Sciweavers

3415 search results - page 142 / 683
» Lower Bounds for Kernelizations
Sort
View
COCO
2009
Springer
119views Algorithms» more  COCO 2009»
15 years 11 months ago
An Approximation Algorithm for Approximation Rank
One of the strongest techniques available for showing lower bounds on quantum communication complexity is the logarithm of the approximation rank of the communication matrix— th...
Troy Lee, Adi Shraibman
FCT
2005
Springer
15 years 10 months ago
On the Black-Box Complexity of Sperner's Lemma
We present several results on the complexity of various forms of Sperner’s Lemma in the black-box model of computing. We give a deterministic algorithm for Sperner problems over ...
Katalin Friedl, Gábor Ivanyos, Miklos Santh...
CORR
2010
Springer
138views Education» more  CORR 2010»
15 years 4 months ago
Shallow Circuits with High-Powered Inputs
A polynomial identity testing algorithm must determine whether an input polynomial (given for instance by an arithmetic circuit) is identically equal to 0. In this paper, we show ...
Pascal Koiran
EUSFLAT
2007
154views Fuzzy Logic» more  EUSFLAT 2007»
15 years 6 months ago
Bounds for Value at Risk for Asymptotically Dependent Assets - the Copula Approach
The theory of copulas provides a useful tool for modeling dependence in risk management. In insurance and finance, as well as in other applications, dependence of extreme events ...
Piotr Jaworski
ICALP
2005
Springer
15 years 10 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos