Sciweavers

112
Voted
ECCC
2000
75views more  ECCC 2000»
15 years 6 days ago
Deterministic Turing Machines in the Range between Real-Time and Linear-Time
Deterministic k-tape and multitape Turing machines with one-way, two-way and without a separated input tape are considered. We investigate the classes of languages acceptable by s...
Andreas Klein, Martin Kutrib
96
Voted
ECCC
2000
81views more  ECCC 2000»
15 years 6 days ago
A Linear Space Algorithm for Computing the Hermite Normal Form
Computing the Hermite Normal Form of an n
Daniele Micciancio, Bogdan Warinschi
86
Voted
ECCC
2000
72views more  ECCC 2000»
15 years 6 days ago
On the power assignment problem in radio networks
Andrea E. F. Clementi, Paolo Penna, Riccardo Silve...
91
Voted
ECCC
2000
77views more  ECCC 2000»
15 years 6 days ago
Polynomial-Time Recognition of Minimal Unsatisfiable Formulas with Fixed Clause-Variable Difference
A formula (in conjunctive normal form) is said to be minimal unsatisfiable if it is unsatisfiable and deleting any clause makes it satisfiable. The deficiency of a formula is the ...
Herbert Fleischner, Stefan Szeider
ECCC
2000
179views more  ECCC 2000»
15 years 6 days ago
A Note on Approximating MAX-BISECTION on Regular Graphs
We design a 0:795 approximation algorithm for the Max-Bisection problem restricted to regular graphs. In the case of three regular graphs our results imply an approximation ratio ...
Uriel Feige, Marek Karpinski, Michael Langberg
112
Voted
ECCC
2000
93views more  ECCC 2000»
15 years 6 days ago
Security of the Most Significant Bits of the Shamir Message Passing Scheme
Boneh and Venkatesan have recently proposed a polynomial time algorithm for recovering a "hidden" element of a finite field Fp of p elements from rather short strings of...
Maria Isabel Gonzalez Vasco, Igor Shparlinski
85
Voted
ECCC
2000
86views more  ECCC 2000»
15 years 6 days ago
On Computation with Pulses
Wolfgang Maass
107
Voted
ECCC
2000
158views more  ECCC 2000»
15 years 6 days ago
On the Computational Power of Winner-Take-All
This article initiates a rigorous theoretical analysis of the computational power of circuits that employ modules for computing winner-take-all. Computational models that involve ...
Wolfgang Maass
93
Voted
ECCC
2000
86views more  ECCC 2000»
15 years 6 days ago
Neural Systems as Nonlinear Filters
Experimental data show that biological synapses behave quite differently from the symbolic synapses in all common artificialneuralnetwork models. Biological synapses are dynamic, ...
Wolfgang Maass, Eduardo D. Sontag
ECCC
2000
59views more  ECCC 2000»
15 years 6 days ago
A Simple Model for Neural Computation with Firing Rates and Firing Correlations
A simple extension of standard neural network models is introduced which provides a model for neural computations that involve both firing rates and firing correlations. Such an ex...
Wolfgang Maass