Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • *Let <math>F_C = F_A \and F_B</math> be the Bloom filter formed by computing the bitwise AND of <math>F_A</math> and <math>F_B</math>. Argue that <math> ...
    2 KB (406 words) - 14:53, 22 September 2018
  • = Computing Graph Expansion = ...can be verified in poly-time. However, there is no efficient algorithm for computing the <math>\phi(G)</math> unless '''NP'''='''P'''. ...
    8 KB (1,407 words) - 02:23, 25 July 2011
  • ...on algorithms for counting and sampling problems. Typical problems include computing marginal probabilities and expectations of random variables, the evaluation :何昆:Kun HE received his Ph.D. degree from the Institute of Computing Technology, Chinese Academy of Sciences in 2019. Currently he is a postdoct ...
    20 KB (1,328 words) - 14:52, 20 November 2020
  • * [https://arxiv.org/abs/1907.09415 Ronald de Wolf. Quantum Computing: Lecture Notes.] ...
    4 KB (379 words) - 12:06, 27 September 2021
  • The proposition can be formally verified by computing these expectations. Although these equations look formal, the intuitive int ...
    4 KB (690 words) - 07:14, 14 October 2019
  • Besides directly computing the probability <math>\Pr[X\ge t]</math>, we want to have some general way ...
    3 KB (541 words) - 15:18, 21 July 2011
  • ...r <math>v</math> is adjacent to a vertex in <math>D</math>. The problem of computing minimum dominating set is NP-hard. ...
    3 KB (542 words) - 11:27, 9 April 2014
  • ...d store the results in memory. Afterwards he can decrypt the ciphertext by computing ''D<sub>K</sub>''(''C'') for each ''K''. Any matches between these two resu ...
    3 KB (474 words) - 09:45, 20 October 2014
  • ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...
    9 KB (1,662 words) - 07:05, 15 November 2011
  • |data17 = '''Probability and Computing''' (2E) <br> Michael Mitzenmacher and Eli Upfal <br> Cambridge University * '''[MU]''' ''Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis ...
    15 KB (1,488 words) - 11:17, 6 May 2024
  • ...r <math>v</math> is adjacent to a vertex in <math>D</math>. The problem of computing minimum dominating set is NP-hard. ...
    3 KB (604 words) - 09:12, 23 November 2015
  • ...r <math>v</math> is adjacent to a vertex in <math>D</math>. The problem of computing minimum dominating set is NP-hard. ...
    3 KB (604 words) - 05:32, 31 October 2016
  • ...r <math>v</math> is adjacent to a vertex in <math>D</math>. The problem of computing minimum dominating set is NP-hard. ...
    3 KB (622 words) - 11:08, 22 December 2020
  • ...mal language] (not entirely the same thing as the c language). The task of computing <math>f(x)</math> is equivalent to that of determining whether <math>x\in L ...nomial size certificate, the algorithm <math>A</math> verifies (instead of computing) the <math>f(x)</math> for any positive instance <math>x</math> in polynomi ...
    11 KB (1,828 words) - 06:00, 27 August 2011
  • A naive way of checking the equality is first computing <math>AB</math> and then comparing the result with <math>C</math>. The (asy ...
    4 KB (694 words) - 03:25, 23 July 2011
  • ;The Monte Carlo method for computing <math>\mathrm{e}</math> ...
    4 KB (606 words) - 01:47, 10 October 2011
  • ...r <math>v</math> is adjacent to a vertex in <math>D</math>. The problem of computing minimum dominating set is NP-hard. ...
    3 KB (666 words) - 04:44, 23 July 2013
  • * [[Computer language]] for application of formal languages in computing ...
    5 KB (710 words) - 00:57, 25 February 2017
  • ...e need the following theorem, which holds generally and is very useful for computing the AND of many events. ...
    5 KB (881 words) - 02:35, 19 July 2011
  • ...r <math>v</math> is adjacent to a vertex in <math>D</math>. The problem of computing minimum dominating set is NP-hard. ...
    4 KB (762 words) - 08:28, 19 November 2019
  • ...r <math>v</math> is adjacent to a vertex in <math>D</math>. The problem of computing minimum dominating set is NP-hard. ...
    4 KB (769 words) - 12:19, 12 November 2017
  • ...ok.html|title = Proceedings of the Third Annual ACM Symposium on Theory of Computing|pages = 151–158}}</ref> ...ust 1% of the worst-case number of computation and that saves a ''lot'' of computing, but that is still <math>0.01 \times (2^n)</math> computations. And every e ...
    15 KB (2,427 words) - 22:24, 16 August 2017
  • |data17 = '''Probability and Computing''' (2E) <br> Michael Mitzenmacher and Eli Upfal <br> Cambridge University * '''[MU]''' ''Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis ...
    21 KB (2,167 words) - 07:44, 27 February 2024
  • Computing the moment generating function <math>\mathbf{E}[e^{\lambda X}]</math>: We propose an extremely simple "randomized algorithm" for computing a <math>b\in\{-1,+1\}^m</math>: for each <math>i=1,2,\ldots, m</math>, let ...
    15 KB (2,761 words) - 06:11, 8 December 2015
  • ...tudies of algorithms for elimination orderings in combinatorial scientific computing, our result is the first rigorous incorporation of randomized tools in this :Huacheng Yu (俞华程) is a postdoctoral researcher in the Theory of Computing group at Harvard University. He obtained his PhD from Stanford University i ...
    14 KB (1,850 words) - 01:51, 7 May 2018
  • We propose an extremely simple "randomized algorithm" for computing a <math>b\in\{-1,+1\}^m</math>: for each <math>i=1,2,\ldots, m</math>, let ...
    5 KB (952 words) - 02:52, 19 July 2011
  • ...> multiplications, which is too expensive. We describe an efficient way of computing the [http://en.wikipedia.org/wiki/Modular_exponentiation modular exponent] ...ed a number instead of a list of all colorings, we expect cleverer ways of computing this number than the brute force enumeration. ...
    29 KB (4,994 words) - 01:21, 29 August 2011
  • ...he search for new Mersenne primes is the goal of the [[GIMPS]] distributed computing project. *[http://www.oddperfect.org OddPerfect.org] A projected distributed computing project to search for odd perfect numbers. ...
    12 KB (1,697 words) - 23:40, 1 August 2016
  • |data13 = Mitzenmacher and Upfal. <br>''Probability and Computing: Randomized Algorithms and Probabilistic Analysis''. <br> Cambridge Univ Pr ...
    9 KB (893 words) - 12:43, 15 September 2017
  • [[Decryption]] of a ciphertext <math>(R_n, L_n)</math> is accomplished by computing for <math>i=n,n-1,\ldots,1</math> ...
    5 KB (757 words) - 08:22, 4 April 2017
  • ...]</math> by the definition of expectations. There is also a smarter way of computing <math>\mathbf{E}[X]</math>, by using indicators and the linearity of expec ...e need the following theorem, which holds generally and is very useful for computing the AND of many events. ...
    26 KB (4,811 words) - 10:33, 11 March 2013
  • |data13 = Mitzenmacher and Upfal. <br>''Probability and Computing: Randomized Algorithms and Probabilistic Analysis''. <br> Cambridge Univ Pr ...
    9 KB (846 words) - 07:34, 2 June 2014
  • Generally, the '''Principle of Inclusion-Exclusion''' states the rule for computing the union of <math>n</math> finite sets <math>A_1,A_2,\ldots,A_n</math>, su === Computing Möbius functions=== ...
    33 KB (6,205 words) - 01:11, 22 September 2011
  • Generally, the '''Principle of Inclusion-Exclusion''' states the rule for computing the union of <math>n</math> finite sets <math>A_1,A_2,\ldots,A_n</math>, su === Computing Möbius functions=== ...
    33 KB (6,227 words) - 07:00, 29 September 2016
  • Generally, the '''Principle of Inclusion-Exclusion''' states the rule for computing the union of <math>n</math> finite sets <math>A_1,A_2,\ldots,A_n</math>, su === Computing Möbius functions=== ...
    33 KB (6,227 words) - 06:15, 30 September 2019
  • Generally, the '''Principle of Inclusion-Exclusion''' states the rule for computing the union of <math>n</math> finite sets <math>A_1,A_2,\ldots,A_n</math>, su === Computing Möbius functions=== ...
    33 KB (6,227 words) - 09:51, 19 March 2024
  • Generally, the '''Principle of Inclusion-Exclusion''' states the rule for computing the union of <math>n</math> finite sets <math>A_1,A_2,\ldots,A_n</math>, su === Computing Möbius functions=== ...
    33 KB (6,227 words) - 11:45, 15 October 2017
  • Generally, the '''Principle of Inclusion-Exclusion''' states the rule for computing the union of <math>n</math> finite sets <math>A_1,A_2,\ldots,A_n</math>, su === Computing Möbius functions=== ...
    33 KB (6,227 words) - 12:45, 16 March 2023
  • ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...
    16 KB (2,886 words) - 07:49, 13 November 2011
  • ...]</math> by the definition of expectations. There is also a smarter way of computing <math>\mathbf{E}[X]</math>, by using indicators and the linearity of expec ...e need the following theorem, which holds generally and is very useful for computing the AND of many events. ...
    26 KB (4,614 words) - 07:53, 10 March 2014
  • * '''Reading assignment''': Mitzenmacher and Upfal, ''Probability and Computing, second edition'', '''Chapter 17''' "Balanced Allocations and Cuckoo Hashin ...
    13 KB (1,313 words) - 05:54, 11 October 2022
  • |data13 = Mitzenmacher and Upfal. <br>''Probability and Computing: Randomized Algorithms and Probabilistic Analysis''. <br> Cambridge Univ Pr ...
    10 KB (1,029 words) - 12:44, 15 September 2017
  • ...on algorithms for counting and sampling problems. Typical problems include computing marginal probabilities and expectations of random variables, the evaluation ...
    16 KB (900 words) - 04:52, 13 November 2020
  • ...on algorithms for counting and sampling problems. Typical problems include computing marginal probabilities and expectations of random variables, the evaluation ...
    16 KB (900 words) - 04:54, 13 November 2020
  • == Computing graph expansion == ...can be verified in poly-time. However, there is no efficient algorithm for computing the <math>\phi(G)</math> unless '''NP'''='''P'''. ...
    34 KB (6,244 words) - 15:28, 8 June 2013
  • ...ber of perfect matchings of <math>G</math>. This problem can be reduced to computing the '''permanent''' of a square matrix. ...his problem can be reduced to computing the permanent, thus the problem of computing the permanents is also '''#P-hard'''. ...
    37 KB (6,579 words) - 08:26, 7 June 2010
  • ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...
    30 KB (5,354 words) - 13:38, 18 September 2018
  • ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...
    30 KB (5,354 words) - 11:26, 8 September 2020
  • ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...
    30 KB (5,354 words) - 05:43, 13 September 2022
  • ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...
    30 KB (5,354 words) - 13:18, 6 September 2019
  • ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...
    30 KB (5,354 words) - 08:06, 6 September 2021
  • ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...
    30 KB (5,348 words) - 12:54, 17 September 2017
  • ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...
    30 KB (5,347 words) - 05:55, 26 November 2016
  • Computing the moment generating function <math>\mathbf{E}[e^{\lambda X}]</math>: We propose an extremely simple "randomized algorithm" for computing a <math>b\in\{-1,+1\}^m</math>: for each <math>i=1,2,\ldots, m</math>, let ...
    27 KB (4,865 words) - 07:47, 24 March 2014
  • Computing the moment generating function <math>\mathbf{E}[e^{\lambda X}]</math>: The problem raises from parallel computing. Consider that we have <math>N</math> processors, connected by a communicat ...
    27 KB (4,865 words) - 08:14, 24 March 2014
  • Computing the moment generating function <math>\mathbf{E}[e^{\lambda X}]</math>: ...
    10 KB (1,796 words) - 02:51, 19 July 2011
  • == Computing graph expansion == ...can be verified in poly-time. However, there is no efficient algorithm for computing the <math>\phi(G)</math> unless '''NP'''='''P'''. ...
    37 KB (6,824 words) - 02:20, 29 December 2015
  • We propose an extremely simple "randomized algorithm" for computing a <math>b\in\{-1,+1\}^m</math>: for each <math>i=1,2,\ldots, m</math>, let The problem raises from parallel computing. Consider that we have <math>N</math> processors, connected by a communicat ...
    17 KB (3,066 words) - 06:06, 18 April 2013
  • ...> multiplications, which is too expensive. We describe an efficient way of computing the [http://en.wikipedia.org/wiki/Modular_exponentiation modular exponent] ...
    21 KB (3,794 words) - 09:47, 10 September 2015
  • ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...
    20 KB (3,617 words) - 01:24, 8 June 2010
  • |caption = ''Probability and Computing: Randomized Algorithms and Probabilistic Analysis'', Mitzenmacher and Upfal ...
    12 KB (1,037 words) - 12:45, 15 September 2017
  • ...d the analysis of random graphs by [Janson, Combinatorics, Probability and Computing `94]. This leads to a routine that in quadratic time, sparsifies a graph do ...
    7 KB (999 words) - 05:35, 13 July 2017
  • The proposition can be formally verified by computing these expectations. Although these equations look formal, the intuitive int ...
    8 KB (1,547 words) - 08:58, 16 October 2011
  • == Computing graph expansion == ...can be verified in poly-time. However, there is no efficient algorithm for computing the <math>\phi(G)</math> unless '''NP'''='''P'''. ...
    41 KB (7,547 words) - 09:24, 22 May 2023
  • ...]</math> by the definition of expectations. There is also a smarter way of computing <math>\mathbf{E}[X]</math>, by using indicators and the linearity of expec ...e need the following theorem, which holds generally and is very useful for computing the AND of many events. ...
    34 KB (5,979 words) - 13:52, 20 September 2010
  • The proposition can be formally verified by computing these expectations. Although these equations look formal, the intuitive int ...
    10 KB (1,940 words) - 03:37, 19 October 2021
  • The proposition can be formally verified by computing these expectations. Although these equations look formal, the intuitive int ...
    10 KB (1,940 words) - 07:38, 14 October 2019
  • The proposition can be formally verified by computing these expectations. Although these equations look formal, the intuitive int ...
    10 KB (1,940 words) - 10:53, 10 October 2023
  • The proposition can be formally verified by computing these expectations. Although these equations look formal, the intuitive int ...
    10 KB (1,940 words) - 22:39, 15 September 2020
  • The proposition can be formally verified by computing these expectations. Although these equations look formal, the intuitive int ...
    10 KB (1,940 words) - 12:53, 11 October 2022
  • *Let <math>F_C = F_A \land F_B</math> be the Bloom filter formed by computing the bitwise AND of <math>F_A</math> and <math>F_B</math>. Argue that <math> ...
    9 KB (1,531 words) - 10:30, 18 October 2021
  • ...y | first4=BP | year=2007 | title=Numerical Recipes: The Art of Scientific Computing | edition=3rd | publisher=Cambridge University Press | publication-place=N ...
    8 KB (1,133 words) - 09:45, 26 June 2017
  • ...mal language] (not entirely the same thing as the c language). The task of computing <math>f(x)</math> is equivalent to that of determining whether <math>x\in L ...nomial size certificate, the algorithm <math>A</math> verifies (instead of computing) the <math>f(x)</math> for any positive instance <math>x</math> in polynomi ...
    25 KB (4,263 words) - 08:43, 7 June 2010
  • ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...
    37 KB (6,665 words) - 12:21, 19 September 2023
  • ...ath>G(n,p)</math> is connected, then we can compare the probabilities, but computing the probability that a random graph is connected is a very non-trivial task ...show that with coupling, we can compare two distributions without actually computing the probabilities. ...
    29 KB (4,888 words) - 09:13, 16 December 2011
  • ...solve problems of other areas such as [[engineering]], [[physics]], and [[computing]]. ...
    9 KB (1,088 words) - 18:04, 22 August 2017
  • ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...
    22 KB (3,591 words) - 03:54, 17 February 2014
  • ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...
    22 KB (3,591 words) - 10:45, 4 March 2013
  • #* See Chapter 7.1.1 of Probability and Computing for an analysis of the random walk algorithm for 2SAT ...
    13 KB (1,427 words) - 15:57, 9 January 2024
  • ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...
    28 KB (5,169 words) - 11:26, 13 September 2015
  • ...y when dividing two numbers in [[integer]] or fixed-point arithmetic; when computing mathematical functions such as [[square root]]s, [[logarithm]]s, and [[sine ...0.01 = 217.84, then rounding ''y'' to the integer ''q'' = 218, and finally computing ''z'' = ''q''×''m'' = 218×0.01 = 2.18. ...
    46 KB (7,060 words) - 01:36, 21 August 2017
  • ...]</math> by the definition of expectations. There is also a smarter way of computing <math>\mathbf{E}[X]</math>, by using indicators and the linearity of expec ...
    30 KB (5,405 words) - 09:12, 17 September 2015
  • He also invented an original method for computing the probable size of a polymer in good solution. He invented the [[Flory-Hu ...
    9 KB (1,269 words) - 01:38, 22 March 2015
  • The problem raises from parallel computing. Consider that we have <math>N</math> processors, connected by a communicat ...
    12 KB (2,110 words) - 02:55, 19 July 2011
  • We propose an extremely simple "randomized algorithm" for computing a <math>b\in\{-1,+1\}^m</math>: for each <math>i=1,2,\ldots, m</math>, let The problem raises from parallel computing. Consider that we have <math>N</math> processors, connected by a communicat ...
    31 KB (5,481 words) - 03:52, 9 November 2010
  • ...bit numbers is done <math>\bmod 2^u</math>, and have a one-line C-code for computing the hash function: ...
    15 KB (2,781 words) - 06:17, 29 September 2021
  • ...bit numbers is done <math>\bmod 2^u</math>, and have a one-line C-code for computing the hash function: ...
    15 KB (2,781 words) - 16:38, 26 September 2023
  • ...bit numbers is done <math>\bmod 2^u</math>, and have a one-line C-code for computing the hash function: ...
    15 KB (2,781 words) - 15:47, 3 October 2022
  • ...ath>G(n,p)</math> is connected, then we can compare the probabilities, but computing the probability that a random graph is connected is a very non-trivial task ...show that with coupling, we can compare two distributions without actually computing the probabilities. ...
    37 KB (6,516 words) - 08:40, 7 June 2010
  • ...can be verified in poly-time. However, there is no efficient algorithm for computing the <math>\phi(G)</math> unless '''NP'''='''P'''. ...
    15 KB (2,745 words) - 10:19, 4 January 2011
  • The [[Automated Readability Index]] was designed for [[real-time computing]] of readability for the electric [[typewriter]].<ref>{{cite journal ...
    11 KB (1,581 words) - 08:33, 13 September 2015
  • ...bit numbers is done <math>\bmod 2^u</math>, and have a one-line C-code for computing the hash function: ...
    16 KB (2,812 words) - 06:21, 21 November 2011
  • Computing the moment generating function <math>\mathbf{E}[e^{\lambda X}]</math>: ...
    21 KB (3,854 words) - 02:21, 19 September 2018
  • Computing the moment generating function <math>\mathbf{E}[e^{\lambda X}]</math>: ...
    21 KB (3,854 words) - 09:28, 16 September 2020
  • Computing the moment generating function <math>\mathbf{E}[e^{\lambda X}]</math>: ...
    21 KB (3,854 words) - 09:32, 16 September 2020
  • Computing the moment generating function <math>\mathbf{E}[e^{\lambda X}]</math>: ...
    21 KB (3,854 words) - 05:30, 20 September 2017
  • Computing the moment generating function <math>\mathbf{E}[e^{\lambda X}]</math>: ...
    21 KB (3,868 words) - 05:58, 26 November 2016
  • Generally, the '''Principle of Inclusion-Exclusion''' states the rule for computing the union of <math>n</math> finite sets <math>A_1,A_2,\ldots,A_n</math>, su ...
    19 KB (3,458 words) - 07:33, 12 March 2014
  • Generally, the '''Principle of Inclusion-Exclusion''' states the rule for computing the union of <math>n</math> finite sets <math>A_1,A_2,\ldots,A_n</math>, su ...
    19 KB (3,458 words) - 06:18, 20 March 2013
  • Generally, the '''Principle of Inclusion-Exclusion''' states the rule for computing the union of <math>n</math> finite sets <math>A_1,A_2,\ldots,A_n</math>, su ...
    19 KB (3,458 words) - 06:51, 12 October 2015
View ( | ) (20 | 50 | 100 | 250 | 500)