Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Polynomial Time

There is another class of problems, known as noudeterministic polynomial time or class NP - problems, which may not iicco.ssarily be solvable in polynomial time, but the actual solutions to which may be tested for correctness in polynomial time. The problem of finding a size-iV preimage for a linear CA, for example, is a class NP problem. While it is obvious that P C NP, whether P yf NP remains an open question. [Pg.624]

Problem-1 is a formidable challenge for mathematical programming. It is an NP-hard problem, and consequently all computational attempts to solve it cannot be guaranteed to provide a solution in polynomial time. It is not surprising then that all previous efforts have dealt with simplified versions of Problem-1. These simplifications have led to a variety of... [Pg.42]

Section III introduces the concept of nonmonotonic planning and outlines its basic features. It is shown that the tractability of nonmonotonic planning is directly related to the form of the operators employed simple propositional operators lead to polynomial-time algorithms, whereas conditional and functional operators lead to NP-hard formulations. In addition, three specific subsections establish the theoretical foundation for the conversion of operational constraints on the plans into temporal orderings of primitive operations. The three classes of constraints considered are (1) temporal ordering of abstract operations, (2) avoidable mixtures of chemical species, and (3) quantitative bounding constraints on the state of processing systems. [Pg.45]

For STRIPS-like operators. Chapman (1985) developed a polynomialtime algorithm, called TWEAK, around five actions that are necessary and sufficient for constructing a correct and complete plan. As soon as we try to extend these ideas to nonmonotonic planning with conditional operators, we realize that no polynomial-time algorithm can be constructed, as the following theorem explicitly prohibits (Chapman, 1985) ... [Pg.58]

At this point the lower-bounding scheme consists of solving a single machine scheduling problem where for each job i, the release time is the due date is, and the processing time is This nonbottleneck scheme can be further simplified in two steps. First, we can assume that for a/8 =. ., avoiding the need to consider release times of and due dates of, which turns an NP-complete problem, into one solvable in polynomial time. If only one of these were to be relaxed, the schedule can still be foimd in polynomial time by Jackson s rule (Jackson, 1955). Second, we can avoid the computation of completely, by assuming that the maximum is obtained at / = m for all values of i. [Pg.290]

Karmarkar, N. A New Polynomial-Time Algorithm for Linear Programming. Combinato-ria 4 373-383 (1984). [Pg.253]

Shor, P. W. Polynomial time algorithms for prime factorization and discrete logarithms on a quantum computer. Proc. 35th Annual Symposium on the Foundations of Computer Science Goldwasser, S. Ed. IEEE Computer Society Press Los Alamos, CA, 1994, p. 124. [Pg.713]

We can prove that the above algorithm converges in polynomial time (i.e., the number of floating-point operations is proportional to a polynomial in the problem sizes m and n) by choosing appropriately cn., and a. See Refs. [Pg.113]

A map M is called reduced (see [Moh97, Section 3]) if its universal cover is 3-connected and is a cell-complex. It is shown in [Moh97, Corollary 5.4] that reduced maps admit unique primal-dual circle packing representations on a Riemann surface of the same genus moreover, a polynomial time algorithm allows one to find the coordinates of those points relatively easily. This means that the combinatorics of the map determines the structure of the Riemann surface. [Pg.11]

Moh97] B. Mohar, Circle packing of map in polynomial time, European Journal of Combinatorics 18 (1997) 785-805. [Pg.302]

Aarts EHL, van Laarhoven PJM (1985) Anew polynomial time cooling schedule. In Proceedings of the IEEE international conference on computer-aided design, Santa Clara, CA, pp 206-208... [Pg.64]

Sedoglavic, A., A probabilistic algorithm to test algebraic observability in polynomial time, J. Symbolic Computation 2002, 33 735-755. [Pg.140]

Tetsuo, A., D. Z. Chen, N. Katoh, and T. Tokuyama. 1996. Polynomial-time solutions to image segmentation. Proc. Seventh Ann. ACM-SIAM Symp. Discrete Algorithms, pp. 104-113. [Pg.76]

B then receives an encrypted message M with a revoked set 7Z. It has to guess whether M = M or M = Rm where Rm is a random message of similar length. We say that a revocation scheme is secure if for any (probabilistic polynomial time) adversary B as above, the probability that B distinguishes between the two cases is negligible. [Pg.28]

If a linear hexapeptide solution existed, it must have been present in Geysen s library (provided the synthesis worked perfectly, which is a separate issue). There are no additional umepresented sequences, and mathematically such libraries are called NP-complete (NP = non-deterministic polynomial time). Such NP-complete libraries are actually quite rare in combinatorial chemistry. Although there are infinite numbers of peptides, for Geysen s epitope mapping, he needed to examine only natural amino acids. This reduces the complexity for a sequence of length n to 20", a number that increases exponentially with n but nevertheless remains finite. [Pg.93]

Seminal work by Adleman demonstrated that molecular biological methods could be successfully employed to solve a mathematical problem [84, 85]. The problem he solved was a Hamiltonian path problem, in common parlance referred to as a travelling salesman problem. This is a hard computational problem for which no satisfactory algorithm is known allowing solution with electronic computers in polynomial time [86]. The potential of this DNA-based methodology relies on the inherent parallelism a DNA molecule affords. [Pg.3349]

Faulon, J.-L. (1998). Isomorphism, Automorphism Partitioning, and Canonical Labeling Can Be Solved in Polynomial-Time for Molecular Graphs. J.Chem.lnf.Comput.Scl, 38,432-444. [Pg.566]

This realization is at the heart of quantum computation and led, in 1993, to Peter Shor s astounding result of a polynomial-time algorithm for factoring on a quantum computer [Shor 1994], In contrast, the best known classical algorithms for factoring are virtually exponential in run time. [Pg.18]

Within this hierarchy, factoring is non polynomial (NP) - although we do not know of any classical algorithm that runs in polynomial time, it is easy to test the solution in polynomial time. Curiously, until about a year ago, it had been believed that another problem, primality testing, was not polynomial. But then a polynomial time algorithm was discovered. Thus, the structure of the polynomial hierarchy is not yet set in stone. [Pg.19]

Of interest to us is that quantum computers add a completely new class to this hierarchy the class of non-deterministic algorithms that can be solved in polynomial time on a quantum computer, so-called BQP [Bernstein 1997], The key to these fantastic quantum algorithms, or so everybody believed until recently, was the presence of in these systems. [Pg.19]

If any polynomial-time attacker first communicates with a signer for a while, and then tries to compute a pair of a new message and a signature, the success probability is very small. [Pg.26]

Feasible computations are usually expressed by probabilistic polynomial-time algorithms. For concreteness, Turing machines are used as the model of computation. ... [Pg.38]

The running time of a probabilistic polynomial-time algorithm is deterministically polynomial, i.e., there is a polynomial Q such that the algorithm never needs more than Q k) steps on an input of binary length k. Of course, the random tape does not count as an input. [Pg.39]

The notion of impossibility of a task for a polynomial-time attacker is neither worst-case complexity nor average-case complexity. Instead, as explained in Section 2.3, the success probability of an attacker has to be negligibly small, where the probability is taken over both the problem instances and the internal random choices of the attacker. A sequence n of non-negative values is called negligibly small or superpolynomially small if for all c > 0 for sufficiently large k < k . Some authors abbreviate this as < l/poly(k) . Similarly, the sequence is called exponentially small if it is smaller than the inverse of some exponential function in k. [Pg.39]

The complexity of an interactive Turing machine has only been defined for the case with one initial input (which would be called an interface input here). Complexity is then regarded as a function of the length of this initial input alone, and not the inputs from interaction with other entities. This is reasonable Otherwise an interactive Turing machine with the attribute polynomial-time could be forced into arbitrarily long computations by an unrestricted attacker who sends it arbitrarily long messages. [Pg.44]


See other pages where Polynomial Time is mentioned: [Pg.296]    [Pg.301]    [Pg.532]    [Pg.623]    [Pg.60]    [Pg.63]    [Pg.91]    [Pg.390]    [Pg.63]    [Pg.121]    [Pg.15]    [Pg.17]    [Pg.142]    [Pg.186]    [Pg.139]    [Pg.13]    [Pg.321]    [Pg.593]    [Pg.74]    [Pg.19]    [Pg.20]    [Pg.15]    [Pg.39]    [Pg.39]    [Pg.43]    [Pg.44]   


SEARCH



Polynomial

© 2024 chempedia.info