Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • == Online Algorithms and Competitive Ratio== For online algorithms, a notion similar to the approximation ratio, the '''competitive ratio''' w ...
    33 KB (5,832 words) - 04:31, 8 November 2021
  • We present our algorithms in the original set cover setting (instead of the hitting set version). ...</math> is also the best approximation ratio achievable by polynomial time algorithms, assuming that '''NP'''<math>neq</math>'''P'''. ...
    33 KB (5,832 words) - 05:22, 29 October 2019
  • ...ters of random walks are closely related to the performances of randomized algorithms based on random walks: ...
    4 KB (699 words) - 15:06, 19 July 2011
  • [[Category:Algorithms]] ...
    4 KB (700 words) - 14:03, 20 September 2015
  • ...ly speaking). We need to introduce some general concepts for approximation algorithms. ...>. Apparently, this is a more natural way to relax the FPTAS to randomized algorithms as it mimics the way of generalizing class '''P''' to '''BPP''' for decisio ...
    23 KB (4,076 words) - 15:50, 12 May 2014
  • * Dowling, W. and Gallier, J. (1984), "Linear-time algorithms for testing the satisfiability of propositional Horn formulae". ''[[Journal ...
    5 KB (707 words) - 11:24, 18 May 2013
  • ...''Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis'', by Michael Mitzenmacher, Eli Upfal; Cambridge Universi ...y] and other [https://peteroupc.github.io/bernoulli.html Bernoulli factory algorithms] ...
    21 KB (2,159 words) - 03:46, 10 July 2024
  • ...The argument uses an important principle for the probabilistic analysis of algorithms: the principle of deferred decisions. ...ortant idea called '''random walks'''. There is a huge class of randomized algorithms for random sampling based on this principle. ...
    29 KB (4,994 words) - 01:21, 29 August 2011
  • ...''Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis'', by Michael Mitzenmacher, Eli Upfal; Cambridge Universi ...y] and other [https://peteroupc.github.io/bernoulli.html Bernoulli factory algorithms] ...
    21 KB (2,167 words) - 07:44, 27 February 2024
  • ;Oblivious routing algorithms ...ven more oblivious than this standard definition.) Compared to the routing algorithms which are adaptive to the path that the packet traversed, oblivious routing ...
    27 KB (4,865 words) - 07:47, 24 March 2014
  • ;Oblivious routing algorithms ...ven more oblivious than this standard definition.) Compared to the routing algorithms which are adaptive to the path that the packet traversed, oblivious routing ...
    27 KB (4,865 words) - 08:14, 24 March 2014
  • ...ions <math>f:\{0,1\}^*\rightarrow\mathbb{N}</math> computable by poly-time algorithms. The classes '''FP''' and '''#P''' are the analogs of '''P''' and '''NP''' For deterministic algorithms, there are negative news for this problem. ...
    37 KB (6,579 words) - 08:26, 7 June 2010
  • ...nd for the number of rounds required in the worst case by such distributed algorithms. This suggests us to define such a computational model for local distributed algorithms: any <math>t</math>-round local algorithm is described by a function ...
    25 KB (4,530 words) - 12:14, 26 May 2023
  • ...nd for the number of rounds required in the worst case by such distributed algorithms. This suggests us to define such a computational model for local distributed algorithms: any <math>t</math>-round local algorithm is described by a function ...
    25 KB (4,530 words) - 12:14, 29 May 2024
  • ...s a very simple scheme for boosting the accuracy of Monte Carlo randomized algorithms with two-sided errors. ...
    5 KB (842 words) - 01:10, 30 March 2010
  • ...raphs] have found extensive applications in computer science, in designing algorithms, [http://en.wikipedia.org/wiki/Error_correcting_code error correcting codes ...te. Studies of these two problems revolutionized the area of approximation algorithms. ...
    15 KB (2,745 words) - 10:19, 4 January 2011
  • ...ps://people.csail.mit.edu/jsolomon/share/book/numerical_book.pdf Numerical Algorithms: Methods for Computer Vision, Machine Learning, and Graphics. Justin Solom ...
    8 KB (752 words) - 08:34, 6 March 2024
  • The Feistel construction is also used in cryptographic algorithms other than block ciphers. For example, the [[Optimal Asymmetric Encryption ...
    5 KB (757 words) - 08:22, 4 April 2017
  • ;Oblivious routing algorithms ...ven more oblivious than this standard definition.) Compared to the routing algorithms which are adaptive to the path that the packet traversed, oblivious routing ...
    31 KB (5,481 words) - 03:52, 9 November 2010
  • ...is a structure shared by a class of optimization problems for which greedy algorithms work. ...
    7 KB (1,266 words) - 13:23, 11 December 2011
View ( | ) (20 | 50 | 100 | 250 | 500)