標題: Titlebook: Exploring New Frontiers of Theoretical Informatics; IFIP 18th World Comp Jean-Jacques Levy,Ernst W. Mayr,John C. Mitchell Conference procee [打印本頁] 作者: 是消毒 時間: 2025-3-21 19:13
書目名稱Exploring New Frontiers of Theoretical Informatics影響因子(影響力)
書目名稱Exploring New Frontiers of Theoretical Informatics影響因子(影響力)學科排名
書目名稱Exploring New Frontiers of Theoretical Informatics網(wǎng)絡公開度
書目名稱Exploring New Frontiers of Theoretical Informatics網(wǎng)絡公開度學科排名
書目名稱Exploring New Frontiers of Theoretical Informatics被引頻次
書目名稱Exploring New Frontiers of Theoretical Informatics被引頻次學科排名
書目名稱Exploring New Frontiers of Theoretical Informatics年度引用
書目名稱Exploring New Frontiers of Theoretical Informatics年度引用學科排名
書目名稱Exploring New Frontiers of Theoretical Informatics讀者反饋
書目名稱Exploring New Frontiers of Theoretical Informatics讀者反饋學科排名
作者: 委托 時間: 2025-3-21 21:00 作者: Barter 時間: 2025-3-22 02:04 作者: faculty 時間: 2025-3-22 07:15 作者: Abominate 時間: 2025-3-22 11:34 作者: Iatrogenic 時間: 2025-3-22 13:22
Resource Bounded Immunity and Simplicity notions: strong immunity, almost immunity, and hyperimmunity as well as their corresponding simplicity notions. We also study .-. and .-. and their extensions: feasible .-. and feasible .-.. Finally, we propose the .-. hypothesis as a working hypothesis that ensures the existence of simple sets in 作者: Iatrogenic 時間: 2025-3-22 19:32
Degree Bounds on Polynomials and Relativization Theoryworld, (non)uniform gap-definability, and relativized separations. This way, we settle certain open questions of Hemaspaandra, Ramachandran & Zimand [HRZ95 ] and Fenner, Fortnow & Kurtz [FFK94], extend results of Hemaspaandra, Jain & Vereshchagin [HJV93] and construct oracles achieving desired resul作者: 跳動 時間: 2025-3-22 21:44
The Firing Squad Synchronization Problem with Many Generals for One-Dimensional CAeneral. A synchronous and an asynchronous version of the problem are considered. In the latter case the generals may start their activities at different times. In the synchronous case there are optimumtime solutions. Very simple and elegant techniques for constructing one of them are the main contri作者: dissolution 時間: 2025-3-23 04:41 作者: Glaci冰 時間: 2025-3-23 08:47 作者: 蒙太奇 時間: 2025-3-23 12:23
Efficient Protocols for Computing the Optimal Swap Edges of a Shortest Path Treesence of a single link failure: if the shortest path is not affected by the failed link, then the message will be delivered through that path; otherwise, the system will guarantee that, when the message reaches the node where the failure has occurred, the message will then be rerouted through the sh作者: disparage 時間: 2025-3-23 15:05 作者: gene-therapy 時間: 2025-3-23 21:50 作者: forbid 時間: 2025-3-23 23:17
Engineering an External Memory Minimum Spanning Tree Algorithmory algorithms for this problem and needs a factor of at least four less I/Os for realistic inputs..Our implementation indicates that this algorithm processes graphs only limited by the disk capacity of most current machines in time no more than a factor 2–5 of a good internal algorithm with suffici作者: apiary 時間: 2025-3-24 04:54 作者: 信任 時間: 2025-3-24 08:51
Approximation Algorithms for Mixed Fractional Packing and Covering Problemsal packing and covering problem:find . such that .. where .. are vectors with . nonnegative convex and concave functions, . and . are . - dimensional nonnegative vectors and . is a convex set that can be queried by an optimization or feasibility oracle. We propose an algorithm that needs only .... i作者: entitle 時間: 2025-3-24 12:14
Conference proceedings 2004ge-scale distributed programming, high bandwidth communications are inexpensive and widespread, and most of our work tools are equipped with processors enabling us to perform a multitude of tasks. In addition, mobile computing (referring specifically to wireless devices and, more broadly, to dynamic作者: browbeat 時間: 2025-3-24 15:26
1868-4238 rm for large-scale distributed programming, high bandwidth communications are inexpensive and widespread, and most of our work tools are equipped with processors enabling us to perform a multitude of tasks. In addition, mobile computing (referring specifically to wireless devices and, more broadly, 作者: Intercept 時間: 2025-3-24 20:42
Reginald A. Banez,Lixin Li,Zhu Han6 very dense equations of degree up to 255 in each of its 16 variables. With a single pair (.), with . a cleartext and . its encryption, its roots give all possible keys that should encrypt . to .. .. may be defined using 11 or more pairs ., and has 16 times as many equations in 176 variables. .. and most of .. is invariant for all key choices.作者: 即席 時間: 2025-3-25 00:30 作者: 過度 時間: 2025-3-25 06:00 作者: 含水層 時間: 2025-3-25 11:30
Remove key Escrow from the Identity-Based Encryption Systemthe same time maintaining some important properties of the IBE. We also present some cryptosystems based on our variant including a signature scheme and an authenticated key agreement. We finally show how to integrate our scheme into a hierarchial identity based public key encryption system.作者: irreducible 時間: 2025-3-25 13:59 作者: ESO 時間: 2025-3-25 17:15 作者: extinguish 時間: 2025-3-25 22:02
The Inherent Queuing Delay of Parallel Packet Switchesatus. When the PPS has buffers in its input-ports, an .. lower bound holds if the demultiplexing algorithm uses only local information, or the input buffers are small relative to the time an input-port needs to learn the switch global information.作者: Dysplasia 時間: 2025-3-26 03:24
Truthful Mechanisms for Generalized Utilitarian Problems of these three classes is straightforward, thus yielding a simple way to see whether VCGc mechanisms are appropriate or not..Finally, we apply our results to a number of basic non-utilitarian problems.作者: 注射器 時間: 2025-3-26 04:50
Alain Bensoussan,Jens Frehse,Phillip Yam is constant on them and combines such flats to flats of higher dimension in a second phase. This way, the algorithm is much faster than exhaustive search. Moreover, the algorithm benefits from randomising the first phase. In addition, by evaluating several flats implicitly in parallel, the time-complexity of the algorithm decreases further.作者: Anthrp 時間: 2025-3-26 10:00 作者: FICE 時間: 2025-3-26 14:56 作者: 夾克怕包裹 時間: 2025-3-26 18:31 作者: 欲望 時間: 2025-3-26 21:10
A Randomised Algorithm for Checking The Normality of Cryptographic Boolean Functions is constant on them and combines such flats to flats of higher dimension in a second phase. This way, the algorithm is much faster than exhaustive search. Moreover, the algorithm benefits from randomising the first phase. In addition, by evaluating several flats implicitly in parallel, the time-complexity of the algorithm decreases further.作者: ALERT 時間: 2025-3-27 01:20
The Firing Squad Synchronization Problem with Many Generals for One-Dimensional CAbution of this paper on the algorithmic side. For the asynchronous case an exact formula for the optimum synchronization time of each instance is derived. We prove that no CA can solve all instances in optimum time, but we describe a CA whose running time is very close to it; it only needs additional .. steps.作者: 內(nèi)向者 時間: 2025-3-27 06:11 作者: HERTZ 時間: 2025-3-27 12:07 作者: gusher 時間: 2025-3-27 15:35 作者: 鑒賞家 時間: 2025-3-27 20:58
Scheduling With Release Times and Deadlines on A Minimum Number of Machinessisting of jobs with slack at most one can be solved efficiently. We close the resulting gap by showing that the problem already becomes .-. if slacks up to 2 are allowed. Additionally, we consider several variants of the SRDM problem and provide exact and approximation algorithms.作者: 抵消 時間: 2025-3-28 01:08 作者: Distribution 時間: 2025-3-28 03:45
Reversible Circuit Realizations of Boolean Functionshe realization. Second, we provide concrete realizations for several families of Boolean functions, such as the adder, incrementor, and threshold functions, which do not necessarily satisfy the preceding condition, but still have polynomial-size realizations; this is important because such realizati作者: 蛤肉 時間: 2025-3-28 09:44
Efficient Protocols for Computing the Optimal Swap Edges of a Shortest Path Treerithm uses messages containing a constant amount of information, while the other is tailored for systems that allow long messages. The amount of data transferred by the protocols is the same and depends on on the structure of the shortest-path spanning-tree; it is no more, and sometimes significantl作者: FELON 時間: 2025-3-28 10:38
The Driving Philosophersrness and concurrency at the same time as well as the impossibility of solving the problem in an asynchronous model. We also conjecture the impossibility of solving the problem in an ad-hoc network model with limited-range communication.作者: Basilar-Artery 時間: 2025-3-28 17:44 作者: 時代錯誤 時間: 2025-3-28 21:34
Conference proceedings 2004ilding and analyzing such systems....Reflecting the diverse and wide spectrum of topics and interests within the theoretical computer science community, .Exploring New Frontiers of Theoretical Informatics., is presented in two distinct but interrelated tracks:..-Algorithms, Complexity and Models of 作者: 河潭 時間: 2025-3-29 01:48
Food and Identity in Early Rabbinic Judaismhat approaches like this will become the core of the algorithmics,because they provide a deeper insight in the hardness of specific problems and in many application we are not interested in the worst-case problem hardness, but in the hardness of forthcoming problem instances.作者: LARK 時間: 2025-3-29 04:12 作者: 鋼盔 時間: 2025-3-29 10:53 作者: 言外之意 時間: 2025-3-29 11:46 作者: 粗糙濫制 時間: 2025-3-29 18:45
The tPI (tRNA Pairing Index) a Mathematical Measure of Repetition in a (Biological) Sequence作者: 飲料 時間: 2025-3-29 20:42
Exploring New Frontiers of Theoretical InformaticsIFIP 18th World Comp作者: ATP861 時間: 2025-3-30 02:23 作者: 躺下殘殺 時間: 2025-3-30 04:16 作者: 雪上輕舟飛過 時間: 2025-3-30 11:30
https://doi.org/10.1007/978-3-030-59837-2ty for all applications. In this paper, we present a scheme which removes the key escrow from the IBE system proposed by Bonch and Franklin, while at the same time maintaining some important properties of the IBE. We also present some cryptosystems based on our variant including a signature scheme a作者: 懶洋洋 時間: 2025-3-30 13:48
Alain Bensoussan,Jens Frehse,Phillip Yamsystems. This paper presents an asymmetric Monte Carlo algorithm to determine whether a given Boolean function is normal. Our algorithm is far faster than the best known (deterministic) algorithm of Daum et al. In a first phase, it checks for flats of low dimension whether the given Boolean function作者: 戲法 時間: 2025-3-30 19:52
Mean Field Models for Spin Glassesblock cyphers. In 1980, Toffoli showed how to realize a Boolean function by a reversible circuit, however the resulting complexity of such circuits has remained an open problem. We investigate the reversible circuit complexity of families of Boolean functions and derive conditions that characterize 作者: UTTER 時間: 2025-3-30 21:40 作者: 面包屑 時間: 2025-3-31 02:13
Preliminaries and Auxiliary Results,world, (non)uniform gap-definability, and relativized separations. This way, we settle certain open questions of Hemaspaandra, Ramachandran & Zimand [HRZ95 ] and Fenner, Fortnow & Kurtz [FFK94], extend results of Hemaspaandra, Jain & Vereshchagin [HJV93] and construct oracles achieving desired resul作者: Meager 時間: 2025-3-31 07:49
https://doi.org/10.1007/978-94-017-6101-7eneral. A synchronous and an asynchronous version of the problem are considered. In the latter case the generals may start their activities at different times. In the synchronous case there are optimumtime solutions. Very simple and elegant techniques for constructing one of them are the main contri作者: 樸素 時間: 2025-3-31 11:30 作者: 無畏 時間: 2025-3-31 13:55
Sonja Starc,Carys Jones,Arianna Maioraniced by the PPS’s demultiplexing algorithm, relative to an optimal work-conserving switch..We show that the inherent queuing delay and delay jitter of a symmetric and fault-tolerant . PPS, where every demultiplexing algorithm dispatches cells to all the middle-stage switches is ., if there are no buf作者: 拱形大橋 時間: 2025-3-31 18:21
Art of Living and Art of Aging,sence of a single link failure: if the shortest path is not affected by the failed link, then the message will be delivered through that path; otherwise, the system will guarantee that, when the message reaches the node where the failure has occurred, the message will then be rerouted through the sh作者: observatory 時間: 2025-3-31 23:51
Meaning and Analysis: New Essays on Gricen and whose agents’ utilities are not quasi-linear. We provide a generalization of utilitarian problems,termed . problems, and prove that every consistent problem admits a .. These mechanisms,termed . (VCGc) mechanisms,can be seen as a natural extension of VCG mechanisms for utilitarian problems..We作者: BILL 時間: 2025-4-1 03:36 作者: sebaceous-gland 時間: 2025-4-1 08:31 作者: 預兆好 時間: 2025-4-1 11:39
https://doi.org/10.1007/978-3-7091-7113-4d processing times. The goal is to find a non-preemptive schedule such that all jobs meet their deadlines and the number of machines needed to process all jobs is minimum. If all jobs have equal release times and equal deadlines, SRDM is the classical bin packing problem, which is .-.. The . of a jo作者: 發(fā)怨言 時間: 2025-4-1 15:26
The Semiotics of Social Identity,al packing and covering problem:find . such that .. where .. are vectors with . nonnegative convex and concave functions, . and . are . - dimensional nonnegative vectors and . is a convex set that can be queried by an optimization or feasibility oracle. We propose an algorithm that needs only .... i作者: 艦旗 時間: 2025-4-1 21:36 作者: Mets552 時間: 2025-4-2 00:44
MEAN FIELD THEORIES AND DUAL VARIATION notions: strong immunity, almost immunity, and hyperimmunity as well as their corresponding simplicity notions. We also study .-. and .-. and their extensions: feasible .-. and feasible .-.. Finally, we propose the .-. hypothesis as a working hypothesis that ensures the existence of simple sets in NP.