Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1418967 - MaRDI portal

scientific article; zbMATH DE number 1418967

From MaRDI portal
Publication:4942157

zbMath1001.68050MaRDI QIDQ4942157

Ding-Zhu Du, Ker-I. Ko

Publication date: 20 March 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.


Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (63)

Influence maximization problem: properties and algorithmsA note on quadratic residuosity and UPPolynomially-bounded Dehn functions of groupsOn the complexity of the pancake problem\(\mathbf P =\mathbf{NP}\) for some structures over the binary wordsRelativized collapsing between BPP and PH under stringent oracle accessPolynomial time quantum computation with adviceA semantically secure public key cryptoscheme using bit-pair shadowsA provably secure non-iterative hash function resisting birthday attackOn the complexity of finding circumscribed rectangles and squares for a two-dimensional domainA Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical SecurityOn the complexity of computing the logarithm and square root functions on a complex domainA new algorithm design technique for hard problemsNew dominating sets in social networksOn parallel complexity of analytic functionsOn testing monomials in multivariate polynomialsSpace functions and space complexity of the word problem in semigroups.Complexity and Algorithms for Well-Structured k-SAT InstancesOn positive influence dominating sets in social networksObservations on complete sets between linear time and polynomial timeLevels of undecidability in rewritingA public key cryptosystem based on three new provable problemsSimple explanation of the no-free-lunch theorem and its implicationsOn the complexity of computing the Hausdorff distanceManaging complexity in industrial collaborationsIn Memoriam: Ker-I Ko (1950–2018)On the complexity of non-unique probe selectionFinding quasi core with simulated stacked neural networksOn the Complexity of Convex Hulls of Subsets of the Two-Dimensional PlanePolynomial upper bounds on the size of changes of a RAM+BOOL program as a tool for proving belonging to FPComputational ludicsOn the Complexity of the Pancake ProblemJordan Curves with Polynomial Inverse Moduli of ContinuityConformant plans and beyond: principles and complexityComputation of algebraic numbers and arithmetic operations over them with linear memoryLower bounds and the hardness of counting propertiesThe computational complexity of distance functions of two-dimensional domainsAccepting networks of genetic processors are computationally completeComputational power of infinite quantum parallelismArthur and Merlin as OraclesAsymptotic granularity reduction and its applicationA note on width-parameterized SAT: an exact machine-model characterizationPolynomial-time right-ideal morphisms and congruencesFunction operators spanning the arithmetical and the polynomial hierarchyExact and approximate algorithms for discounted \(\{0\text{-}1\}\) knapsack problemNon-unique probe selection and group testingJordan curves with polynomial inverse moduli of continuityAlgorithms for randomized time-varying knapsack problemsSmale’s 17th problem: Average polynomial time to compute affine and projective solutions$LINSPACE$ конструктивный аналог функции $(1+x)^h$Minimal achievable approximation ratio for MAX-MQ in finite fieldsThe word problem of the Brin-Thompson group is \textsf{coNP}-completeOn the computational complexity of the languages of general symbolic dynamical systems and beta-shiftsSpace functions of groupsTheory of one-tape linear-time Turing machinesPositive influence domination in graphsUnnamed ItemThe polynomial hierarchy for some structures over the binary wordsResource bounded immunity and simplicityImproved lower bounds on the randomized complexity of graph propertiesLiouville numbers and the computational complexity of changing basesOn the complexity of conversion between classic real number representationsGroup coloring is \(\Pi_2^{\text{P}}\)-complete




This page was built for publication: