Search results
Jump to navigation
Jump to search
- *Let <math>F_C = F_A \and F_B</math> be the Bloom filter formed by computing the bitwise AND of <math>F_A</math> and <math>F_B</math>. Argue that <math> ...2 KB (406 words) - 14:53, 22 September 2018
- = Computing Graph Expansion = ...can be verified in poly-time. However, there is no efficient algorithm for computing the <math>\phi(G)</math> unless '''NP'''='''P'''. ...8 KB (1,407 words) - 02:23, 25 July 2011
- ...on algorithms for counting and sampling problems. Typical problems include computing marginal probabilities and expectations of random variables, the evaluation :何昆:Kun HE received his Ph.D. degree from the Institute of Computing Technology, Chinese Academy of Sciences in 2019. Currently he is a postdoct ...20 KB (1,328 words) - 14:52, 20 November 2020
- * [https://arxiv.org/abs/1907.09415 Ronald de Wolf. Quantum Computing: Lecture Notes.] ...4 KB (379 words) - 12:06, 27 September 2021
- The proposition can be formally verified by computing these expectations. Although these equations look formal, the intuitive int ...4 KB (690 words) - 07:14, 14 October 2019
- Besides directly computing the probability <math>\Pr[X\ge t]</math>, we want to have some general way ...3 KB (541 words) - 15:18, 21 July 2011
- ...r <math>v</math> is adjacent to a vertex in <math>D</math>. The problem of computing minimum dominating set is NP-hard. ...3 KB (542 words) - 11:27, 9 April 2014
- ...d store the results in memory. Afterwards he can decrypt the ciphertext by computing ''D<sub>K</sub>''(''C'') for each ''K''. Any matches between these two resu ...3 KB (474 words) - 09:45, 20 October 2014
- ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...9 KB (1,662 words) - 07:05, 15 November 2011
- |data17 = '''Probability and Computing''' (2E) <br> Michael Mitzenmacher and Eli Upfal <br> Cambridge University * '''[MU]''' ''Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis ...15 KB (1,488 words) - 11:17, 6 May 2024
- ...r <math>v</math> is adjacent to a vertex in <math>D</math>. The problem of computing minimum dominating set is NP-hard. ...3 KB (604 words) - 09:12, 23 November 2015
- ...r <math>v</math> is adjacent to a vertex in <math>D</math>. The problem of computing minimum dominating set is NP-hard. ...3 KB (604 words) - 05:32, 31 October 2016
- ...r <math>v</math> is adjacent to a vertex in <math>D</math>. The problem of computing minimum dominating set is NP-hard. ...3 KB (622 words) - 11:08, 22 December 2020
- ...mal language] (not entirely the same thing as the c language). The task of computing <math>f(x)</math> is equivalent to that of determining whether <math>x\in L ...nomial size certificate, the algorithm <math>A</math> verifies (instead of computing) the <math>f(x)</math> for any positive instance <math>x</math> in polynomi ...11 KB (1,828 words) - 06:00, 27 August 2011
- A naive way of checking the equality is first computing <math>AB</math> and then comparing the result with <math>C</math>. The (asy ...4 KB (694 words) - 03:25, 23 July 2011
- ;The Monte Carlo method for computing <math>\mathrm{e}</math> ...4 KB (606 words) - 01:47, 10 October 2011
- ...r <math>v</math> is adjacent to a vertex in <math>D</math>. The problem of computing minimum dominating set is NP-hard. ...3 KB (666 words) - 04:44, 23 July 2013
- * [[Computer language]] for application of formal languages in computing ...5 KB (710 words) - 00:57, 25 February 2017
- ...e need the following theorem, which holds generally and is very useful for computing the AND of many events. ...5 KB (881 words) - 02:35, 19 July 2011
- ...r <math>v</math> is adjacent to a vertex in <math>D</math>. The problem of computing minimum dominating set is NP-hard. ...4 KB (762 words) - 08:28, 19 November 2019
- ...r <math>v</math> is adjacent to a vertex in <math>D</math>. The problem of computing minimum dominating set is NP-hard. ...4 KB (769 words) - 12:19, 12 November 2017
- ...ok.html|title = Proceedings of the Third Annual ACM Symposium on Theory of Computing|pages = 151–158}}</ref> ...ust 1% of the worst-case number of computation and that saves a ''lot'' of computing, but that is still <math>0.01 \times (2^n)</math> computations. And every e ...15 KB (2,427 words) - 22:24, 16 August 2017
- |data17 = '''Probability and Computing''' (2E) <br> Michael Mitzenmacher and Eli Upfal <br> Cambridge University * '''[MU]''' ''Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis ...21 KB (2,167 words) - 07:44, 27 February 2024
- Computing the moment generating function <math>\mathbf{E}[e^{\lambda X}]</math>: We propose an extremely simple "randomized algorithm" for computing a <math>b\in\{-1,+1\}^m</math>: for each <math>i=1,2,\ldots, m</math>, let ...15 KB (2,761 words) - 06:11, 8 December 2015
- ...tudies of algorithms for elimination orderings in combinatorial scientific computing, our result is the first rigorous incorporation of randomized tools in this :Huacheng Yu (俞华程) is a postdoctoral researcher in the Theory of Computing group at Harvard University. He obtained his PhD from Stanford University i ...14 KB (1,850 words) - 01:51, 7 May 2018
- We propose an extremely simple "randomized algorithm" for computing a <math>b\in\{-1,+1\}^m</math>: for each <math>i=1,2,\ldots, m</math>, let ...5 KB (952 words) - 02:52, 19 July 2011
- ...> multiplications, which is too expensive. We describe an efficient way of computing the [http://en.wikipedia.org/wiki/Modular_exponentiation modular exponent] ...ed a number instead of a list of all colorings, we expect cleverer ways of computing this number than the brute force enumeration. ...29 KB (4,994 words) - 01:21, 29 August 2011
- ...he search for new Mersenne primes is the goal of the [[GIMPS]] distributed computing project. *[http://www.oddperfect.org OddPerfect.org] A projected distributed computing project to search for odd perfect numbers. ...12 KB (1,697 words) - 23:40, 1 August 2016
- |data13 = Mitzenmacher and Upfal. <br>''Probability and Computing: Randomized Algorithms and Probabilistic Analysis''. <br> Cambridge Univ Pr ...9 KB (893 words) - 12:43, 15 September 2017
- [[Decryption]] of a ciphertext <math>(R_n, L_n)</math> is accomplished by computing for <math>i=n,n-1,\ldots,1</math> ...5 KB (757 words) - 08:22, 4 April 2017
- ...]</math> by the definition of expectations. There is also a smarter way of computing <math>\mathbf{E}[X]</math>, by using indicators and the linearity of expec ...e need the following theorem, which holds generally and is very useful for computing the AND of many events. ...26 KB (4,811 words) - 10:33, 11 March 2013
- |data13 = Mitzenmacher and Upfal. <br>''Probability and Computing: Randomized Algorithms and Probabilistic Analysis''. <br> Cambridge Univ Pr ...9 KB (846 words) - 07:34, 2 June 2014
- Generally, the '''Principle of Inclusion-Exclusion''' states the rule for computing the union of <math>n</math> finite sets <math>A_1,A_2,\ldots,A_n</math>, su === Computing Möbius functions=== ...33 KB (6,205 words) - 01:11, 22 September 2011
- Generally, the '''Principle of Inclusion-Exclusion''' states the rule for computing the union of <math>n</math> finite sets <math>A_1,A_2,\ldots,A_n</math>, su === Computing Möbius functions=== ...33 KB (6,227 words) - 07:00, 29 September 2016
- Generally, the '''Principle of Inclusion-Exclusion''' states the rule for computing the union of <math>n</math> finite sets <math>A_1,A_2,\ldots,A_n</math>, su === Computing Möbius functions=== ...33 KB (6,227 words) - 06:15, 30 September 2019
- Generally, the '''Principle of Inclusion-Exclusion''' states the rule for computing the union of <math>n</math> finite sets <math>A_1,A_2,\ldots,A_n</math>, su === Computing Möbius functions=== ...33 KB (6,227 words) - 09:51, 19 March 2024
- Generally, the '''Principle of Inclusion-Exclusion''' states the rule for computing the union of <math>n</math> finite sets <math>A_1,A_2,\ldots,A_n</math>, su === Computing Möbius functions=== ...33 KB (6,227 words) - 11:45, 15 October 2017
- Generally, the '''Principle of Inclusion-Exclusion''' states the rule for computing the union of <math>n</math> finite sets <math>A_1,A_2,\ldots,A_n</math>, su === Computing Möbius functions=== ...33 KB (6,227 words) - 12:45, 16 March 2023
- ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...16 KB (2,886 words) - 07:49, 13 November 2011
- ...]</math> by the definition of expectations. There is also a smarter way of computing <math>\mathbf{E}[X]</math>, by using indicators and the linearity of expec ...e need the following theorem, which holds generally and is very useful for computing the AND of many events. ...26 KB (4,614 words) - 07:53, 10 March 2014
- * '''Reading assignment''': Mitzenmacher and Upfal, ''Probability and Computing, second edition'', '''Chapter 17''' "Balanced Allocations and Cuckoo Hashin ...13 KB (1,313 words) - 05:54, 11 October 2022
- |data13 = Mitzenmacher and Upfal. <br>''Probability and Computing: Randomized Algorithms and Probabilistic Analysis''. <br> Cambridge Univ Pr ...10 KB (1,029 words) - 12:44, 15 September 2017
- ...on algorithms for counting and sampling problems. Typical problems include computing marginal probabilities and expectations of random variables, the evaluation ...16 KB (900 words) - 04:52, 13 November 2020
- ...on algorithms for counting and sampling problems. Typical problems include computing marginal probabilities and expectations of random variables, the evaluation ...16 KB (900 words) - 04:54, 13 November 2020
- == Computing graph expansion == ...can be verified in poly-time. However, there is no efficient algorithm for computing the <math>\phi(G)</math> unless '''NP'''='''P'''. ...34 KB (6,244 words) - 15:28, 8 June 2013
- ...ber of perfect matchings of <math>G</math>. This problem can be reduced to computing the '''permanent''' of a square matrix. ...his problem can be reduced to computing the permanent, thus the problem of computing the permanents is also '''#P-hard'''. ...37 KB (6,579 words) - 08:26, 7 June 2010
- ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...30 KB (5,354 words) - 05:43, 13 September 2022
- ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...30 KB (5,354 words) - 13:18, 6 September 2019
- ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...30 KB (5,354 words) - 08:06, 6 September 2021
- ...for deterministic communication protocols, this is the best we can get for computing EQ. :Any deterministic communication protocol computing EQ on two <math>n</math>-bit strings costs <math>n</math> bits of communica ...30 KB (5,354 words) - 13:38, 18 September 2018