• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 41,359
Next 10 →

Table 6. Equality and Membership Transformation Rules

in Constraint Programming (CP) and Logic Programming (LP). CLP
by unknown authors

Table 2. Subgroup Membership Problems

in Private Information Retrieval Based on the Subgroup Membership Problem
by Akihiro Yamamura, Taiichi Saito 2001
"... In PAGE 7: ... For other plausible applications of the subgroup membership problem, the reader is also referred to [12] in which the DDH assumption is applied to the cryptographic schemes which only known method to construct is to base on the QR assumption. We summarize the examples above in Table2 , however, the table is not exhaustive at all. Table 2.... ..."
Cited by 6

Table 1. Complexity results for (uniform) membership problems

in Tree automata and XPath on compressed trees
by Markus Lohrey, Sebastian Maneth 2006
"... In PAGE 2: ...nown for these problems, see e.g. [8]. Membership problems for tree automata were investigated in [13] for ranked trees (see Table1 for the results of [13]) and [14] for un- ranked trees from the perspective of computational complexity. Here we extend this line of research by investigating the computational complexity of membership problems for various classes of tree automata on compressed trees (dags and SL cf tree grammars).... In PAGE 2: ... For all cases, we present upper and lower bounds which vary from NL (nondeterministic logspace) to PSPACE (polynomial space). Our results are collected in Table1 . We also briefly consider the parameterized complexity [15] of membership problems for tree automata.... In PAGE 5: ... class of SL cf tree grammars (e.g., the class of all dags). The membership problem for the fixed TA A and the class G is the following decision problem: INPUT: G 2 G QUESTION: Does eval(G) 2 T(A) hold? For a class C of tree automata, the uniform membership problem for C and the class G is the following decision problem: INPUT: G 2 G and A 2 C QUESTION: Does eval(G) 2 T(A) hold? The upper part of Table1 collects the complexity results that were obtained in [13] for uncompressed trees. The statement that for instance the membership problem for TA is NC1-complete means that for every fixed TA the membership problem is in NC1 and that there exists a fixed TA for which the membership problem is NC1-hard.... In PAGE 7: ... Theorem 4 and 5) we obtain the complexity results for linear SL cf tree grammars with a fixed number of parameters (resp. unrestricted SL cf tree grammars) in Table1 , see lin.... ..."
Cited by 2

TABLE IV MTRACE BASED CLASSIFICATION OF REACHABILITY PROBLEMS

in Application Layer Reachability Monitoring for IP Multicast
by Kamil Sarac, Kevin C. Almeroth, Senior Member 2005
Cited by 2

Table 2. Timed reachability analysis of the FTWC

in Fault-Tolerant Workstation Cluster AVACS S3 Benchmark ⋆
by unknown authors
"... In PAGE 4: ... In column 7 the time for the transformation (from uIMC to uCTMDP) is shown. In Table2 we collect statistics about the implementation of the timed reachability algorithm... ..."

Table 4: Decidability results for qualitative problems of repeated reachability.

in DECISIVE MARKOV CHAINS
by Parosh Aziz Abdulla, Noomene Ben Henda, Richard Mayr

Table 4: Decidability results for qualitative problems of repeated reachability.

in unknown title
by unknown authors 2006

Table 1: Fully dynamic reachability algorithms.

in A fully dynamic reachability algorithm for directed graphs with an almost linear update time
by Liam Roditty, Uri Zwick 2004
"... In PAGE 2: ... This is the first algorithm that breaks the O(n2) update barrier for all graphs with o(n2) edges. The new algorithm and some of the previously existing algorithms for the dynamic reachability problem are compared in Table1 . Our algorithm has the fastest update time, among all algorithms that work on all graphs, but alas the slowest query time.... ..."

Table 1: Fully dynamic reachability algorithms.

in A Fully Dynamic Reachability Algorithm for Directed Graphs with an Almost Linear Update Time
by Liam Roditty, Uri Zwick
"... In PAGE 2: ... This is the first algorithm that breaks the O(n2) update barrier for all graphs with o(n2) edges. The new algorithm and some of the previously existing algorithms for the dynamic reachability problem are compared in Table1 . Our algorithm has the fastest update time, among all algorithms that work on all graphs, but alas the slowest query time.... ..."

Table 1: Reachability Results for Benchmark Circuits

in Dynamic Detection and Removal of Inactive Clauses in SAT with Application in Image Computation
by Aarti Gupta, Anubhav Gupta, Zijiang Yang, Pranav Ashar
"... In PAGE 4: ... 4.1 Reachability Analysis Results for reachability analysis on the benchmark circuits are shown in Table1 . The name of the circuit appears in Column 1, and number of latches in Column 2 #28marked #23L#29.... In PAGE 5: ...63. To demonstrate this e#0Bect of ICR, we present details of the experimental results for the prolog circuit in Table 2, where labels of the Columns are similar to Table1 . Note that use of ICR results in less number of BDD leaves #28sub-problems#29 in most image computation steps of the complete traversal.... ..."
Next 10 →
Results 1 - 10 of 41,359
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University