• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 8,717
Next 10 →

HOMEOMORPHISMS OF BOUNDED LENGTH DISTORTION

by Jussi Väisälä , 1987
"... ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
Abstract not found

PRIMES IN INTERVALS OF BOUNDED LENGTH

by Andrew Granville
"... Abstract. In April 2013, Yitang Zhang proved the existence of a finite bound B such that there are infinitely many pairs of distinct primes which differ by no more than B. This is a massive breakthrough, makes the twin prime conjecture look highly plausible (which can be re-interpreted as the conjec ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
Abstract. In April 2013, Yitang Zhang proved the existence of a finite bound B such that there are infinitely many pairs of distinct primes which differ by no more than B. This is a massive breakthrough, makes the twin prime conjecture look highly plausible (which can be re

Bounded Length UCFG Equivalence

by B. Litow , 1996
"... . A randomised polylog time algorithm is given for deciding whether or not the sets of words of a given length generated by two unambiguous context-free grammars coincide. The algorithm is in randomised NC4 in terms of the product of the grammar size and the length. 1 ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
. A randomised polylog time algorithm is given for deciding whether or not the sets of words of a given length generated by two unambiguous context-free grammars coincide. The algorithm is in randomised NC4 in terms of the product of the grammar size and the length. 1

On Sharply Bounded Length Induction

by unknown authors
"... Abstract. We construct models of the theory L 0 2: = BASIC + Σ b 0-LIND: one where the predecessor function is not total and one not satisfying Σ b 0-PIND, showing that L 0 2 is strictly weaker that S 0 2. The construction also shows that S 0 2 is not ∀Σ b 0-axiomatizable. ..."
Abstract - Add to MetaCart
Abstract. We construct models of the theory L 0 2: = BASIC + Σ b 0-LIND: one where the predecessor function is not total and one not satisfying Σ b 0-PIND, showing that L 0 2 is strictly weaker that S 0 2. The construction also shows that S 0 2 is not ∀Σ b 0-axiomatizable.

The Complexity of Bounded Length Graph

by Paul Bonsma, Amer E. Mouawad , 2014
"... ar ..."
Abstract - Add to MetaCart
Abstract not found

Reliable Identification of Bounded-length Viruses is NP-complete

by Diomidis Spinellis , 2003
"... A virus is a program that replicates itself by copying its code into other files. A common virus protection mechanism involves scanning files to detect code patterns of known viruses. We prove that the problem of reliably identifying a bounded-length mutating virus is NP-complete by showing that a v ..."
Abstract - Cited by 44 (1 self) - Add to MetaCart
A virus is a program that replicates itself by copying its code into other files. A common virus protection mechanism involves scanning files to detect code patterns of known viruses. We prove that the problem of reliably identifying a bounded-length mutating virus is NP-complete by showing that a

two disjoint paths of bounded length

by Victor Chepoi, Yann Vaxès
"... Approximation algorithms for forests augmentation ensuring ..."
Abstract - Add to MetaCart
Approximation algorithms for forests augmentation ensuring

Paths of Bounded Length and Their Cuts: Parameterized Complexity and Algorithms

by Petr A. Golovach, Dimitrios M. Thilikos
"... Abstract. We study the parameterized complexity of two families of problems: the bounded length disjoint paths problem and the bounded length cut problem. From Menger’s theorem both problems are equiva-lent (and computationally easy) in the unbounded case for single source, single target paths. Howe ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
Abstract. We study the parameterized complexity of two families of problems: the bounded length disjoint paths problem and the bounded length cut problem. From Menger’s theorem both problems are equiva-lent (and computationally easy) in the unbounded case for single source, single target paths

Stable marriage with ties and bounded length preference lists

by Robert W. Irving, David F. Manlove , et al. - IN PROC. ACID, VOLUME 7 OF TEXTS IN ALGORITHMICS, 95–106
"... We consider variants of the classical stable marriage problem in which preference lists may contain ties, and may be of bounded length. Such restrictions arise naturally in practical applications, such as centralised matching schemes that assign graduating medical students to their first hospital ..."
Abstract - Cited by 13 (6 self) - Add to MetaCart
We consider variants of the classical stable marriage problem in which preference lists may contain ties, and may be of bounded length. Such restrictions arise naturally in practical applications, such as centralised matching schemes that assign graduating medical students to their first hospital

An Efficient Context-Free Parsing Algorithm

by Jay Earley , 1970
"... A parsing algorithm which seems to be the most efficient general context-free algorithm known is described. It is similar to both Knuth's LR(k) algorithm and the familiar top-down algorithm. It has a time bound proportional to n 3 (where n is the length of the string being parsed) in general; i ..."
Abstract - Cited by 798 (0 self) - Add to MetaCart
A parsing algorithm which seems to be the most efficient general context-free algorithm known is described. It is similar to both Knuth's LR(k) algorithm and the familiar top-down algorithm. It has a time bound proportional to n 3 (where n is the length of the string being parsed) in general
Next 10 →
Results 1 - 10 of 8,717
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University