Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • .../math>. So if <math>|A| \cdot |B| \geq |C|</math>, the [[expected number]] of claws is at least 1. If classical computers are used, the best algorithm is similar to a [[Meet-in-the-middle attack]], ...
    4 KB (581 words) - 08:17, 25 May 2023
  • {{Short description|Method of calculation of arithmetic mean}} ...calculation methods|rapid calculation methods]] which are more suited for computers which also ensure more accurate results than the obvious methods. ...
    5 KB (562 words) - 14:44, 25 February 2025
  • ....|mr=519066|title-link=Computers and Intractability: A Guide to the Theory of NP-Completeness}}</ref> ...t size <math>O(\log(n))</math>. Suppose that <math>L</math> is an encoding of a computational problem <math>\Pi</math> over alphabet <math>\Sigma</math>, ...
    6 KB (889 words) - 18:57, 13 July 2021
  • ...n qubit.png|thumb|One clean qubit quantum circuit that estimates the trace of <math>U</math>]] ...polynomial time, upon measuring the first qubit, with an error probability of at most 1/poly(n) for all instances.<ref name="shorjordan2008" /> ...
    7 KB (1,007 words) - 22:27, 1 March 2025
  • {{Short description|Computational complexity of quantum algorithms}} ...en quantum complexity classes and classical (i.e., non-quantum) complexity classes. ...
    27 KB (4,212 words) - 16:27, 16 December 2024
  • ...a [[polynomial time]] quantum verifier (running on a [[quantum computer]]) of this fact with high probability. Moreover, when the string is not in the la ...ween QMA and [[BQP]] is analogous to the relationship between [[complexity classes]] [[NP (complexity)|NP]] and [[P (complexity)|P]]. It is also analogous to ...
    14 KB (1,994 words) - 12:27, 14 December 2024
  • ...blem|inverse method]] that retrieves one or more [[Contour line|isoline]]s of a trace atmospheric constituent or variable. When used to validate another Suppose we have, as in [[contour advection]], inferred knowledge of a ...
    9 KB (1,443 words) - 16:53, 18 June 2024
  • ...or rejected, technical systems are prioritized for inspection on the basis of their failure risk, clinicians classify patients according to the extent to ...b>, ''c''<sub>2</sub>, ..., ''c''<sub>''k''</sub>}. It is therefore a kind of [[classification]] problem. ...
    14 KB (1,969 words) - 14:51, 1 July 2024
  • ...eople/|title=People &#124; Department of Mathematics &#124; The University of Chicago|website=mathematics.uchicago.edu}}</ref> ...book on [[topologically stratified space]]s and a book on the application of [[mathematical logic]] to geometry. ...
    9 KB (1,129 words) - 11:00, 7 April 2024
  • ...is a special [[graph labeling]] where each [[Incidence (graph)|incidence]] of an edge with a vertex is assigned a color under certain constraints. ...d (''u'', ''f'') are said to be '''adjacent''' or '''neighboring''' if one of the following holds: ...
    28 KB (4,002 words) - 09:45, 8 October 2024
  • {{Short description|Task of transforming a deterministic finite automaton}} ...ref>{{harvtxt|Hopcroft|Motwani|Ullman|2001}}, Section 4.4.3, "Minimization of DFA's".</ref> ...
    22 KB (3,399 words) - 17:56, 5 February 2025
  • ...e pancake graph P<sub>4</sub> can be constructed recursively from 4 copies of P<sub>3</sub> by assigning a different element from the set {1, 2, 3, 4} as ...ive graph|Vertex-transitive]]<br>[[Connectivity (graph theory)#Definitions of components, cuts and connectivity|Maximally connected]]<br>[[Connectivity ( ...
    16 KB (2,351 words) - 03:45, 30 December 2024
  • ...prevents compromised long-term keys from compromising the confidentiality of old communication sessions. These properties seemed to make SIDH a natural ...such as [[Transport Layer Security|TLS/SSL]]) has prompted the development of post-quantum cryptography.<ref>{{cite web|last=Utsler|first=Jim|title=Quant ...
    25 KB (3,825 words) - 01:30, 30 December 2023
  • |title=Handbook of Floating-Point Arithmetic It is named after Pat H. Sterbenz, who published a variant of it in 1974.<ref name="sterbenz">{{cite book ...
    9 KB (1,458 words) - 13:32, 3 June 2024
  • {{unsolved|mathematics|Do planar graphs have universal point sets of subquadratic size?}} ...rem|straight-line drawing]] in which the vertices are all placed at points of ''S''. ...
    14 KB (1,855 words) - 02:31, 30 April 2024
  • ...r.com/us/book/9781461494744 |title=Mathematical and Computational Modeling of Tonality: Theory and Applications |publisher = Springer |isbn=978-1-4614-94 ...8 | title = Out of the Grid and Into the Spiral: Geometric Interpretations of and Comparisons with the Spiral-Array Model | url = http://www.ccarh.org/pu ...
    15 KB (2,190 words) - 17:32, 19 November 2024
  • ...0304127| s2cid = 12246393 }}</ref> who proved it with increasing standards of rigor.<ref>{{Cite book |last=Wilde |first=Mark M. |url=https://www.worldcat The LSD theorem states that the [[coherent information]] of a [[quantum channel]] is an achievable rate for reliable quantum communicat ...
    10 KB (1,677 words) - 09:20, 1 November 2022
  • |+ Five types of parallelohedron ...llelohedron, first identified by [[Evgraf Fedorov]] in 1885 in his studies of crystallographic systems: the [[cube]], [[hexagonal prism]], [[rhombic dode ...
    17 KB (2,391 words) - 08:29, 4 December 2024
  • ...ras'''.<ref>R. Cignoli, Proper n-Valued Łukasiewicz Algebras as S-Algebras of Łukasiewicz ''n''-Valued Propositional Calculi, Studia Logica, 41, 1982, 3– ...can also be developed (from a purely logical standpoint) in the framework of Brower's [[intuitionistic logic]].<ref name="Geo">{{Cite journal | doi = 10 ...
    9 KB (1,248 words) - 08:02, 14 April 2024
  • {{Short description|Class of mathematical game}} ...ap games]] that involve removing tokens (game pieces or stones) from heaps of tokens. ...
    9 KB (1,448 words) - 20:51, 11 February 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)