欲望 发表于 2025-3-26 21:10:16

A Randomised Algorithm for Checking The Normality of Cryptographic Boolean Functions is constant on them and combines such flats to flats of higher dimension in a second phase. This way, the algorithm is much faster than exhaustive search. Moreover, the algorithm benefits from randomising the first phase. In addition, by evaluating several flats implicitly in parallel, the time-complexity of the algorithm decreases further.

ALERT 发表于 2025-3-27 01:20:57

The Firing Squad Synchronization Problem with Many Generals for One-Dimensional CAbution of this paper on the algorithmic side. For the asynchronous case an exact formula for the optimum synchronization time of each instance is derived. We prove that no CA can solve all instances in optimum time, but we describe a CA whose running time is very close to it; it only needs additional .. steps.

内向者 发表于 2025-3-27 06:11:14

http://reply.papertrans.cn/33/3204/320344/320344_33.png

HERTZ 发表于 2025-3-27 12:07:20

http://reply.papertrans.cn/33/3204/320344/320344_34.png

gusher 发表于 2025-3-27 15:35:16

http://reply.papertrans.cn/33/3204/320344/320344_35.png

鉴赏家 发表于 2025-3-27 20:58:42

Scheduling With Release Times and Deadlines on A Minimum Number of Machinessisting of jobs with slack at most one can be solved efficiently. We close the resulting gap by showing that the problem already becomes .-. if slacks up to 2 are allowed. Additionally, we consider several variants of the SRDM problem and provide exact and approximation algorithms.

抵消 发表于 2025-3-28 01:08:55

http://reply.papertrans.cn/33/3204/320344/320344_37.png

Distribution 发表于 2025-3-28 03:45:24

Reversible Circuit Realizations of Boolean Functionshe realization. Second, we provide concrete realizations for several families of Boolean functions, such as the adder, incrementor, and threshold functions, which do not necessarily satisfy the preceding condition, but still have polynomial-size realizations; this is important because such realizati

蛤肉 发表于 2025-3-28 09:44:03

Efficient Protocols for Computing the Optimal Swap Edges of a Shortest Path Treerithm uses messages containing a constant amount of information, while the other is tailored for systems that allow long messages. The amount of data transferred by the protocols is the same and depends on on the structure of the shortest-path spanning-tree; it is no more, and sometimes significantl

FELON 发表于 2025-3-28 10:38:56

The Driving Philosophersrness and concurrency at the same time as well as the impossibility of solving the problem in an asynchronous model. We also conjecture the impossibility of solving the problem in an ad-hoc network model with limited-range communication.
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Exploring New Frontiers of Theoretical Informatics; IFIP 18th World Comp Jean-Jacques Levy,Ernst W. Mayr,John C. Mitchell Conference procee