?
Short lists with short programs in short time
Hasso-Plattner-Institut
,
2013.
No. TR13-007.
Given a machine $U$, a $c$-short program for $x$ is a string $p$ such that $U(p)=x$ and the length of $p$ is bounded by $c$ + (the length of a shortest program for $x$). We show that for any universal machine, it is possible to compute in polynomial time on input $x$ a list of polynomial size guaranteed to contain a $O(\log |x|)$-short program for $x$. We also show that there exist computable functions that map every $x$ to a list of size $O(|x|^2)$ containing a $O(1)$-short program for $x$ and this is essentially optimal because we prove that such a list must have size $\Omega(|x|^2)$. Finally we show that for some machines, computable lists containing a shortest program must have length $\Omega(2^{|x|})$.
Vereshchagin N., Bauwens B. F., Makhlin A. et al., Computational Complexity 2018 Vol. 27 No. 1 P. 31-61
Given a machine $U$, a $c$-short program for $x$ is a string $p$ such that $U(p)=x$ and the length of $p$ is bounded by $c$ + (the length of a shortest program for $x$). We show that for any universal machine, it is possible to compute in polynomial time on input $x$ a list of ...
Added: April 22, 2017
Васильева Т. П., Мызникова Б. И., Rusakov S. V., Научно-технические ведомости Санкт-Петербургского государственного политехнического университета. Информатика. Телекоммуникации. Управление 2012 № 1(140) С. 73-79
Предложена модель, включающая описание двух взаимодействующих подсистем: «население» и «градообразующая база». Представлено построение матрицы вероятностей распределения потоков характеристик между отраслевыми блоками, а также матрицы вероятностей миграции населения между федеральными округами. Дана интерпретация результатов моделирования, полученных с помощью реальных статистических данных. ...
Added: March 10, 2015
Красноярск : ИВМ СО РАН, 2013
Труды Пятой Международной конференции «Системный анализ и информационные технологии» САИТ-2013 (19–25 сентября 2013 г., г.Красноярск, Россия): ...
Added: November 18, 2013
Babash A. V., М. : ИНФРА-М, РИОР, 2013
Пособие предназначено для студентов высших учебных заведений, обучающихся по специальности «Прикладная информатика (в экономике)». Оно также содержит методический материал для ряда инновационных курсов лекций по профилю «Информационная безопасность» и может быть использовано и для блока дисциплин этого профиля. Ряд представленных результатов полезен специалистам и аспирантам, специализирующихся в указанной области. ...
Added: January 14, 2014
NY : IEEE Computer Society, 2018
WF-IoT 2018, the 4th IEEE World Forum on Internet of Things, is the premier IEEE Forum for the Internet of Things. It is where conference attendees, from around the globe - including research institutes, academia, industry and the public sector -- share their knowledge, expertise and experiences about IoT technologies, applications, economic impacts, and social ...
Added: February 14, 2018
Пермь : Пермский государственный национальный исследовательский университет, 2018
В сборник включены статьи, относящиеся к следующим направлениям научной работы: моделирование и анализ процессов и систем; разработка, анализ и тестирование программных систем, методы и инструментальные средства разработки программных систем.
Представлены результаты выполнения проектов, поддержанных грантами РФФИ (проекты № 18-01-00359, № 18-37-00070) и научного фонда НИУ ВШЭ (проект № 17-05-0020).
Материалы сборника могут представлять интерес для научных работников, специалистов ...
Added: December 16, 2018
Lychkina N. N., Глазков Д. Н., Хоружевская А. П., Логистика и управление цепями поставок 2014 Т. 05 № 64 С. 57-63
В статье демонстрируется применение метода имитационного моделирования в среде AnyLogic в целях оптимизации логистической сети промышленной компании, работающей на рынке промышленных газов. В модели детализированы основные процессы, связанные с транпортировкой продукта, обслуживанием заявок клиентов и распределением продукта потребителям. Были учтены факторы, носящие стохастический характер, такие как неритмичность производства, погодные условия, влияющие на уровень спроса, количество ...
Added: November 30, 2014
Guimarães R. R., Passos L., Filho R. H. et al., IEEE Network 2019 Vol. 33 No. 2 P. 126-131
Distinguishing outliers from normal data in wireless sensor networks has been a big challenge in the anomaly detection domain, mostly due to the nature of the anomalies, such as software or hardware failures, reading errors or malicious attacks, just to name a few. In this article, we introduce an anomaly detection-based OPF classifier in the ...
Added: December 19, 2018
L. : IEEE, 2016
IntelliSys 2016 conference will focus on areas of intelligent systems and artificial intelligence and how it applies to the real world. It is an opportunity for researchers in this field to meet and discuss solutions, scientific results, and methods in solving important problems in this field. Conference Topics include, but are not limited to: Artificial ...
Added: February 25, 2017
Aier S., Gordijn J., Proper H. . et al., IEEE Computer Society, 2020
The 22nd IEEE International Conference on Business Informatics (IEEE CBI 2020) was held June 22–24, 2020. This time, the conference was hosted by the University of Antwerp, Belgium but due to the COVID-19 pandemic, the conference was organized online. While this is not the preferred format of an academic conference, it provided the opportunity to ...
Added: July 13, 2020
Fuad Aleskerov, Demin S., Shvydun S., SN Computer Science 2020 Vol. 1 No. 2 Article 68
The paper examines the choice problem when the total number of observations and criteria is too large. There are many different procedures, which are used for decision-making process under multiple criteria; however, most of them cannot be applied to large datasets due to their computational complexity while others provide sufficient accuracy. To solve the problem, ...
Added: February 20, 2020
Silakov D., Системный администратор 2018 № 6 С. 24-28
CentOS 7 was released in 2014, but many system administrators still use the old CentOS 6.x. The more so since updates for CentOS 6 are going to be released till the year 2020. There are a lot of reasons to use the old version, but one of the major ones is significants of functional changes ...
Added: October 19, 2018
Samodurov V., Kornilov V., Isaev E., Вопросы оборонной техники. Серия 16: Технические средства противодействия терроризму 2016 № 7-8 С. 139-145
The paper examines the main problems of ensuring information security of cloud technologies, technical and legislative. It discussed the ways to improve the security of cloud computing: the choice of the most secure cloud model, legal ways to improve the security of cloud. ...
Added: October 16, 2016
Wien : DAAAM International Vienna, 2017
The use of cloud computing to ensure interaction between the state and citizens allows to speed up information interaction, to realize state services, to reduce the costs of providing such interaction, but at the same time this interaction raises important questions about the reliability of the cloud provider and security of interaction. Providers of the ...
Added: February 1, 2018
Silakov D., Системный администратор 2017 № 6-7 С. 19-23
Many third party applications installed in a Linux system only requires a minimal base components from the target distribution and it is logical to put them intsome isolated environment which will guarantee additional stability and safety - for example, in case when application libraris overrided the system ones.
Container (more particular - isolation techniques that are ...
Added: August 24, 2017
Silakov D., Системный администратор 2018 № 10 С. 34-39
С ростом популярности контейнеризации приложений растет спрос на приложения, способные управлять большим количеством контейнеров. На слуху прежде всего Kubernetes и Docker Swarm. Однако у них есть и другие достойные открытые конкуренты. В этой статье мы рассмотрим Mesos, развиваемый фондом Apache ...
Added: February 20, 2019
Samodurov V., Kornilov V., Isaev E., Проблемы информационной безопасности. Компьютерные системы 2014 № 4 С. 176-186
The main threats to the reliability and information security data centers are designated and systematized. In first there are the technical threat of failure of the life support systems of various DC: server nodes, power system, air-conditioning, fire-fighting, provider's lines, cable systems, etc. In second there are external threats: in particular, the threat of DDoS-attacks ...
Added: February 19, 2015
Akopov A. S., Beklaryan L. A., Saghatelyan A. K., Environmental Modelling and Software 2019 Vol. 116 P. 7-25
Urban greenery such as trees can effectively reduce air pollution in a natural and eco-friendly way. However, how to spatially locate and arrange greenery in an optimal way remains as a challenging task. We developed an agent-based model of air pollution dynamics to support the optimal allocation and configuration of tree clusters in a city. The Pareto ...
Added: February 24, 2019
Vikentyeva O., Deryabin A. I., Shestakova L. V., International Journal "Information Theories and Applications" 2015 Т. 22 № 2 С. 169-182
In this paper we continue the investigation related to the develpoment of tools for the design and implementation of computer business games, aimed at creating a certain level of competence in the process of realization of the scenarios defined by models of applied domain. ...
Added: July 15, 2015
Serova E., Guryeva I., Khvatova T., International Journal of Technology and Human Interaction 2018
In such a socially significant sphere as healthcare industry, innovation activity has become vital especially in such areas as automation of physician working place, creation of unified electronic medical record, distribution of intelligent decision support systems for medical solutions, application and wide dissemination of new medical technologies, telemedicine development. The intersection of medicine and ICT ...
Added: March 15, 2018
Хивинцев М. А., Akopov A. S., Бизнес-информатика 2013 № 3(25) С. 35-41
In the article is presented a novel approach to the solution of multi-objective optimizing problems of large-scale dimension systems realized, in particular, in the simulation systems of the class AnyLogic through distributed calculations. A new concept of creation of the distributed evolutionary network is suggested, based on splitting of space of required variables into clusters ...
Added: October 3, 2013
Baranov P., Системы высокой доступности 2014 № 4 С. 94-98
During creation of a centralized identity management IT-service the IT-project's management division faces necessity of making a number of decisions that influence the project as a whole and could be crucial for its overall success. These decisions include: automation processes' selection (creation, modification, removal of user identities, user rights' reconciliation), managed IT-systems' user rights role ...
Added: February 11, 2015
Yasnitsky L., Пермь : Пермский государственный национальный исследовательский университет. – Электронные данные. , 2020
The collection contains materials from the international conference "Intelligent systems in science and technology" and the Sixth all-Russian scientific and practical conference "Artificial intelligence in solving urgent social and economic problems of the XXI century", which was held on October 12-18, 2020 in Perm as part of the Perm natural science forum "Mathematics and global ...
Added: December 4, 2020