Search results for "computational complexity."

showing 10 items of 245 documents

Analyticity of a restricted formality

2020

International audience; The Kontsevich formality can be viewed as a non-linear map ℱ from the L∞ algebra of poly-vector fields on ℝd to the space of poly-differential operators. The space of the half-homogenous poly-vector fields is a sub-L∞ algebra. We prove here that the restriction of ℱto this subspace is weakly analytic.

Pure mathematics010102 general mathematicsStatistical and Nonlinear PhysicsFormalityComputer Science::Computational Complexity16. Peace & justiceSpace (mathematics)01 natural sciences0103 physical sciences010307 mathematical physics0101 mathematicsAlgebra over a field[MATH]Mathematics [math]Computer Science::Data Structures and AlgorithmsMathematical PhysicsSubspace topologyMathematics
researchProduct

Quadratically Tight Relations for Randomized Query Complexity

2020

In this work we investigate the problem of quadratically tightly approximating the randomized query complexity of Boolean functions R(f). The certificate complexity C(f) is such a complexity measure for the zero-error randomized query complexity R0(f): C(f) ≤R0(f) ≤C(f)2. In the first part of the paper we introduce a new complexity measure, expectational certificate complexity EC(f), which is also a quadratically tight bound on R0(f): EC(f) ≤R0(f) = O(EC(f)2). For R(f), we prove that EC2/3 ≤R(f). We then prove that EC(f) ≤C(f) ≤EC(f)2 and show that there is a quadratic separation between the two, thus EC(f) gives a tighter upper bound for R0(f). The measure is also related to the fractional…

Quadratic growth[INFO.INFO-CC]Computer Science [cs]/Computational Complexity [cs.CC]0209 industrial biotechnology0102 computer and information sciences02 engineering and technologyMeasure (mathematics)Upper and lower bounds01 natural sciencesACM: F.: Theory of ComputationSquare (algebra)Computation Theory & MathematicsTheoretical Computer ScienceCombinatoricsQuadratic equation020901 industrial engineering & automationComputational Theory and Mathematics010201 computation theory & mathematicsTheory of computationInformation complexity[INFO]Computer Science [cs]0102 Applied Mathematics 0802 Computation Theory and Mathematics 0805 Distributed ComputingCommunication complexityBoolean functionComputingMilieux_MISCELLANEOUSMathematics
researchProduct

On the class of languages recognizable by 1-way quantum finite automata

2000

It is an open problem to characterize the class of languages recognized by quantum finite automata (QFA). We examine some necessary and some sufficient conditions for a (regular) language to be recognizable by a QFA. For a subclass of regular languages we get a condition which is necessary and sufficient. Also, we prove that the class of languages recognizable by a QFA is not closed under union or any other binary Boolean operation where both arguments are significant.

Quantum PhysicsComputer Science::Programming LanguagesFOS: Physical sciencesComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)Computer Science::Computational ComplexityQuantum Physics (quant-ph)Computer Science::Formal Languages and Automata Theory
researchProduct

The class of languages recognizable by 1-way quantum finite automata is not closed under union

2000

In this paper we develop little further the theory of quantum finite automata (QFA). There are already few properties of QFA known, that deterministic and probabilistic finite automata do not have e.g. they cannot recognize all regular languages. In this paper we show, that class of languages recognizable by QFA is not closed under union, even not under any Boolean operation, where both arguments are significant.

Quantum PhysicsTheoryofComputation_COMPUTATIONBYABSTRACTDEVICESFOS: Physical sciencesComputer Science::Computational ComplexityQuantum Physics (quant-ph)Computer Science::Formal Languages and Automata Theory
researchProduct

Grover’s Search with Faults on Some Marked Elements

2018

Grover’s algorithm is a quantum query algorithm solving the unstructured search problem of size [Formula: see text] using [Formula: see text] queries. It provides a significant speed-up over any classical algorithm [3]. The running time of the algorithm, however, is very sensitive to errors in queries. Multiple authors have analysed the algorithm using different models of query errors and showed the loss of quantum speed-up [2, 6]. We study the behavior of Grover’s algorithm in the model where the search space contains both faulty and non-faulty marked elements. We show that in this setting it is indeed possible to find one of marked elements in [Formula: see text] queries. We also analyze…

Quantum queryComputational complexity theoryComputer science0103 physical sciencesComputer Science (miscellaneous)Search problemFault toleranceQuantum search algorithm010306 general physics01 natural sciencesAlgorithm010305 fluids & plasmasInternational Journal of Foundations of Computer Science
researchProduct

Quantum Lower Bound for Graph Collision Implies Lower Bound for Triangle Detection

2015

We show that an improvement to the best known quantum lower bound for GRAPH-COLLISION problem implies an improvement to the best known lower bound for TRIANGLE problem in the quantum query complexity model. In GRAPH-COLLISION we are given free access to a graph $(V,E)$ and access to a function $f:V\rightarrow \{0,1\}$ as a black box. We are asked to determine if there exist $(u,v) \in E$, such that $f(u)=f(v)=1$. In TRIANGLE we have a black box access to an adjacency matrix of a graph and we have to determine if the graph contains a triangle. For both of these problems the known lower bounds are trivial ($\Omega(\sqrt{n})$ and $\Omega(n)$, respectively) and there is no known matching upper …

Quantum queryQuantum PhysicsGeneral Computer ScienceFree accessTheoryofComputation_GENERALCollisionUpper and lower boundsOmegaGraphCombinatoricsComputer Science - Computational ComplexityAdjacency matrixQuantumMathematicsMathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

Rotation-Invariant Texture Retrieval via Signature Alignment Based on Steerable Sub-Gaussian Modeling

2008

This paper addresses the construction of a novel efficient rotation-invariant texture retrieval method that is based on the alignment in angle of signatures obtained via a steerable sub-Gaussian model. In our proposed scheme, we first construct a steerable multivariate sub-Gaussian model, where the fractional lower-order moments of a given image are associated with those of its rotated versions. The feature extraction step consists of estimating the so-called covariations between the orientation subbands of the corresponding steerable pyramid at the same or at adjacent decomposition levels and building an appropriate signature that can be rotated directly without the need of rotating the im…

RotationComputational complexity theoryGaussianFeature extractionNormal DistributionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONPattern Recognition Automatedsymbols.namesakeImage textureArtificial IntelligenceImage Interpretation Computer-AssistedComputer SimulationGaussian processImage retrievalMathematicsModels Statisticalbusiness.industryPattern recognitionImage EnhancementComputer Graphics and Computer-Aided DesignSimilitudeSubtraction TechniquesymbolsRotational invarianceArtificial intelligencebusinessAlgorithmsSoftwareIEEE Transactions on Image Processing
researchProduct

Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall

2016

Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …

RouterComputer sciencenetwork vulnerabilitiesDenial-of-service attack02 engineering and technologyNetwork topologyComputer securitycomputer.software_genreFirewall (construction)Stateful firewall0202 electrical engineering electronic engineering information engineeringDenial of Servicecomplexity attackcomputational complexitybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsHash tablese-curitycomputer networksDoSbusinessSegmentation faultcomputerRebootComputer network
researchProduct

Partitionability, coverability and colorability in graphs

2014

Our research are about graph coloring with distance constraints (packing coloring) or neighborhood constraints (Grundy coloring). Let S={si| i in N*} be a non decreasing sequence of integers. An S-packing coloring is a proper coloring such that every set of color i is an si-packing (a set of vertices at pairwise distance greater than si). A graph G is (s1,... ,sk)-colorable if there exists a packing coloring of G with colors 1,... ,k. A Grundy coloring is a proper vertex coloring such that for every vertex of color i, u is adjacent to a vertex of color j, for each ji. These results allow us to determine S-packing coloring of these lattices for several sequences of integers. We examine a cla…

S-coloration de packingDistanceColoration de GrundyPacking coloringLatticDominationGraphColoration de packingComputational complexityParameterized complexity[INFO.INFO-DM] Computer Science [cs]/Discrete Mathematics [cs.DM]ColorationGrapheCombinatoricsRegular graphColoringGrundy coloringGraphe régulierS -packing coloringComplexité algorithmiqueComplexité paramétrée
researchProduct

A Learning Automata Based Solution to Service Selection in Stochastic Environments

2010

Published version of a paper published in the book: Trends in Applied Intelligent Systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-13033-5_22 With the abundance of services available in today’s world, identifying those of high quality is becoming increasingly difficult. Reputation systems can offer generic recommendations by aggregating user provided opinions about service quality, however, are prone to ballot stuffing and badmouthing . In general, unfair ratings may degrade the trustworthiness of reputation systems, and changes in service quality over time render previous ratings unreliable. In this paper, we provide a novel solution to the above problems based …

Scheme (programming language)Computational complexity theoryComputer sciencemedia_common.quotation_subject0102 computer and information sciences02 engineering and technologyMachine learningcomputer.software_genreComputer security01 natural sciences0202 electrical engineering electronic engineering information engineeringQuality (business)Simplicitymedia_commoncomputer.programming_languageService qualityLearning automatabusiness.industryVDP::Technology: 500::Information and communication technology: 550VDP::Mathematics and natural science: 400::Information and communication science: 420::Knowledge based systems: 425010201 computation theory & mathematics020201 artificial intelligence & image processingStochastic optimizationArtificial intelligencebusinesscomputerReputation
researchProduct