Search results for "computational complexity."

showing 10 items of 245 documents

Unary Probabilistic and Quantum Automata on Promise Problems

2015

We continue the systematic investigation of probabilistic and quantum finite automata (PFAs and QFAs) on promise problems by focusing on unary languages. We show that bounded-error QFAs are more powerful than PFAs. But, in contrary to the binary problems, the computational powers of Las-Vegas QFAs and bounded-error PFAs are equivalent to deterministic finite automata (DFAs). Lastly, we present a new family of unary promise problems with two parameters such that when fixing one parameter QFAs can be exponentially more succinct than PFAs and when fixing the other parameter PFAs can be exponentially more succinct than DFAs.

State-transition matrixDiscrete mathematicsDeterministic finite automatonUnary operationMarkov chainUnary languageProbabilistic logicQuantum finite automataBinary numberComputer Science::Computational ComplexityComputer Science::Formal Languages and Automata TheoryMathematics
researchProduct

Steady-state and tracking analysis of a robust adaptive filter with low computational cost

2007

This paper analyses a new adaptive algorithm that is robust to impulse noise and has a low computational load [E. Soria, J.D. Martin, A.J. Serrano, J. Calpe, and J. Chambers, A new robust adaptive algorithm with low computacional cost, Electron. Lett. 42 (1) (2006) 60-62]. The algorithm is based on two premises: the use of the cost function often used in independent component analysis and a fuzzy modelling of the hyperbolic tangent function. The steady-state error and tracking capability of the algorithm are analysed using conservation methods [A. Sayed, Fundamentals of Adaptive Filtering, Wiley, New York, 2003], thus verifying the correspondence between theory and experimental results.

Steady stateComputational complexity theoryAdaptive algorithmFunction (mathematics)Tracking (particle physics)Impulse noiseIndependent component analysisAdaptive filterControl and Systems EngineeringControl theorySignal ProcessingComputer Vision and Pattern RecognitionElectrical and Electronic EngineeringSoftwareMathematicsSignal Processing
researchProduct

Three-dimensional phase unwrapping using the Hungarian algorithm.

2009

We propose a three-dimensional phase unwrapping technique that uses the Hungarian algorithm to join together all the partial residual loops that may occur in a wrapped phase volume. Experimental results have shown that the proposed algorithm is more robust and reliable than other well-known three-dimensional phase unwrapping algorithms. Additionally, the proposed algorithm is fast in terms of computational complexity, which makes it suitable for practical applications.

Synthetic aperture radarComputational complexity theorybusiness.industryComputer scienceResidualPhase unwrappingAtomic and Molecular Physics and OpticsStructured-light 3D scannerOpticsHungarian algorithmbusinessPhase retrievalTelecommunicationsAlgorithmPhase volumeOptics letters
researchProduct

Evaluation of GPU-based Seed Generation for Computational Genomics Using Burrows-Wheeler Transform

2012

Unprecedented production of short reads from the new high-throughput sequencers has posed challenges to align short reads to reference genomes with high sensitivity and high speed. Many CPU-based short read aligners have been developed to address this challenge. Among them, one popular approach is the seed-and-extend heuristic. For this heuristic, the first and foremost step is to generate seeds between the input reads and the reference genome, where hash tables are the most frequently used data structure. However, hash tables are memory-consuming, making it not well-suited to memory-stringent many-core architectures, like GPUs, even though they usually have a nearly constant query time com…

Theoretical computer scienceBurrows–Wheeler transformComputational complexity theoryComputer scienceComputational genomicsParallel computingData structureTime complexityHash table2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum
researchProduct

Two-way quantum and classical machines with small memory for online minimization problems

2019

We consider online algorithms. Typically the model is investigated with respect to competitive ratio. In this paper, we explore algorithms with small memory. We investigate two-way automata as a model for online algorithms with restricted memory. We focus on quantum and classical online algorithms. We show that there are problems that can be better solved by two-way automata with quantum and classical states than classical two-way automata in the case of sublogarithmic memory (sublinear size).

Theoretical computer scienceComputational complexity theoryCompetitive analysisSublinear functionComputer scienceOnline algorithmFocus (optics)QuantumAutomatonQuantum computerInternational Conference on Micro- and Nano-Electronics 2018
researchProduct

Work Partitioning on Parallel and Distributed Agent-Based Simulation

2017

Work partitioning is a key challenge with ap- plications in many scientific and technological fields. The problem is very well studied with a rich literature on both distributed and parallel computing architectures. In this paper we deal with the work partitioning problem for parallel and distributed agent-based simulations which aims at (i) balancing the overall load distribution, (ii) minimizing, at the same time, the communication overhead due to agents' inter-dependencies. We introduce a classification taxonomy of work partitioning strategies and present a space-based work partitioning ap- proach, based on a Quad-tree data structure, which enables to: identify a good space partitioning …

Theoretical computer scienceComputational complexity theoryComputer Networks and CommunicationsComputer scienceDistributed computingContext (language use)02 engineering and technologyParallel ComputingSynchronization (computer science)0202 electrical engineering electronic engineering information engineeringOverhead (computing)Space partitioningAgent-based simulation020203 distributed computingAgent-based simulations; D-MASON; Distributed Systems; Parallel Computing; Work partitioning; Hardware and Architecture; Computer Networks and Communications; Information SystemsFlocking (behavior)Agent-based simulations020206 networking & telecommunicationsWork partitioningData structureDistributed SystemComputer Networks and CommunicationD-MASONDistributed SystemsHardware and ArchitectureBoidsInformation Systems2017 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
researchProduct

An improved quantum query algorithm for computing AND Boolean function

2010

We consider the quantum query model for computing Boolean functions. The definition of the function is known, but a black box contains the input X = (x 1 , x 2 , …, x n ). Black box can be accessed by querying x i values. The goal is to develop an algorithm, which would compute the function value for arbitrary input using as few queries to the black box as possible. We present two different quantum query algorithms for computing the basic Boolean function — logical AND of two bits. Both algorithms use only one query to determine the function value. Correct answer probability for the first algorithm is 80%, but for the second algorithm it is 90%. To compute this function with the same probab…

Theoretical computer scienceComputational complexity theoryLogical conjunctionBlack boxGrover's algorithmAlgorithm designFunction (mathematics)Boolean functionAlgorithmComputer Science::DatabasesQuantum computerMathematicsIEEE Congress on Evolutionary Computation
researchProduct

Extracting string motif bases for quorum higher than two

2012

Bases of generators of motifs consisting of strings in which some positions can be occupied by a don’t care provide a useful conceptual tool for their description and a way to reduce the time and space involved in the discovery process. In the last few years, a few algorithms have been proposed for the extraction of a basis, building in large part on combinatorial properties of strings and their autocorrelations. Currently, the most efficient techniques for binary alphabets and quorum q = 2 require time quadratic in the length of the host string. The present paper explores properties of motif bases for quorum q ≥ 2, both with binary and general alphabets, by also showing that important resu…

Theoretical computer scienceGeneral Computer ScienceBasis (linear algebra)Computational complexity theorySpacetimeString (computer science)Binary numberTheoretical Computer ScienceBusiness process discoverySet (abstract data type)Quadratic equationpattern discovery string motif basisComputer Science(all)MathematicsTheoretical Computer Science
researchProduct

Correlation Analysis of Node and Edge Centrality Measures in Artificial Complex Networks

2021

The role of an actor in a social network is identified through a set of measures called centrality. Degree centrality, betweenness centrality, closeness centrality, and clustering coefficient are the most frequently used metrics to compute the node centrality. Their computational complexity in some cases makes unfeasible, when not practically impossible, their computations. For this reason, we focused on two alternative measures, WERW-Kpath and Game of Thieves, which are at the same time highly descriptive and computationally affordable. Our experiments show that a strong correlation exists between WERW-Kpath and Game of Thieves and the classical centrality measures. This may suggest the po…

Theoretical computer scienceSettore INF/01 - InformaticaComputational complexity theorySocial networkComputer sciencebusiness.industryNode (networking)Complex networksComplex networkSocial network analysisK-pathBetweenness centralityCentrality measuresCorrelation coefficientsCentralitybusinessSocial network analysisClustering coefficient
researchProduct

Game of Thieves and WERW-Kpath: Two Novel Measures of Node and Edge Centrality for Mafia Networks

2021

Real-world complex systems can be modeled as homogeneous or heterogeneous graphs composed by nodes connected by edges. The importance of nodes and edges is formally described by a set of measures called centralities which are typically studied for graphs of small size. The proliferation of digital collection of data has led to huge graphs with billions of nodes and edges. For this reason, we focus on two new algorithms, Game of Thieves and WERW-Kpath which are computationally-light alternatives to the canonical centrality measures such as degree, node and edge betweenness, closeness and clustering. We explore the correlation among these measures using the Spearman’s correlation coefficient …

Theoretical computer scienceSettore INF/01 - InformaticaDegree (graph theory)Computer scienceClosenessComplex networksMafia networksComplex networkCorrelationComputational complexityBetweenness centralityNode (computer science)CentralityRank (graph theory)Cluster analysisCentrality
researchProduct