Skip to search formSkip to main contentSkip to account menu

Computational complexity theory

Known as: Computationally efficient, Intractableness, Computational intractablity 
Computational complexity theory is a branch of the theory of computation in theoretical computer science that focuses on classifying computational… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2005
Highly Cited
2005
We present our region-based image retrieval tool, finding region in the picture (FRIP), that is able to accommodate, to the… 
Highly Cited
2005
Highly Cited
2005
In this paper, we present a hierarchical method that decomposes a discrete-event system (DES) into a high-level subsystem which… 
Highly Cited
2002
Highly Cited
2002
Push systems are not suitable for applications with a priori unknown, dynamic client demands. This paper proposes an adaptive… 
Highly Cited
2001
Highly Cited
2001
Shadow detection is critical for robust and reliable vision-based systems for traffic flow analysis. In this paper we discuss… 
Highly Cited
1999
Highly Cited
1999
Multimedia streaming applications consume a significant amount of server and network resources due to the high bandwidth and long… 
Highly Cited
1999
Highly Cited
1999
Fluid flow and heat transfer during gas-metal-arc welding (GMAW) of HSLA-100 steel were studied using a transient, three… 
Highly Cited
1997
Highly Cited
1997
Intellectual property cores pose a significant test challenge. The core supplier may not give any information about the internal… 
Highly Cited
1994
Highly Cited
1994
This paper and its companion are concerned with the problems of 3-D object recognition and shape estimation from image curves… 
Highly Cited
1993
Highly Cited
1993
The problem of simultaneously detecting the information bits and estimating signal amplitudes and phases in a K-user asynchronous… 
Highly Cited
1976
Highly Cited
1976
The problems of file allocation and capacity assignment in a fixed topology distributed computer network are examined. These two…