Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,281,303 papers from all fields of science
Search
Sign In
Create Free Account
Computational complexity theory
Known as:
Computationally efficient
, Intractableness
, Computational intractablity
Expand
Computational complexity theory is a branch of the theory of computation in theoretical computer science that focuses on classifying computational…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ACM Turing Award
AKS primality test
Adjacency list
Aho–Corasick algorithm
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Fast HEVC intra prediction mode decision based on EDGE direction information
T. Silva
,
L. Agostini
,
L. Cruz
European Signal Processing Conference
2012
Corpus ID: 9542307
The High Efficiency Video Coding (HEVC) is an emerging standard that achieves higher encoding efficiency when compared to…
Expand
Highly Cited
2009
Highly Cited
2009
The multiobjective evolutionary algorithm based on determined weight and sub-regional search
Hai-Lin Liu
,
Xueqiang Li
IEEE Congress on Evolutionary Computation
2009
Corpus ID: 14933393
By dividing the multiobjective optimization of the decision space into several small regions, this paper proposes multi-objective…
Expand
Highly Cited
2007
Highly Cited
2007
A Fast Mode Decision Algorithm and Its VLSI Design for H.264/AVC Intra-Prediction
Jia-Ching Wang
,
Jhing-Fa Wang
,
J. Yang
,
Jang-Ting Chen
IEEE transactions on circuits and systems for…
2007
Corpus ID: 10884869
In this paper, we present a fast mode decision algorithm and design its VLSI architecture for H.264 intra-prediction. A regular…
Expand
Highly Cited
2007
Highly Cited
2007
Generalized Comb Decimation Filters for $\Sigma\Delta$ A/D Converters: Analysis and Design
Massimiliano Laddomada
IEEE Transactions on Circuits and Systems Part 1…
2007
Corpus ID: 260922
This paper addresses the design of generalized comb decimation filters, proposing some novel decimation schemes tailored to…
Expand
Highly Cited
2005
Highly Cited
2005
Hierarchical interface-based supervisory control-part II: parallel case
R. Leduc
,
M. Lawford
,
W. Wonham
IEEE Transactions on Automatic Control
2005
Corpus ID: 9129007
In this paper, we present a hierarchical method that decomposes a discrete-event system (DES) into a high-level subsystem which…
Expand
Highly Cited
2002
Highly Cited
2002
Using learning automata for adaptive push-based data broadcasting in asymmetric wireless environments
Petros Nicopolitidis
,
G. Papadimitriou
,
A. Pomportsis
IEEE Transactions on Vehicular Technology
2002
Corpus ID: 14168172
Push systems are not suitable for applications with a priori unknown, dynamic client demands. This paper proposes an adaptive…
Expand
Highly Cited
2001
Highly Cited
2001
Shadow detection algorithms for traffic flow analysis: a comparative study
A. Prati
,
I. Mikic
,
C. Grana
,
Mohan M. Trivedi
ITSC . IEEE Intelligent Transportation Systems…
2001
Corpus ID: 12292512
Shadow detection is critical for robust and reliable vision-based systems for traffic flow analysis. In this paper we discuss…
Expand
Highly Cited
1999
Highly Cited
1999
Modeling macro-and microstructures of Gas-Metal-Arc Welded HSLA-100 steel
Z. Yang
,
T. DebRoy
1999
Corpus ID: 85507326
Fluid flow and heat transfer during gas-metal-arc welding (GMAW) of HSLA-100 steel were studied using a transient, three…
Expand
Highly Cited
1997
Highly Cited
1997
Testing embedded cores using partial isolation rings
N. Touba
,
B. Pouya
Proceedings of the ... IEEE VLSI Test Symposium
1997
Corpus ID: 6180584
Intellectual property cores pose a significant test challenge. The core supplier may not give any information about the internal…
Expand
Highly Cited
1976
Highly Cited
1976
Optimal allocation of resources in distributed information networks
S. Mahmoud
,
J. Riordon
TODS
1976
Corpus ID: 1756309
The problems of file allocation and capacity assignment in a fixed topology distributed computer network are examined. These two…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE