Search results for "complexity"

showing 10 items of 1094 documents

ALGORITHMS FOR JUMBLED PATTERN MATCHING IN STRINGS

2011

The Parikh vector p(s) of a string s is defined as the vector of multiplicities of the characters. Parikh vector q occurs in s if s has a substring t with p(t)=q. We present two novel algorithms for searching for a query q in a text s. One solves the decision problem over a binary text in constant time, using a linear size index of the text. The second algorithm, for a general finite alphabet, finds all occurrences of a given Parikh vector q and has sub-linear expected time complexity; we present two variants, which both use a linear size index of the text.

FOS: Computer and information sciencesJ.3average case analysis.Binary numberaverage case analysispermuted stringpermuted stringsComputer Science - Data Structures and AlgorithmsComputer Science (miscellaneous)Parikh vectorData Structures and Algorithms (cs.DS)Pattern matchingTime complexityMathematicsString (computer science)Parikh vectorsstring algorithmDecision problemstring algorithmsSubstringParikh vectors; permuted strings; pattern matching; string algorithms; average case analysisF.2.2; J.3Index (publishing)pattern matchingF.2.2Constant (mathematics)AlgorithmComputer Science::Formal Languages and Automata Theory
researchProduct

All Classical Adversary Methods Are Equivalent for Total Functions

2017

We show that all known classical adversary lower bounds on randomized query complexity are equivalent for total functions and are equal to the fractional block sensitivity fbs( f ). That includes the Kolmogorov complexity bound of Laplante and Magniez and the earlier relational adversary bound of Aaronson. This equivalence also implies that for total functions, the relational adversary is equivalent to a simpler lower bound, which we call rank-1 relational adversary. For partial functions, we show unbounded separations between fbs( f ) and other adversary bounds, as well as between the adversary bounds themselves. We also show that, for partial functions, fractional block sensitivity canno…

FOS: Computer and information sciencesKolmogorov complexity010102 general mathematicsBlock (permutation group theory)0102 computer and information sciencesFunction (mathematics)Computational Complexity (cs.CC)Adversary01 natural sciencesUpper and lower boundsTheoretical Computer ScienceCombinatoricsComputer Science - Computational ComplexityComputational Theory and Mathematics010201 computation theory & mathematicsPartial functionSensitivity (control systems)0101 mathematicsEquivalence (measure theory)MathematicsACM Transactions on Computation Theory
researchProduct

Variable time amplitude amplification and a faster quantum algorithm for solving systems of linear equations

2010

We present two new quantum algorithms. Our first algorithm is a generalization of amplitude amplification to the case when parts of the quantum algorithm that is being amplified stop at different times. Our second algorithm uses the first algorithm to improve the running time of Harrow et al. algorithm for solving systems of linear equations from O(kappa^2 log N) to O(kappa log^3 kappa log N) where \kappa is the condition number of the system of equations.

FOS: Computer and information sciencesMathematics::LogicQuantum PhysicsComputer Science - Computational ComplexityComputer Science - Data Structures and AlgorithmsFOS: Physical sciencesData Structures and Algorithms (cs.DS)Computational Complexity (cs.CC)Quantum Physics (quant-ph)
researchProduct

Heretical Mutiple Importance Sampling

2016

Multiple Importance Sampling (MIS) methods approximate moments of complicated distributions by drawing samples from a set of proposal distributions. Several ways to compute the importance weights assigned to each sample have been recently proposed, with the so-called deterministic mixture (DM) weights providing the best performance in terms of variance, at the expense of an increase in the computational cost. A recent work has shown that it is possible to achieve a trade-off between variance reduction and computational effort by performing an a priori random clustering of the proposals (partial DM algorithm). In this paper, we propose a novel "heretical" MIS framework, where the clustering …

FOS: Computer and information sciencesMean squared errorComputer scienceApplied MathematicsEstimator020206 networking & telecommunications02 engineering and technologyVariance (accounting)Statistics - Computation01 natural sciencesReduction (complexity)010104 statistics & probability[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingSignal Processing0202 electrical engineering electronic engineering information engineeringA priori and a posterioriVariance reduction0101 mathematicsElectrical and Electronic EngineeringCluster analysisAlgorithm[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingImportance samplingComputation (stat.CO)ComputingMilieux_MISCELLANEOUS
researchProduct

Classical automata on promise problems

2015

Promise problems were mainly studied in quantum automata theory. Here we focus on state complexity of classical automata for promise problems. First, it was known that there is a family of unary promise problems solvable by quantum automata by using a single qubit, but the number of states required by corresponding one-way deterministic automata cannot be bounded by a constant. For this family, we show that even two-way nondeterminism does not help to save a single state. By comparing this with the corresponding state complexity of alternating machines, we then get a tight exponential gap between two-way nondeterministic and one-way alternating automata solving unary promise problems. Secon…

FOS: Computer and information sciencesNested wordTheoryofComputation_COMPUTATIONBYABSTRACTDEVICESUnary operationGeneral Computer ScienceFormal Languages and Automata Theory (cs.FL)nondeterministic automataComputer Science - Formal Languages and Automata Theoryω-automatonComputational Complexity (cs.CC)Theoretical Computer ScienceContinuous spatial automatonQuantum finite automataDiscrete Mathematics and Combinatoricsalternating automatapromise problemsMathematicsprobabilistic automataNonlinear Sciences::Cellular Automata and Lattice GasesMobile automatonNondeterministic algorithmAlgebra[INFO.INFO-DM] Computer Science [cs]/Discrete Mathematics [cs.DM]Computer Science - Computational ComplexityTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESAutomata theorydescriptional complexityComputer Science::Formal Languages and Automata Theory
researchProduct

Exact quantum algorithms have advantage for almost all Boolean functions

2014

It has been proved that almost all $n$-bit Boolean functions have exact classical query complexity $n$. However, the situation seemed to be very different when we deal with exact quantum query complexity. In this paper, we prove that almost all $n$-bit Boolean functions can be computed by an exact quantum algorithm with less than $n$ queries. More exactly, we prove that ${AND}_n$ is the only $n$-bit Boolean function, up to isomorphism, that requires $n$ queries.

FOS: Computer and information sciencesNuclear and High Energy Physics81P68 03D15Parity functionBoolean circuitGeneral Physics and AstronomyFOS: Physical sciencesBoolean algebras canonically definedComputational Complexity (cs.CC)Theoretical Computer ScienceCombinatoricsBoolean expressionBoolean functionMathematical PhysicsComputer Science::DatabasesMathematicsDiscrete mathematicsSymmetric Boolean functionQuantum PhysicsProduct termComputer Science::Information RetrievalStatistical and Nonlinear PhysicsComputer Science - Computational ComplexityComputational Theory and MathematicsMaximum satisfiability problemQuantum Physics (quant-ph)
researchProduct

Quantum lower bound for inverting a permutation with advice

2014

Given a random permutation $f: [N] \to [N]$ as a black box and $y \in [N]$, we want to output $x = f^{-1}(y)$. Supplementary to our input, we are given classical advice in the form of a pre-computed data structure; this advice can depend on the permutation but \emph{not} on the input $y$. Classically, there is a data structure of size $\tilde{O}(S)$ and an algorithm that with the help of the data structure, given $f(x)$, can invert $f$ in time $\tilde{O}(T)$, for every choice of parameters $S$, $T$, such that $S\cdot T \ge N$. We prove a quantum lower bound of $T^2\cdot S \ge \tilde{\Omega}(\epsilon N)$ for quantum algorithms that invert a random permutation $f$ on an $\epsilon$ fraction of…

FOS: Computer and information sciencesNuclear and High Energy PhysicsComputer Science - Cryptography and SecurityGeneral Physics and AstronomyFOS: Physical sciencesOne-way functionComputational Complexity (cs.CC)Upper and lower boundsTheoretical Computer ScienceCyclic permutationCombinatoricsPermutationMathematical PhysicsMathematicsDiscrete mathematicsQuantum PhysicsBit-reversal permutationStatistical and Nonlinear PhysicsRandom permutationComputer Science - Computational ComplexityComputational Theory and MathematicsQuantum algorithmQuantum Physics (quant-ph)Advice (complexity)Cryptography and Security (cs.CR)MathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

Whom to befriend to influence people

2020

Alice wants to join a new social network, and influence its members to adopt a new product or idea. Each person $v$ in the network has a certain threshold $t(v)$ for {\em activation}, i.e adoption of the product or idea. If $v$ has at least $t(v)$ activated neighbors, then $v$ will also become activated. If Alice wants to activate the entire social network, whom should she befriend? More generally, we study the problem of finding the minimum number of links that a set of external influencers should form to people in the network, in order to activate the entire social network. This {\em Minimum Links} Problem has applications in viral marketing and the study of epidemics. Its solution can be…

FOS: Computer and information sciencesPhysics - Physics and SocietyGeneral Computer ScienceFOS: Physical sciencesPhysics and Society (physics.soc-ph)0102 computer and information sciences02 engineering and technology01 natural sciencesSocial networksGraphTheoretical Computer ScienceCombinatoricsComputer Science - Data Structures and AlgorithmsGreedy algorithmFOS: Mathematics0202 electrical engineering electronic engineering information engineeringMathematics - CombinatoricsData Structures and Algorithms (cs.DS)Greedy algorithmTime complexityNP-completeMathematicsSocial and Information Networks (cs.SI)Social networkDiscrete mathematicsBinary treeDegree (graph theory)Computer Science (all)Order (ring theory)Computer Science - Social and Information NetworksJoin (topology)Influence maximizationGreedy algorithms010201 computation theory & mathematicsGraphs; Greedy algorithms; Influence maximization; NP-complete; Social networksProduct (mathematics)020201 artificial intelligence & image processingCombinatorics (math.CO)Constant (mathematics)GraphsTheoretical Computer Science
researchProduct

Classical and Quantum Annealing in the Median of Three Satisfiability

2011

We determine the classical and quantum complexities of a specific ensemble of three-satisfiability problems with a unique satisfying assignment for up to N = 100 and 80 variables, respectively. In the classical limit, we employ generalized ensemble techniques and measure the time that a Markovian Monte Carlo process spends in searching classical ground states. In the quantum limit, we determine the maximum finite correlation length along a quantum adiabatic trajectory determined by the linear sweep of the adiabatic control parameter in the Hamiltonian composed of the problem Hamiltonian and the constant transverse field Hamiltonian. In the median of our ensemble, both complexities diverge e…

FOS: Computer and information sciencesPolynomialComputational complexity theoryQuantum dynamicsFOS: Physical sciencesComputational Complexity (cs.CC)Classical limitClassical capacityQuantum mechanicsddc:530Statistical physicsALGORITHMAmplitude damping channelQuantumQuantum fluctuationCondensed Matter - Statistical MechanicsMathematicsPhysicsQuantum PhysicsStatistical Mechanics (cond-mat.stat-mech)Stochastic processQuantum annealingAdiabatic quantum computationAtomic and Molecular Physics and OpticsSatisfiabilityJComputer Science - Computational ComplexityComputerSystemsOrganization_MISCELLANEOUSQuantum algorithmPHASE-TRANSITIONSQuantum dissipationQuantum Physics (quant-ph)
researchProduct

PRINCIPAL POLYNOMIAL ANALYSIS

2014

© 2014 World Scientific Publishing Company. This paper presents a new framework for manifold learning based on a sequence of principal polynomials that capture the possibly nonlinear nature of the data. The proposed Principal Polynomial Analysis (PPA) generalizes PCA by modeling the directions of maximal variance by means of curves instead of straight lines. Contrarily to previous approaches PPA reduces to performing simple univariate regressions which makes it computationally feasible and robust. Moreover PPA shows a number of interesting analytical properties. First PPA is a volume preserving map which in turn guarantees the existence of the inverse. Second such an inverse can be obtained…

FOS: Computer and information sciencesPolynomialComputer Networks and CommunicationsComputer scienceMachine Learning (stat.ML)02 engineering and technologyReduction (complexity)03 medical and health sciencessymbols.namesake0302 clinical medicineStatistics - Machine LearningArtificial Intelligence0202 electrical engineering electronic engineering information engineeringPrincipal Polynomial AnalysisPrincipal Component AnalysisMahalanobis distanceModels StatisticalCodingDimensionality reductionNonlinear dimensionality reductionGeneral MedicineClassificationDimensionality reductionManifold learningNonlinear DynamicsMetric (mathematics)Jacobian matrix and determinantsymbolsRegression Analysis020201 artificial intelligence & image processingNeural Networks ComputerAlgorithmAlgorithms030217 neurology & neurosurgeryCurse of dimensionalityInternational Journal of Neural Systems
researchProduct