021

Following the growing popularity of social commerce sites, there is an increased interest in understanding how consumers decide what products to purchase based on the available information. Consumers nowadays are confronted with the task of assessing marketer-generated (MGC) as well as user-generated information (UGC) in a range of different forms to make informed purchase-related decisions. This study examines the information types and forms that influence consumers in their decision-making process on social commerce. Building on uses and gratifications and dual-process theories, we distinguish between marketer and user generated content, and differentiate formats into informational and no…

Computer Networks and CommunicationsProcess (engineering)User-generated contentCognitionVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420PopularityTheoretical Computer ScienceTask (project management)Selection (linguistics)Eye trackingNormativeMarketingPsychologyVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550SoftwareInformation SystemsInformation Systems Frontiers
researchProduct

An optimized mass storage FFT for vector computers

1995

Abstract The performance of a segmented FFT algorithm which allows the out-of-core computation of the Fourier transform of a very large mass storage data array is presented. The code is particularly optimized for vector computers. Tests performed mainly on a CONVEX C210 vector computer showed that, for very long transforms, tuning of the main parameters involved leads to computation speed and global efficiency better than for FFTs performed in-core. The use of tunable parameters allows optimization of the algorithm on machines with different configurations.

Computer Networks and Communicationsbusiness.industryComputer scienceComputationFast Fourier transformPrime-factor FFT algorithmArray data typeComputer Graphics and Computer-Aided DesignTheoretical Computer ScienceVector processorsymbols.namesakeFourier transformSplit-radix FFT algorithmArtificial IntelligenceHardware and ArchitectureComputer data storagesymbolsbusinessAlgorithmSoftwareParallel Computing
researchProduct

SAUCE: A web application for interactive teaching and learning of parallel programming

2017

Abstract Prevalent hardware trends towards parallel architectures and algorithms create a growing demand for graduate students familiar with the programming of concurrent software. However, learning parallel programming is challenging due to complex communication and memory access patterns as well as the avoidance of common pitfalls such as dead-locks and race conditions. Hence, the learning process has to be supported by adequate software solutions in order to enable future computer scientists and engineers to write robust and efficient code. This paper discusses a selection of well-known parallel algorithms based on C++11 threads, OpenMP, MPI, and CUDA that can be interactively embedded i…

Computer Networks and Communicationsbusiness.industryComputer scienceProgramming languageWhite-box testingParallel algorithmProcess (computing)020206 networking & telecommunications02 engineering and technologyParallel computingThread (computing)computer.software_genreTheoretical Computer ScienceCUDASoftwareArtificial IntelligenceHardware and Architecture0202 electrical engineering electronic engineering information engineeringCode (cryptography)Web application020201 artificial intelligence & image processingbusinesscomputerSoftwareJournal of Parallel and Distributed Computing
researchProduct

Analyzing the performance of a cluster-based architecture for immersive visualization systems

2008

Cluster computing has become an essential issue for designing immersive visualization systems. This paradigm employs scalable clusters of commodity computers with much lower costs than would be possible with the high-end, shared memory computers that have been traditionally used for virtual reality purposes. This change in the design of virtual reality systems has caused some development environments oriented toward shared memory computing to require modifications to their internal architectures in order to support cluster computing. This is the case of VR Juggler, which is considered one of the most important virtual reality application development frameworks based on open source code. Thi…

Computer Networks and Communicationsbusiness.industryComputer scienceVirtual realityModular designcomputer.software_genreTheoretical Computer ScienceVisualizationShared memoryArtificial IntelligenceHardware and ArchitectureHuman–computer interactionComputer clusterScalabilityCluster (physics)Operating systemArchitecturebusinesscomputerSoftwareJournal of Parallel and Distributed Computing
researchProduct