We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 6,324 results
  1. Characterization of Process Families

    This Chapter characterizes in general terms the behaviour of three outstanding classes of computational processes working with arbitrary data...
    Egon Börger, Vincenzo Gervasi in Structures of Computing
    Chapter 2024
  2. Complexity-theoretic aspects of expanding cellular automata

    The expanding cellular automata (XCA) variant of cellular automata is investigated and characterized from a complexity-theoretical standpoint. An XCA...

    Augusto Modanese in Natural Computing
    Article Open access 10 November 2020
  3. Leśniewski’s Ontology – Proof-Theoretic Characterization

    The ontology of Leśniewski is commonly regarded as the most comprehensive calculus of names and the theoretical basis of mereology. However, ontology...
    Andrzej Indrzejczak in Automated Reasoning
    Conference paper Open access 2022
  4. Autoencoder-kNN meta-model based data characterization approach for an automated selection of AI algorithms

    The recent evolution of machine learning (ML) algorithms and the high level of expertise required to use them have fuelled the demand for non-experts...

    Moncef Garouani, Adeel Ahmad, ... Mohamed Hamlich in Journal of Big Data
    Article Open access 03 February 2023
  5. A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss

    Cleve’s celebrated lower bound (STOC’86) showed that a de facto strong fairness notion is impossible in 2-party coin toss, i.e., the corrupt party...
    Ke Wu, Gilad Asharov, Elaine Shi in Advances in Cryptology – EUROCRYPT 2022
    Conference paper 2022
  6. A Characterization of Functions over the Integers Computable in Polynomial Time Using Discrete Ordinary Differential Equations

    This paper studies the expressive and computational power of discrete Ordinary Differential Equations (ODEs), a.k.a. (Ordinary) Difference Equations....

    Olivier Bournez, Arnaud Durand in computational complexity
    Article 12 July 2023
  7. On the complexity of rational verification

    Rational verification refers to the problem of checking which temporal logic properties hold of a concurrent/multiagent system, under the assumption...

    Julian Gutierrez, Muhammad Najib, ... Michael Wooldridge in Annals of Mathematics and Artificial Intelligence
    Article Open access 14 July 2022
  8. Decision-Dominant Strategic Defense Against Lateral Movement for 5G Zero-Trust Multi-Domain Networks

    Multi-domain warfare is a military doctrine that leverages capabilities from different domains, including air, land, sea, space, and cyberspace, to...
    Tao Li, Yunian Pan, Quanyan Zhu in Network Security Empowered by Artificial Intelligence
    Chapter 2024
  9. A novel approach based on rough set theory for analyzing information disorder

    The paper presents and evaluates an approach based on Rough Set Theory, and some variants and extensions of this theory, to analyze phenomena related...

    Angelo Gaeta, Vincenzo Loia, ... Francesco Orciuoli in Applied Intelligence
    Article Open access 01 December 2022
  10. Reoptimization of parameterized problems

    Parameterized complexity allows us to analyze the time complexity of problems with respect to a natural parameter depending on the problem....

    Hans-Joachim Böckenhauer, Elisabet Burjons, ... Peter Rossmanith in Acta Informatica
    Article Open access 25 July 2022
  11. Residual Wavelon Convolutional Networks for Characterization of Disease Response on MRI

    Wavelets have shown significant promise for medical image decomposition and artifact pre-processing by representing inputs via shifted and scaled...
    Amir Reza Sadri, Thomas DeSilvio, ... Satish E. Viswanath in Medical Image Computing and Computer Assisted Intervention – MICCAI 2022
    Conference paper 2022
  12. Empirical study on meta-feature characterization for multi-objective optimization problems

    Algorithm recommendation based on meta-learning was studied previously. The research on the meta-features extraction, which is a key for the success...

    **anghua Chu, Jiayun Wang, ... Yuqiu Guo in Neural Computing and Applications
    Article 13 May 2022
  13. Cryptography from Planted Graphs: Security with Logarithmic-Size Messages

    We study the following broad question about cryptographic primitives: is it possible to achieve security against arbitrary...
    Damiano Abram, Amos Beimel, ... Varun Narayanan in Theory of Cryptography
    Conference paper 2023
  14. Linear Properties of Functions

    This chapter is focused on linear affine-invariant properties of functions...
    Arnab Bhattacharyya, Yuichi Yoshida in Property Testing
    Chapter 2022
  15. The Price of Defense

    Marios Mavronicolas, Loizos Michael, ... Paul G. Spirakis in Algorithmica
    Article 04 January 2021
  16. Blockchain Participation Games

    We study game-theoretic models for capturing participation in blockchain systems. Existing blockchains can be naturally viewed as games, where a set...
    Pyrros Chaidos, Aggelos Kiayias, Evangelos Markakis in Web and Internet Economics
    Conference paper 2024
  17. Synthesis of Elementary Cellular Automata for Targeted Cache Applications

    Stephen Wolfram’s Cellular Automata (CA) is a powerful universal computing tool. It can provide design solution for various cache applications and...
    Sutapa Sarkar, Mousumi Saha in Advances in Computing and Data Sciences
    Conference paper 2023
  18. A Uniform Framework for Language Inclusion Problems

    We present a uniform approach for solving language inclusion problems. Our approach relies on a least fixpoint characterization and a quasiorder to...
    Kyveli Doveri, Pierre Ganty, Chana Weil-Kennedy in Taming the Infinities of Concurrency
    Chapter 2024
  19. Complexity-Theoretic Aspects of Expanding Cellular Automata

    The expanding cellular automata (XCA) variant of cellular automata is investigated and characterized from a complexity-theoretical standpoint. The...
    Conference paper 2019
  20. Algorithm selection using edge ML and case-based reasoning

    In practical data mining, a wide range of classification algorithms is employed for prediction tasks. However, selecting the best algorithm poses a...

    Rahman Ali, Muhammad Sadiq Hassan Zada, ... Jamil Hussain in Journal of Cloud Computing
    Article Open access 21 November 2023
Did you find what you were looking for? Share feedback.