Skip to search formSkip to main content

You are currently offline. Some features of the site may not work correctly.

Semantic Scholar uses AI to extract papers important to this topic.

Highly Cited

2016

Highly Cited

2016

We introduce the Nondeterministic Strong Exponential Time Hypothesis (NSETH) as a natural extension of the Strong Exponential… Expand

Is this relevant?

Highly Cited

2011

Highly Cited

2011

The Exponential Time Hypothesis (ETH) is a conjecture stating that, roughly speaking, n-variable 3-SAT cannot be solved in time… Expand

Is this relevant?

Highly Cited

2011

Highly Cited

2011

For the vast majority of local problems on graphs of small tree width (where by local we mean that a solution can be verified by… Expand

Is this relevant?

Highly Cited

2004

Highly Cited

2004

This paper addresses the uniform stability of switched linear systems, where uniformity refers to the convergence rate of the… Expand

Is this relevant?

Highly Cited

2001

Highly Cited

2001

Concern about the performance of wires wires in scaled technologies has led to research exploring other communication methods… Expand

Is this relevant?

Highly Cited

1997

Highly Cited

1997

Abstract A novel, irregular, coccoid-shaped archaeum was isolated from a hydrothermally heated black smoker wall at the TAG site… Expand

Is this relevant?

Highly Cited

1993

Highly Cited

1993

Abstract It is known that a linear time-invariant system subject to “input saturation” can be globally asymptotically stabilized… Expand

Is this relevant?

Highly Cited

1984

Highly Cited

1984

At high frequencies f the spectrum of S-wave accelerations is characterized by a trend of exponential decay, e^(−πkf). In our… Expand

Is this relevant?

Highly Cited

1984

Highly Cited

1984

New steepest descent algorithms for adaptive filtering and have been devised which allow error minimization in the mean fourth… Expand

Is this relevant?

Highly Cited

1978

Highly Cited

1978

According to traditional conceptions of cryptographic security, it is necessary to transmit a key, by secret means, before… Expand

Is this relevant?