Complexity function

Results: 282



#Item
201Computational complexity theory / Analysis of algorithms / Field theory / Fourier analysis / Submodular set function / Subadditivity / Valuation / Approximation algorithm / Big O notation / Mathematics / Theoretical computer science / Mathematical analysis

JMLR: Workshop and Conference Proceedings vol[removed]–24 Learning Valuation Functions Maria Florina Balcan NINAMF @ CC . GATECH . EDU

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2012-05-24 21:07:27
202Matroid theory / Operations research / Computational complexity theory / Submodular set function / Matroid / Linear programming / Combinatorial optimization / Algorithm / Approximation algorithm / Mathematics / Applied mathematics / Theoretical computer science

Submodular Functions: Learnability, Structure, and Optimization∗ Maria-Florina Balcan† Nicholas J. A. Harvey‡ arXiv:1008.2159v3 [cs.DS] 22 Aug 2012

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2012-08-23 13:02:17
203Mathematical logic / Norm / T-norm / Monoidal t-norm logic / Logarithm / Function / Łukasiewicz logic / Valuation / Sheaf / Mathematics / Fuzzy logic / Logic

Complexity Sources in Fuzzy Description Logic Marco Cerami1,? and Umberto Straccia2 1 Palack´ y University in Olomouc, Czech Republic

Add to Reading List

Source URL: ceur-ws.org

Language: English - Date: 2014-07-07 10:05:54
204Measure theory / Computational complexity theory / Calculus / Data privacy / Differential privacy / Continuous function / Support / Communication complexity / VC dimension / Theoretical computer science / Mathematical analysis / Mathematics

JMLR: Workshop and Conference Proceedings vol 35:1–20, 2014 Sample Complexity Bounds on Differentially Private Learning via Communication Complexity Vitaly Feldman IBM Research - Almaden.

Add to Reading List

Source URL: jmlr.org

Language: English - Date: 2014-05-28 14:26:58
205Models of computation / Computability theory / Turing machine / Automata theory / Computable function / Computability / Computational complexity theory / Oracle machine / Finite-state machine / Theoretical computer science / Theory of computation / Mathematics

PDF Document

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2014-05-16 07:14:52
206Measure theory / Computational complexity theory / Calculus / Data privacy / Differential privacy / Continuous function / Support / Communication complexity / VC dimension / Theoretical computer science / Mathematical analysis / Mathematics

JMLR: Workshop and Conference Proceedings vol 35:1–20, 2014 Sample Complexity Bounds on Differentially Private Learning via Communication Complexity Vitaly Feldman IBM Research - Almaden.

Add to Reading List

Source URL: privacytools.seas.harvard.edu

Language: English - Date: 2014-07-01 15:57:25
207Computing / Information science / Hash function / Hash table / Cardinality / Time complexity / Estimation theory / Lookup table / Relational database / Search algorithms / Hashing / Theoretical computer science

PDF Document

Add to Reading List

Source URL: dblab.kaist.ac.kr

Language: English - Date: 2000-07-20 02:26:40
208Software sizing / Software development process / Complexity / Business case / Validation / Function point / EMF / Science / Management / Project management

Treasury Board of Canada Secretariat Secrétariat du Conseil du Trésor du Canada

Add to Reading List

Source URL: www.tbs-sct.gc.ca

Language: English - Date: 2001-07-18 12:48:34
209Complexity / Holism / Transdisciplinarity / Science / Structure / L / Nature / Complex systems theory / Systems / Abstraction

INFORMATION SYSTEMS JOB PROFILE DOCUMENT POSITION NO: _________________ INFRASTRUCTURE FUNCTION ORGANIZATIONAL FUNCTION COMMUNICATIONS

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2013-06-24 23:14:35
210Advantage / ICE / Quantum information science / Cryptographic hash functions / Quantum circuit / Pseudorandom generator theorem / Cryptography / Computational complexity theory / T-function

Distinguishing Attacks on T-functions Simon K¨ unzli1 , Pascal Junod2 , and Willi Meier1 1 2

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-01-28 11:18:20
UPDATE