Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,115,609 papers from all fields of science
Search
Sign In
Create Free Account
Average-case complexity
Known as:
Average case complexity
, Average case computational complexity
, Expected time
In computational complexity theory, the average-case complexity of an algorithm is the amount of some computational resource (typically time) used by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
30 relations
Algorithm
Best, worst and average case
Boyer–Moore–Horspool algorithm
Bubble sort
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Estimating the Completion Time of Crowdsourced Tasks Using Survival Analysis Models
Jing Wang
,
S. Faridani
,
Panagiotis G. Ipeirotis
2011
Corpus ID: 3119585
In order to seamlessly integrate a human computation component (e.g., Amazon Mechanical Turk) within a larger production system…
Expand
Highly Cited
2004
Highly Cited
2004
Time of Deterministic Broadcasting in Radio Networks with Local Knowledge
D. Kowalski
,
A. Pelc
SIAM journal on computing (Print)
2004
Corpus ID: 8818517
We consider broadcasting in radio networks, modeled as undirected graphs, whose nodes know only their own label and labels of…
Expand
Highly Cited
2004
Highly Cited
2004
Multiuser switched diversity transmission
B. Holter
,
Mohamed-Slim Alouini
,
G. Oien
,
Hong-Chuan Yang
IEEE 60th Vehicular Technology Conference, . VTC…
2004
Corpus ID: 40164230
In this paper, a set of multiuser access schemes are proposed based on switched diversity algorithms originally devised to select…
Expand
Highly Cited
2002
Highly Cited
2002
Rendezvous search on labeled networks
S. Alpern
2002
Corpus ID: 122867705
Two players are independently placed on a commonly labelled network X. They cannot see each other but wish to meet in least…
Expand
Highly Cited
2001
Highly Cited
2001
Approximate distance oracles
M. Thorup
,
Uri Zwick
Symposium on the Theory of Computing
2001
Corpus ID: 53245292
Let <italic>G=(V,E)</italic> be an undirected <italic>weighted</italic> graph with <italic>|V|=n</italic> and <italic>|E|=m…
Expand
Highly Cited
2000
Highly Cited
2000
AUTOCLUST+: Automatic Clustering of Point-Data Sets in the Presence of Obstacles
V. Estivill-Castro
,
Ickjai Lee
Temporal, Spatial, and Spatio-Temporal Data…
2000
Corpus ID: 42399136
Wide spread clustering algorithms use the Euclidean distance to measure spatial proximity. However, obstacles in other GIS data…
Expand
Highly Cited
1993
Highly Cited
1993
Regulating innovative activity: The role of a public firm
Flavio Delbono
,
V. Denicoló
1993
Corpus ID: 152433158
1990
1990
The Full-Use-of-Suitable-Spares (FUSS) Approach to Hardware Reconfiguration for Fault-Tolerant Processor Arrays
M. Chean
,
J. Fortes
IEEE Trans. Computers
1990
Corpus ID: 206414354
A general approach to hardware recognition is proposed for VLSI/WSI fault-tolerant processor arrays. The technique, called full…
Expand
Highly Cited
1984
Highly Cited
1984
Integration of geological and seismological data for the analysis of seismic hazard: A case study of Japan
S. Wesnousky
,
C. Scholz
,
K. Shimazaki
,
T. Matsuda
1984
Corpus ID: 51815923
Seismic hazard analyses are associated with large uncertainties when historical data are insufficient to define secular rates of…
Expand
Highly Cited
1976
Highly Cited
1976
An Evaluation of Exponential and Weibull Test Plans
H. Harter
,
A. H. Moore
IEEE Transactions on Reliability
1976
Corpus ID: 42258686
MIL-STD-781B gives sampling plans (sequential and fixed length) for reliability tests under the assumption of a constant failure…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required