Time Complexity
1,131 Followers
Recent papers in Time Complexity
ÐEfficient and effective buffering of disk blocks in main memory is critical for better file system performance due to a wide speed gap between main memory and hard disks. In such a buffering system, one of the most important design... more
In this paper, we introduce a new threshold signature RSA-typed scheme. The proposed scheme has the characteristics of un-forgeable and robustness in random oracle model. Also, signature generation and verification is entirely... more
Abstract Time Slot Interchange and Signal Separator (TSISS) network was introduced to reduce the time slot requirement of TST architecture. In the switching algorithm of the TSISS network, an ad-jacency matrix was formed and Breath-first... more
We analyse the key algorithms of data and information fusion from a linguistic point of view, and show that they fall into two paradigms: the primarily syntactic, and the primarily semantic. We propose an alternative grammatical paradigm... more
This work addresses the problem of low power design in high-level synthesis in the scenario of the resources operating at multiple voltages. The problem of resource-and-latency constrained scheduling is tackled and a novel methodology for... more
Let S be a set of elements. We say that a collection C of subsets of S has the consecutive ones property if there exist a linear order on S and a 0-1 matrix M , where M ij = 1 if and only if the jth element is in the ith set in C, such... more
Periodicity mining is used for predicting trends in time series data. Discovering the rate at which the time series is periodic has always been an obstacle for fully automated periodicity mining. Existing periodicity mining algorithms... more
Recently there has been a great deal of interest in performance evalution of parallel simulation. Most work is devoted to the time complexity and assumes that the amount of memory available for parallel simulation is unlimited. This paper... more
In Image Compression, the researchers' aim is to reduce the number of bits required to represent an image by removing the spatial and spectral redundancies. Recently discrete wavelet transform and wavelet packet has emerged as popular... more
Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security is a must in most applications, current sophisticated... more
In this work, the performance of probabilistic algebraic attacks is compared to classical (fast) algebraic attacks in the context of their application to certain linear beedback shift register (LFSR)-based stream ciphers. Using some... more
We present an efficient Hough transform for automatic detection of cylinders in point clouds. As cylinders are one of the most frequently used primitives for industrial design, automatic and robust methods for their detection and fitting... more
We present a new machine learning method that, given a set of training examples, induces a definition of the target concept in terms of a hierarchy of intermediate concepts and their definitions. This effectively decomposes the problem... more
Betweenness centrality measure is often used in social and computer communication networks to estimate the potential monitoring and control capabilities a vertex may have on data flowing in the network. In this paper we define the Routing... more
The time complexity for testing whether an n-by-n real matrix is a P-matrix is reduced from O(2n n 3) to O(2 n ) by applying recursively a criterion for P-matrices based on Schur complementation. A Matlab program implementing the... more
We study the problem of sequencing n jobs on a three-stage¯owshop with multiple identical machines at each stage (a¯exiblē owshop). The objective is to minimize the makespan. Since the problem is strongly NP-complete, we develop and... more
In field of Computer Science and Mathematics, sorting algorithm is an algorithm that puts elements of a list in a certain order i.e. ascending or descending. Sorting is perhaps the most widely studied problem in computer science and is... more
Efficient ray shooting algorithm is inherently required by many computer graphics algorithms, particularly in image synthesis. Practical ray shooting algorithms aiming at the average-case complexity use some underlying spatial data... more
Using doubly linked list in embedded systems can be expensive. Although doubly linked is efficient in terms of time complexity and highly flexible in itself, enabling easy traversal and update, but it often demands more memory space... more
Functionality of electronic commerce enabling technologies is dependent upon pervasive networks that a large number of applications share. Given the scarcity of network resources, it is imperative to allocate existing resources based on... more
AbstractThere are many classical algorithms for finding routing in FPGA. But Using DNA computing we can solve the routes efficiently and fast. The run time complexity of DNA algorithms is much less than other classical algorithms which... more
... 7 Conclusions In this paper, we have proposed a geometry-based image representation scheme and an algo-rithm/function for retrieving i&D images of relevance (based on spatial similarity) to ... The algorithm is robust-in the sense... more
Bubble-sort graphs are variants of Cayley graphs. A bubble-sort graph is suitable as a topology for massively parallel systems because of its simple and regular structure. Therefore, in this study, we focus on n-bubble-sort graphs and... more
Workstations and personal computers are increasingly being used for applications with real-time characteristics such as speech understanding and synthesis, media computations and I/O, and animation, often concurrently executed with... more
There is growing interest in scaling up the widely-used decision-tree learning algorithms to very large data sets. Although numerous diverse techniques have been proposed, a fast tree-growing algorithm without substantial decrease in... more
Finding the shortest paths in a schedule-based public transit network is similar to finding the shortest paths in a network with multi-costs constrained and time-window constraints. We consider a schedulebased transit network, where each... more
We are given an integer n and a real-valued function w(i, j) defined for integers 0 5 i <j 5 n and with the property that w(i,-,, j,,) + w(il, jl) I w(iO, jl) + w( il, J,-J for 0 5 i, < il < j,, < j, I n. The concave least-weight... more
Quite a few recent models are rapidly introducing new concepts describing different levels of consciousness. This situation is getting confusing because some theorists formulate their models without making reference to existing views,... more
The non-blocking work-stealing algorithm of Arora, Blumofe, and Plaxton (henceforth ABP work-stealing) is on its way to becoming the multiprocessor load balancing technology of choice in both industry and academia. This highly efficient... more
Comparing gene orders in completely sequenced genomes is a standard approach to locate clusters of functionally associated genes. Often, gene orders are modeled as permutations. Given k permutations of n elements, a k-tuple of intervals... more
A lower bound of Omega(n 2 log(n)) is proved for the time complexity of calculating the inverse of a matrix nxn, over the real or complex numbers in the sequential computation case.
We construct an exact algorithm for the Hamiltonian cycle problem in planar graphs with worst case time complexity O(c √ n ), where c is some fixed constant that does not depend on the instance. Furthermore, we show that under the... more
The effectiveness of an algorithm is measured from the amount of time and space required by the algorithm. The objective of this study was to measure the time complexity of the ANFIS algorithm. The time complexity is calcultaed by... more
Finding clusters in data, especially high dimensional data, is challenging when the clusters are of widely differing shapes, sizes, and densities, and when the data contains noise and outliers. We present a novel clustering technique that... more
The increasing sophistication of computer technology with its capacity to collect, analyze and disseminate information on individuals posses a great challenge to society today. The Collection of information about users has become a... more
Software testing is a dual purpose process that reveals defects and is used to evaluate quality attributes of the software, such as, reliability, security, usability, and correctness. The critical problem in software testing is time... more
The Hough transform provides a robust technique for skew detection in document images, but suffers from high time complexity which becomes prohibitive for detecting skew in large documents. Analysis of time complexity on various stages of... more
Sorting is the basic operation in most of the applications of computer science. Sorting means to arrange data in particular order inside computer. In this paper we have discussed performance of different sorting algorithms with their... more
Sugiyama's algorithm for layered graph drawing is very popular and commonly used in practical software. The extensive use of dummy vertices to break long edges between non-adjacent layers often leads to unsatisfying performance. The... more
This paper presents a novel evolutionary optimization strategy based on the derandomized evolution strategy with covariance matrix adaptation (CMA-ES). This new approach is intended to reduce the number of generations required for... more
Sorting is the basic operation in most of the applications of computer science. Sorting means to arrange data in particular order inside computer. In this paper we have discussed performance of different sorting algorithms with their... more
Previous survey research revealed that consumers perceived online shopping and buying to be a time saving practice. Para- doxically, they only rarely reported using that tactic to save time, introducing a contradiction. Focus group... more