Výsledky vyhledávání - Complexity Classes—Complexity hierarchies
-
1
Autoři:
Zdroj: Procedia Computer Science. 125:297-304
Témata: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Přístupová URL adresa: https://www.sciencedirect.com/science/article/pii/S1877050917328041
-
2
Autoři: a další
Relation: Szedmak, Sandor, Saunders, Craig, Shawe-Taylor, John and Rousu, Juho (2005) Learning Hierarchy via Embedding at Two-class Complexity. NIPS 2005 workshop on Kernel methods for stuctured domains.
Dostupnost: https://eprints.soton.ac.uk/265194/
-
3
Autoři:
Zdroj: Procedia Computer Science. 2018, Vol. 125, p297-304. 8p.
-
4
Autoři:
Přispěvatelé:
Témata: Categories and Subject Descriptors, E.3 [Data Encryption, Public-key Cryptosystems, F.1.3 [Computation by Abstract Devices, Complexity Measures and Classes—Complexity hierarchies, Relations among complexity classes, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Computations on discrete structures General Terms, Theory, Security, Algorithms Additional Key Words and Phrases, complexity theory, public-key cryptography, secret-key agreement, digital signatures, interactive proof systems, zero-knowledge protocols, one-way functions
Popis souboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.342.6969; http://arxiv.org/pdf/cs/0111056v2.pdf
-
5
Autoři: a další
Přispěvatelé: a další
Popis souboru: application/pdf
-
6
Autoři: a další
Zdroj: PLoS ONE; 10/10/2025, Vol. 20 Issue 10, p1-25, 25p
-
7
Autoři: a další
Zdroj: Meteorological Applications; May/Jun2024, Vol. 31 Issue 3, p1-16, 16p
-
8
Autoři: a další
Zdroj: Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing. :483-496
Témata: 0202 electrical engineering, electronic engineering, information engineering, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, THEORY OF COMPUTATION, COMPUTATIONAL COMPLEXITY AND CRYPTOGRAPHY, COMPLEXITY CLASSES, COMPLEXITY THEORY AND LOGIC, CRYPTOGRAPHIC PRIMITIVES, PROBLEMS, REDUCTIONS AND COMPLETENESS
Přístupová URL adresa: http://dl.acm.org/ft_gateway.cfm?id=3055466&type=pdf
https://dl.acm.org/doi/pdf/10.1145/3055399.3055466
https://doi.org/10.1145/3055399.3055466
https://dblp.uni-trier.de/db/conf/stoc/stoc2017.html#BallRSV17
https://dl.acm.org/ft_gateway.cfm?id=3055466&type=pdf
https://dl.acm.org/doi/10.1145/3055399.3055466
https://hdl.handle.net/11565/4073360
https://doi.org/10.1145/3055399.3055466 -
9
Autoři: Kristiansen, Lars
Zdroj: Theory of Computing Systems; Oct2008, Vol. 43 Issue 3/4, p516-541, 26p
-
10
Autoři: a další
Zdroj: Remote Sensing; Nov2025, Vol. 17 Issue 22, p3725, 44p
Témata: ZOSTERA marina, ENVIRONMENTAL degradation, SEAGRASS restoration, BENTHIC ecology, SEAWATER, ENVIRONMENTAL mapping, LAGOONS, MACHINE learning
Geografický termín: BALTIC Sea
-
11
Autoři: a další
Zdroj: Mathematics (2227-7390); Nov2025, Vol. 13 Issue 21, p3531, 26p
-
12
Autoři: a další
Zdroj: Global Journal of Pure & Applied Sciences; 2024, Vol. 30 Issue 4, p577-584, 8p
-
13
Autoři:
Zdroj: Land (2012); Nov2024, Vol. 13 Issue 11, p1954, 21p
-
14
Autoři: Nejad Hajali Irani, Gholamali
Zdroj: Iran Journal of Computer Science; Dec2025, Vol. 8 Issue 4, p2357-2386, 30p
-
15
Autoři:
Přispěvatelé:
Témata: Categories and Subject Descriptors, F. 1.2 [Computation by Abstract Devices, Modes of Computationparallelism, F. 1.3 [Computation by Abstract Devices, Complexity Classes-complexity hierarchies, relations among complexify measures, F.2.3 [Analysis of Algorithms and Problem Complexity, Trudeoffs among complexity classes General Terms, Theory, Verification Additional Key Words and Phrases, Concurrent-write, lower bounds, parallel random-access machines, parity
Popis souboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.143.8602; http://www.cs.washington.edu/homes/beame/papers/crcwparity.pdf
-
16
Autoři: a další
Přispěvatelé: a další
Témata: Categories and Subject Descriptors, D.1.2 [Programming Techniques, Automatic Programming, D.2.1 [Software Engineering, Requirements/Specifications, D.4.6 [Operating Systems, Security and Protection—Access controls, F.1.1 [Computation By Abstract Devices, Models of Computation—Automata, Bounded-action devices, F.1.3 [Computation By Abstract Devices, Complexity Classes—Complexity hierarchies, F.3.1 [Logics and Meanings of Programs, Specifying and Verifying and Reasoning about Programs—Specification techniques, K.6.5 [Management of Computing and Information Systems, Security and Protection General Terms, Security Additional Key Words and Phrases, program rewriting, reference monitors, execution monitoring, inlined reference monitoring
Popis souboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.9992; http://www.cs.cornell.edu/fbs/publications/EnfClasses.pdf
-
17
Autoři: Bercher, Pascal
Zdroj: AI Magazine; Winter2022, Vol. 43 Issue 4, p353-364, 12p
-
18
Autoři: a další
Zdroj: Electronics (2079-9292); Aug2025, Vol. 14 Issue 15, p2942, 33p
-
19
Autoři: BEROS, ACHILLES A.
Zdroj: Journal of Symbolic Logic; Sep2014, Vol. 79 Issue 3, p908-927, 20p
-
20
Autoři:
Zdroj: Fundamenta Informaticae; 2011, Vol. 111 Issue 1, p91-117, 27p
Full Text Finder
Nájsť tento článok vo Web of Science