Search results for "computational complexity."

showing 10 items of 245 documents

Representing 2D Digital Objects

2000

The paper describes the combination a multi-views approach to represent connected components of 2D binary images. The approach is based on the Object Connectivity Graph (OCG), which is a sub-graph of the connectivity graph generated by the Discrete Cylindrical Algebraic Decomposition(DCAD) performed in the 2D discrete space. This construction allows us to find the number of connected components, to determine their connectivity degree, and to solve visibility problem. We show that the CAD construction, when performed on two orthogonal views, supply information to avoid ambiguities in the interpretation of each image component. The implementation of the algorithm is outlined and the computati…

Connected componentTheoretical computer scienceSettore INF/01 - InformaticaComputational complexity theoryDegree (graph theory)Computer scienceDiscrete spaceDigital topologyShape representationTopologyTheoretical Computer ScienceCylindrical algebraic decompositionComputer ScienceShape decompositionRepresentation (mathematics)Digital topologyConnectivityShape description
researchProduct

New delay-dependent stability conditions for time-varying delay systems

2013

Published version of an article in the journal: Mathematical Problems in Engineering. Also available from the publisher at: http://dx.doi.org/10.1155/2013/360924 Open Access This paper addresses the delay-dependent stability for systems with time-varying delay. First, by taking multi-integral terms into consideration, new Lyapunov-Krasovskii functional is defined. Second, in order to reduce the computational complexity of the main results, reciprocally convex approach and some special transformations are introduced, and new delay-dependent stability criteria are proposed, which are less conservative and have less decision variables than some previous results. Finally, two well-known example…

CorrectnessArticle SubjectComputational complexity theoryComputer scienceGeneral Mathematicslcsh:MathematicsGeneral EngineeringStability (learning theory)lcsh:QA1-939Delay dependentStability conditionsControl theorylcsh:TA1-2040VDP::Matematikk og Naturvitenskap: 400::Matematikk: 410::Analyse: 411lcsh:Engineering (General). Civil engineering (General)Algorithm
researchProduct

One-Counter Verifiers for Decidable Languages

2013

Condon and Lipton (FOCS 1989) showed that the class of languages having a space-bounded interactive proof system (IPS) is a proper subset of decidable languages, where the verifier is a probabilistic Turing machine. In this paper, we show that if we use architecturally restricted verifiers instead of restricting the working memory, i.e. replacing the working tape(s) with a single counter, we can define some IPS’s for each decidable language. Such verifiers are called two-way probabilistic one-counter automata (2pca’s). Then, we show that by adding a fixed-size quantum memory to a 2pca, called a two-way one-counter automaton with quantum and classical states (2qcca), the protocol can be spac…

Counter machineTheoryofComputation_COMPUTATIONBYABSTRACTDEVICESTheoretical computer scienceQuantum registerComputer scienceProbabilistic Turing machineProbabilistic logicInteractive proof systemComputer Science::Computational ComplexityDecidabilityAutomatonsymbols.namesakesymbolsProtocol (object-oriented programming)
researchProduct

FO^2 with one transitive relation is decidable

2013

We show that the satisfiability problem for the two-variable first-order logic, FO^2, over transitive structures when only one relation is required to be transitive, is decidable. The result is optimal, as FO^2 over structures with two transitive relations, or with one transitive and one equivalence relation, are known to be undecidable, so in fact, our result completes the classification of FO^2-logics over transitive structures with respect to decidability. We show that the satisfiability problem is in 2-NExpTime. Decidability of the finite satisfiability problem remains open.

Data processing Computer scienceclassical decision problem two-variable first-order logic decidability computational complexityddc:004Computer Science::Formal Languages and Automata Theory
researchProduct

Verbal ordinal classification with multicriteria decision aiding

2008

Abstract Professionals in neuropsychology usually perform diagnoses of patients’ behaviour in a verbal rather than in a numerical form. This fact generates interest in decision support systems that process verbal data. It also motivates us to develop methods for the classification of such data. In this paper, we describe ways of aiding classification of a discrete set of objects, evaluated on set of criteria that may have verbal estimations, into ordered decision classes. In some situations, there is no explicit additional information available, while in others it is possible to order the criteria lexicographically. We consider both of these cases. The proposed Dichotomic Classification (DC…

Decision support systemInformation Systems and ManagementGeneral Computer ScienceComputational complexity theoryComputer sciencebusiness.industryProcess (engineering)Management Science and Operations ResearchLexicographical orderObject (computer science)Machine learningcomputer.software_genreIndustrial and Manufacturing EngineeringSet (abstract data type)Modeling and SimulationArtificial intelligenceMedical diagnosisbusinesscomputerDecision analysisEuropean Journal of Operational Research
researchProduct

Weak and strong recognition by 2-way randomized automata

1997

Languages weakly recognized by a Monte Carlo 2-way finite automaton with n states are proved to be strongly recognized by a Monte Carlo 2-way finite automaton with no(n) states. This improves dramatically over the previously known result by M.Karpinski and R.Verbeek [10] which is also nontrivial since these languages can be nonregular [5]. For tally languages the increase in the number of states is proved to be only polynomial, and these languages are regular.

Deterministic pushdown automatonCombinatoricsDeterministic automatonProbabilistic automatonPushdown automatonQuantum finite automataBüchi automatonTwo-way deterministic finite automatonNondeterministic finite automatonComputer Science::Computational ComplexityComputer Science::Formal Languages and Automata TheoryMathematics
researchProduct

Algorithmic Information Theory and Computational Complexity

2013

We present examples where theorems on complexity of computation are proved using methods in algorithmic information theory. The first example is a non-effective construction of a language for which the size of any deterministic finite automaton exceeds the size of a probabilistic finite automaton with a bounded error exponentially. The second example refers to frequency computation. Frequency computation was introduced by Rose and McNaughton in early sixties and developed by Trakhtenbrot, Kinber, Degtev, Wechsung, Hinrichs and others. A transducer is a finite-state automaton with an input and an output. We consider the possibilities of probabilistic and frequency transducers and prove sever…

Discrete mathematicsAverage-case complexityAlgorithmic information theoryTheoryofComputation_COMPUTATIONBYABSTRACTDEVICESKolmogorov complexityDescriptive complexity theoryComputational physicsStructural complexity theoryTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESDeterministic finite automatonAsymptotic computational complexityComputer Science::Formal Languages and Automata TheoryComputational number theoryMathematics
researchProduct

Padding and the expressive power of existential second-order logics

1998

Padding techniques are well-known from Computational Complexity Theory. Here, an analogous concept is considered in the context of existential second-order logics. Informally, a graph H is a padded version of a graph G, if H consists of an isomorphic copy of G and some isolated vertices. A set A of graphs is called weakly expressible by a formula ϕ in the presence of padding, if ϕ is able to distinguish between (sufficiently) padded versions of graphs from A and padded versions of graphs that are not in A.

Discrete mathematicsComputational complexity theoryComputer sciencePaddingExpressive powerExistentialismGraphVertex (geometry)CombinatoricsLogical programmingComplexity classIsomorphismUnary functionMathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

Reordering Method and Hierarchies for Quantum and Classical Ordered Binary Decision Diagrams

2017

We consider Quantum OBDD model. It is restricted version of read-once Quantum Branching Programs, with respect to “width” complexity. It is known that maximal complexity gap between deterministic and quantum model is exponential. But there are few examples of such functions. We present method (called “reordering”), which allows to build Boolean function g from Boolean Function f, such that if for f we have gap between quantum and deterministic OBDD complexity for natural order of variables, then we have almost the same gap for function g, but for any order. Using it we construct the total function REQ which deterministic OBDD complexity is \(2^{\varOmega (n/log n)}\) and present quantum OBD…

Discrete mathematicsComputational complexity theoryImplicit functionBinary decision diagram010102 general mathematics0102 computer and information sciencesFunction (mathematics)Computer Science::Artificial IntelligenceComputer Science::Computational Complexity01 natural sciencesCombinatorics010201 computation theory & mathematicsComputer Science::Logic in Computer ScienceComplexity class0101 mathematicsBoolean functionQuantum complexity theoryQuantum computerMathematics
researchProduct

If P ≠ NP then Some Strongly Noninvertible Functions Are Invertible

2001

Rabi, Rivest, and Sherman alter the standard notion of noninvertibility to a new notion they call strong noninvertibility, and show--via explicit cryptographic protocols for secret-key agreement ([RS93, RS97] attribute this to Rivest and Sherman) and digital signatures [RS93, RS97]--that strongly noninvertible functions would be very useful components in protocol design. Their definition of strong noninvertibility has a small twist ("respecting the argument given") that is needed to ensure cryptographic usefulness. In this paper, we show that this small twist has a large, unexpected consequence: Unless P = NP, some strongly noninvertible functions are invertible.

Discrete mathematicsComputational complexity theorybusiness.industryP versus NP problemCryptographyCryptographic protocollaw.inventionInvertible matrixDigital signaturelawTwistbusinessTime complexityMathematics
researchProduct