Search results for "computational complexity"

showing 10 items of 249 documents

Exceptional Configurations of Quantum Walks with Grover’s Coin

2016

We study search by quantum walk on a two-dimensional grid using the algorithm of Ambainis, Kempe and Rivosh [AKR05]. We show what the most natural coin transformation -- Grover's diffusion transformation -- has a wide class of exceptional configurations of marked locations, for which the probability of finding any of the marked locations does not grow over time. This extends the class of known exceptional configurations; until now the only known such configuration was the "diagonal construction" by [AR08].

CombinatoricsClass (set theory)Transformation (function)DiagonalQuantum walkComputer Science::Computational ComplexityGridMathematics
researchProduct

Quantum Online Algorithms with Respect to Space Complexity

2017

Online algorithm is a well-known computational model. We introduce quantum online algorithms and investigate them with respect to a competitive ratio in two points of view: space complexity and advice complexity. We start with exploring a model with restricted memory and show that quantum online algorithms can be better than classical ones (deterministic or randomized) for sublogarithmic space (memory), and they can be better than deterministic online algorithms without restriction for memory. Additionally, we consider polylogarithmic space case and show that in this case, quantum online algorithms can be better than deterministic ones as well.

FOS: Computer and information sciencesComputer Science - Computational ComplexityQuantum PhysicsFOS: Physical sciencesComputerApplications_COMPUTERSINOTHERSYSTEMSComputational Complexity (cs.CC)Quantum Physics (quant-ph)
researchProduct

Quantum algorithm for tree size estimation, with applications to backtracking and 2-player games

2017

We study quantum algorithms on search trees of unknown structure, in a model where the tree can be discovered by local exploration. That is, we are given the root of the tree and access to a black box which, given a vertex $v$, outputs the children of $v$. We construct a quantum algorithm which, given such access to a search tree of depth at most $n$, estimates the size of the tree $T$ within a factor of $1\pm \delta$ in $\tilde{O}(\sqrt{nT})$ steps. More generally, the same algorithm can be used to estimate size of directed acyclic graphs (DAGs) in a similar model. We then show two applications of this result: a) We show how to transform a classical backtracking search algorithm which exam…

FOS: Computer and information sciencesQuantum PhysicsSpeedupBacktrackingFOS: Physical sciences0102 computer and information sciences02 engineering and technologyComputational Complexity (cs.CC)Directed acyclic graph01 natural sciencesSearch treeCombinatoricsComputer Science - Computational Complexity010201 computation theory & mathematicsSearch algorithm020204 information systemsComputer Science - Data Structures and AlgorithmsTernary search tree0202 electrical engineering electronic engineering information engineeringData Structures and Algorithms (cs.DS)Quantum algorithmDepth-first searchQuantum Physics (quant-ph)MathematicsProceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing
researchProduct

Representing 2D Digital Objects

2000

The paper describes the combination a multi-views approach to represent connected components of 2D binary images. The approach is based on the Object Connectivity Graph (OCG), which is a sub-graph of the connectivity graph generated by the Discrete Cylindrical Algebraic Decomposition(DCAD) performed in the 2D discrete space. This construction allows us to find the number of connected components, to determine their connectivity degree, and to solve visibility problem. We show that the CAD construction, when performed on two orthogonal views, supply information to avoid ambiguities in the interpretation of each image component. The implementation of the algorithm is outlined and the computati…

Connected componentTheoretical computer scienceSettore INF/01 - InformaticaComputational complexity theoryDegree (graph theory)Computer scienceDiscrete spaceDigital topologyShape representationTopologyTheoretical Computer ScienceCylindrical algebraic decompositionComputer ScienceShape decompositionRepresentation (mathematics)Digital topologyConnectivityShape description
researchProduct

Multi-label Classification Using Stacked Hierarchical Dirichlet Processes with Reduced Sampling Complexity

2018

Nonparametric topic models based on hierarchical Dirichlet processes (HDPs) allow for the number of topics to be automatically discovered from the data. The computational complexity of standard Gibbs sampling techniques for model training is linear in the number of topics. Recently, it was reduced to be linear in the number of topics per word using a technique called alias sampling combined with Metropolis Hastings (MH) sampling. We propose a different proposal distribution for the MH step based on the observation that distributions on the upper hierarchy level change slower than the document-specific distributions at the lower level. This reduces the sampling complexity, making it linear i…

Topic modelComputational complexity theoryComputer science02 engineering and technologyLatent Dirichlet allocationDirichlet distributionsymbols.namesakeArtificial Intelligence020204 information systems0202 electrical engineering electronic engineering information engineeringMathematicsMulti-label classificationbusiness.industrySampling (statistics)Pattern recognitionHuman-Computer InteractionDirichlet processMetropolis–Hastings algorithmHardware and ArchitectureTest setsymbols020201 artificial intelligence & image processingArtificial intelligencebusinessAlgorithmSoftwareInformation SystemsGibbs sampling2017 IEEE International Conference on Big Knowledge (ICBK)
researchProduct

New separation between $s(f)$ and $bs(f)$

2011

In this note we give a new separation between sensitivity and block sensitivity of Boolean functions: $bs(f)=(2/3)s(f)^2-(1/3)s(f)$.

Computer Science - Computational Complexity
researchProduct

A Tight Lower Bound on Certificate Complexity in Terms of Block Sensitivity and Sensitivity

2014

Sensitivity, certificate complexity and block sensitivity are widely used Boolean function complexity measures. A longstanding open problem, proposed by Nisan and Szegedy, is whether sensitivity and block sensitivity are polynomially related. Motivated by the constructions of functions which achieve the largest known separations, we study the relation between 1-certificate complexity and 0-sensitivity and 0-block sensitivity. Previously the best known lower bound was $C_1(f)\geq \frac{bs_0(f)}{2 s_0(f)}$, achieved by Kenyon and Kutin. We improve this to $C_1(f)\geq \frac{3 bs_0(f)}{2 s_0(f)}$. While this improvement is only by a constant factor, this is quite important, as it precludes achi…

Computer Science - Computational Complexity
researchProduct

On the decision problem for the guarded fragment with transitivity

2002

The guarded fragment with transitive guards, [GF+TG], is an extension of GF in which certain relations are required to be transitive, transitive predicate letters appear only in guards of the quantifiers and the equality symbol may appear everywhere. We prove that the decision problem for [GF+TG] is decidable. This answers the question posed in (Ganzinger et al., 1999). Moreover, we show that the problem is 2EXPTIME-complete. This result is optimal since the satisfiability problem for GF is 2EXPTIME-complete (Gradel, 1999). We also show that the satisfiability problem for two-variable [GF+TG] is NEXPTIME-hard in contrast to GF with bounded number of variables for which the satisfiability pr…

CombinatoricsDiscrete mathematicsTransitive relationComputational complexity theoryComputabilityBounded functionPredicate (mathematical logic)Decision problemBoolean satisfiability problemDecidabilityMathematics
researchProduct

Varieties Generated by Certain Models of Reversible Finite Automata

2006

Reversible finite automata with halting states (RFA) were first considered by Ambainis and Freivalds to facilitate the research of Kondacs-Watrous quantum finite automata. In this paper we consider some of the algebraic properties of RFA, namely the varieties these automata generate. Consequently, we obtain a characterization of the boolean closure of the classes of languages recognized by these models.

finite monoidNested word[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]Quantum automaton0102 computer and information sciences[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM]Computer Science::Computational Complexityω-automatonregular language01 natural sciences[MATH.MATH-GR]Mathematics [math]/Group Theory [math.GR]Regular languageQuantum finite automata0101 mathematicsReversible automatonMathematicsDiscrete mathematicsFinite-state machine010102 general mathematicsNonlinear Sciences::Cellular Automata and Lattice GasesMR 68Q70AutomatonClosure (mathematics)010201 computation theory & mathematicsAutomata theoryComputer Science::Formal Languages and Automata Theory
researchProduct

Error-Free Affine, Unitary, and Probabilistic OBDDs

2021

We introduce the affine OBDD model and show that zero-error affine OBDDs can be exponentially narrower than bounded-error unitary and probabilistic OBDDs on certain problems. Moreover, we show that Las-Vegas unitary and probabilistic OBDDs can be quadratically narrower than deterministic OBDDs. We also obtain the same results for the automata counterparts of these models.

Discrete mathematicsState complexityComputer Science::Logic in Computer ScienceComputer Science (miscellaneous)Probabilistic logicAffine transformationComputer Science::Computational ComplexityComputer Science::Artificial IntelligenceUnitary stateComputer Science::DatabasesMathematicsZero errorInternational Journal of Foundations of Computer Science
researchProduct