Search Results - "computational and structural complexity"
-
1
Splitting NP-Complete Sets
ISSN: 0097-5397, 1095-7111Published: Philadelphia, PA Society for Industrial and Applied Mathematics 01.01.2008Published in SIAM journal on computing (01.01.2008)“…We show that a set is m-autoreducible if and only if it is m-mitotic. This solves a long-standing open question in a surprising way. As a consequence of this…”
Get full text
Journal Article -
2
Approximation Algorithms for 3D Orthogonal Knapsack
ISSN: 1000-9000, 1860-4749Published: Boston Springer US 01.09.2008Published in Journal of computer science and technology (01.09.2008)“…We study non-overlapping axis-parallel packings of 3D boxes with profits into a dedicated bigger box where rotation is either forbidden or permitted, and we…”
Get full text
Journal Article -
3
Extended skew partition problem
ISSN: 0012-365X, 1872-681XPublished: Elsevier B.V 06.10.2006Published in Discrete mathematics (06.10.2006)“…A skew partition as defined by Chvátal is a partition of the vertex set of a graph into four nonempty parts A 1 , A 2 , B 1 , B 2 such that there are all…”
Get full text
Journal Article -
4
The Boolean functions computed by random Boolean formulas or how to grow the right function
ISSN: 1042-9832, 1098-2418Published: Hoboken Wiley Subscription Services, Inc., A Wiley Company 01.12.2005Published in Random structures & algorithms (01.12.2005)“…We characterize growth processes (probabilistic amplification) by their initial conditions to derive conditions under which results such as Valiant's J…”
Get full text
Journal Article -
5
On the ultimate complexity of factorials
ISSN: 0304-3975, 1879-2294Published: Amsterdam Elsevier B.V 20.10.2004Published in Theoretical computer science (20.10.2004)“…It has long been observed that certain factorization algorithms provide a way to write the product of many different integers succinctly. In this paper, we…”
Get full text
Journal Article -
6
Deadlock prevention by acyclic orientations
ISSN: 0166-218X, 1872-6771Published: Elsevier B.V 15.06.2003Published in Discrete Applied Mathematics (15.06.2003)“…Deadlock prevention for routing messages has a central role in communication networks, since it directly influences the correctness of parallel and distributed…”
Get full text
Journal Article -
7
Why almost all satisfiable $k$-CNF formulas are easy
ISSN: 1365-8050, 1462-7264, 1365-8050Published: DMTCS 01.01.2007Published in Discrete mathematics and theoretical computer science (01.01.2007)“…Finding a satisfying assignment for a $k$-CNF formula $(k \geq 3)$, assuming such exists, is a notoriously hard problem. In this work we consider the uniform…”
Get full text
Journal Article Conference Proceeding -
8
Nonerasing, Counting, and Majority over the Linear Time Hierarchy
ISSN: 0890-5401, 1090-2651Published: San Diego, CA Elsevier Inc 01.05.2002Published in Information and computation (01.05.2002)“…In this paper, we investigate several extensions of the linear time hierarchy (denoted by LTH). We first prove that it is not necessary to erase the oracle…”
Get full text
Journal Article -
9
Path-Constrained Relaxed Schedulability Analysis
Published: IEEE 01.09.2007Published in Ninth International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC 2007) (01.09.2007)“…The schedulability analysis problem for many realistic task models is known to be hard (NP or coNP). As this severely restricts the application of these task…”
Get full text
Conference Proceeding