Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,350,533 papers from all fields of science
Search
Sign In
Create Free Account
Computational complexity theory
Known as:
Computationally efficient
, Intractableness
, Computational intractablity
Expand
Computational complexity theory is a branch of the theory of computation in theoretical computer science that focuses on classifying computational…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ACM Turing Award
AKS primality test
Adjacency list
Aho–Corasick algorithm
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2005
Highly Cited
2005
FRIP: a region-based image retrieval tool using automatic image segmentation and stepwise Boolean AND matching
ByoungChul Ko
,
H. Byun
IEEE transactions on multimedia
2005
Corpus ID: 16163516
We present our region-based image retrieval tool, finding region in the picture (FRIP), that is able to accommodate, to the…
Expand
Highly Cited
2005
Highly Cited
2005
Hierarchical interface-based supervisory control-part II: parallel case
R. Leduc
,
M. Lawford
,
W. Wonham
IEEE Transactions on Automatic Control
2005
Corpus ID: 9129007
In this paper, we present a hierarchical method that decomposes a discrete-event system (DES) into a high-level subsystem which…
Expand
Highly Cited
2002
Highly Cited
2002
Using learning automata for adaptive push-based data broadcasting in asymmetric wireless environments
Petros Nicopolitidis
,
G. Papadimitriou
,
A. Pomportsis
IEEE Transactions on Vehicular Technology
2002
Corpus ID: 14168172
Push systems are not suitable for applications with a priori unknown, dynamic client demands. This paper proposes an adaptive…
Expand
Highly Cited
2001
Highly Cited
2001
Shadow detection algorithms for traffic flow analysis: a comparative study
A. Prati
,
I. Mikic
,
C. Grana
,
Mohan M. Trivedi
ITSC . IEEE Intelligent Transportation Systems…
2001
Corpus ID: 12292512
Shadow detection is critical for robust and reliable vision-based systems for traffic flow analysis. In this paper we discuss…
Expand
Highly Cited
1999
Highly Cited
1999
Optimal Patching Schemes for Efficient Multimedia Streaming
S. Sen
,
Lixin Gao
,
J. Rexford
,
D. Towsley
1999
Corpus ID: 14263010
Multimedia streaming applications consume a significant amount of server and network resources due to the high bandwidth and long…
Expand
Highly Cited
1999
Highly Cited
1999
Modeling macro-and microstructures of Gas-Metal-Arc Welded HSLA-100 steel
Z. Yang
,
T. DebRoy
1999
Corpus ID: 85507326
Fluid flow and heat transfer during gas-metal-arc welding (GMAW) of HSLA-100 steel were studied using a transient, three…
Expand
Highly Cited
1997
Highly Cited
1997
Testing embedded cores using partial isolation rings
N. Touba
,
B. Pouya
Proceedings of the ... IEEE VLSI Test Symposium
1997
Corpus ID: 6180584
Intellectual property cores pose a significant test challenge. The core supplier may not give any information about the internal…
Expand
Highly Cited
1994
Highly Cited
1994
Part I: Modeling Image Curves Using Invariant 3-D Object Curve Models-A Path to 3-D Recognition and Shape Estimation from Image Contours
F. Cohen
,
Jin-Yinn Wang
IEEE Transactions on Pattern Analysis and Machine…
1994
Corpus ID: 5593982
This paper and its companion are concerned with the problems of 3-D object recognition and shape estimation from image curves…
Expand
Highly Cited
1993
Highly Cited
1993
Joint signal detection and parameter estimation in multiuser communications
Zhenhua Xie
,
C. Rushforth
,
R. Short
,
T. Moon
IEEE Transactions on Communications
1993
Corpus ID: 6089372
The problem of simultaneously detecting the information bits and estimating signal amplitudes and phases in a K-user asynchronous…
Expand
Highly Cited
1976
Highly Cited
1976
Optimal allocation of resources in distributed information networks
S. Mahmoud
,
J. Riordon
TODS
1976
Corpus ID: 1756309
The problems of file allocation and capacity assignment in a fixed topology distributed computer network are examined. These two…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE