Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • [[Category:Algorithms]] ...
    4 KB (700 words) - 14:03, 20 September 2015
  • ...ly speaking). We need to introduce some general concepts for approximation algorithms. ...>. Apparently, this is a more natural way to relax the FPTAS to randomized algorithms as it mimics the way of generalizing class '''P''' to '''BPP''' for decisio ...
    23 KB (4,076 words) - 15:50, 12 May 2014
  • * Dowling, W. and Gallier, J. (1984), "Linear-time algorithms for testing the satisfiability of propositional Horn formulae". ''[[Journal ...
    5 KB (707 words) - 11:24, 18 May 2013
  • ...''Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis'', by Michael Mitzenmacher, Eli Upfal; Cambridge Universi ...y] and other [https://peteroupc.github.io/bernoulli.html Bernoulli factory algorithms] ...
    21 KB (2,159 words) - 03:46, 10 July 2024
  • ...The argument uses an important principle for the probabilistic analysis of algorithms: the principle of deferred decisions. ...ortant idea called '''random walks'''. There is a huge class of randomized algorithms for random sampling based on this principle. ...
    29 KB (4,994 words) - 01:21, 29 August 2011
  • ...''Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis'', by Michael Mitzenmacher, Eli Upfal; Cambridge Universi ...y] and other [https://peteroupc.github.io/bernoulli.html Bernoulli factory algorithms] ...
    21 KB (2,167 words) - 07:44, 27 February 2024
  • ;Oblivious routing algorithms ...ven more oblivious than this standard definition.) Compared to the routing algorithms which are adaptive to the path that the packet traversed, oblivious routing ...
    27 KB (4,865 words) - 07:47, 24 March 2014
  • ;Oblivious routing algorithms ...ven more oblivious than this standard definition.) Compared to the routing algorithms which are adaptive to the path that the packet traversed, oblivious routing ...
    27 KB (4,865 words) - 08:14, 24 March 2014
  • ...ions <math>f:\{0,1\}^*\rightarrow\mathbb{N}</math> computable by poly-time algorithms. The classes '''FP''' and '''#P''' are the analogs of '''P''' and '''NP''' For deterministic algorithms, there are negative news for this problem. ...
    37 KB (6,579 words) - 08:26, 7 June 2010
  • ...nd for the number of rounds required in the worst case by such distributed algorithms. This suggests us to define such a computational model for local distributed algorithms: any <math>t</math>-round local algorithm is described by a function ...
    25 KB (4,530 words) - 12:14, 26 May 2023
  • ...nd for the number of rounds required in the worst case by such distributed algorithms. This suggests us to define such a computational model for local distributed algorithms: any <math>t</math>-round local algorithm is described by a function ...
    25 KB (4,530 words) - 12:14, 29 May 2024
  • ...s a very simple scheme for boosting the accuracy of Monte Carlo randomized algorithms with two-sided errors. ...
    5 KB (842 words) - 01:10, 30 March 2010
  • ...raphs] have found extensive applications in computer science, in designing algorithms, [http://en.wikipedia.org/wiki/Error_correcting_code error correcting codes ...te. Studies of these two problems revolutionized the area of approximation algorithms. ...
    15 KB (2,745 words) - 10:19, 4 January 2011
  • ...ps://people.csail.mit.edu/jsolomon/share/book/numerical_book.pdf Numerical Algorithms: Methods for Computer Vision, Machine Learning, and Graphics. Justin Solom ...
    8 KB (752 words) - 08:34, 6 March 2024
  • The Feistel construction is also used in cryptographic algorithms other than block ciphers. For example, the [[Optimal Asymmetric Encryption ...
    5 KB (757 words) - 08:22, 4 April 2017
  • ;Oblivious routing algorithms ...ven more oblivious than this standard definition.) Compared to the routing algorithms which are adaptive to the path that the packet traversed, oblivious routing ...
    31 KB (5,481 words) - 03:52, 9 November 2010
  • ...is a structure shared by a class of optimization problems for which greedy algorithms work. ...
    7 KB (1,266 words) - 13:23, 11 December 2011
  • ...ps://people.csail.mit.edu/jsolomon/share/book/numerical_book.pdf Numerical Algorithms: Methods for Computer Vision, Machine Learning, and Graphics. Justin Solom ...
    7 KB (719 words) - 05:22, 12 June 2024
  • We will show that on any instance of the Max-SAT, one of the two algorithms is a <math>\frac{3}{4}</math>-approximation algorithm. ...
    8 KB (1,443 words) - 14:02, 6 November 2011
  • We will show that on any instance of the Max-SAT, one of the two algorithms is a <math>\frac{3}{4}</math>-approximation algorithm. ...
    8 KB (1,443 words) - 05:44, 13 November 2015
View ( | ) (20 | 50 | 100 | 250 | 500)