Academic literature on the topic 'Information-Based Complexity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information-Based Complexity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information-Based Complexity"
Wozniakowski, H. "Information-Based Complexity." Annual Review of Computer Science 1, no. 1 (June 1986): 319–80. http://dx.doi.org/10.1146/annurev.cs.01.060186.001535.
Full textPackel, Edward W., and J. F. Traub. "Information-based complexity." Nature 328, no. 6125 (July 1987): 29–33. http://dx.doi.org/10.1038/328029a0.
Full textHeinrich, Stefan, and Jörg-Detlef Kern. "Parallel information-based complexity." Journal of Complexity 7, no. 4 (December 1991): 339–70. http://dx.doi.org/10.1016/0885-064x(91)90024-r.
Full textKon, Mark A. "Book Review: Information-based complexity." Bulletin of the American Mathematical Society 21, no. 2 (October 1, 1989): 332–40. http://dx.doi.org/10.1090/s0273-0979-1989-15851-5.
Full textTraub, J. F., and H. Wo\'zniakowski. "Perspectives on Information-Based Complexity." Bulletin of the American Mathematical Society 26, no. 1 (April 1, 1992): 29–53. http://dx.doi.org/10.1090/s0273-0979-1992-00240-9.
Full textLui, Leong Ting, Germán Terrazas, Hector Zenil, Cameron Alexander, and Natalio Krasnogor. "Complexity Measurement Based on Information Theory and Kolmogorov Complexity." Artificial Life 21, no. 2 (May 2015): 205–24. http://dx.doi.org/10.1162/artl_a_00157.
Full textParlett, Beresford N. "Some basic information\\ on information-based complexity theory." Bulletin of the American Mathematical Society 26, no. 1 (January 1, 1992): 3–29. http://dx.doi.org/10.1090/s0273-0979-1992-00239-2.
Full textOrme, Anthony Mark, Haining Yao, and Letha H. Etzkorn. "Complexity metrics for ontology based information." International Journal of Technology Management 47, no. 1/2/3 (2009): 161. http://dx.doi.org/10.1504/ijtm.2009.024120.
Full textPackel, Edward W., and Henryk Woźniakowski. "Recent developments in information-based complexity." Bulletin of the American Mathematical Society 17, no. 1 (July 1, 1987): 9–37. http://dx.doi.org/10.1090/s0273-0979-1987-15511-x.
Full textGalas, David J., Matti Nykter, Gregory W. Carter, Nathan D. Price, and Ilya Shmulevich. "Biological Information as Set-Based Complexity." IEEE Transactions on Information Theory 56, no. 2 (February 2010): 667–77. http://dx.doi.org/10.1109/tit.2009.2037046.
Full textDissertations / Theses on the topic "Information-Based Complexity"
Schmitt, Wagner. "A new 3D shape descriptor based on depth complexity and thickness information." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2015. http://hdl.handle.net/10183/127030.
Full textGeometric models play a vital role in several fields, from the entertainment industry to scientific applications. To reduce the high cost of model creation, reusing existing models is the solution of choice. Model reuse is supported by content-based shape retrieval (CBR) techniques that help finding the desired models in massive repositories, many publicly available on the Internet. Key to efficient and effective CBR techniques are shape descriptors that accurately capture the characteristics of a shape and are able to discriminate between different shapes. We present a descriptor based on the distribution of two global features measured on a 3D shape, depth complexity and thickness, which respectively capture aspects of the geometry and topology of 3D shapes. The final descriptor, called DCT (depth complexity and thickness histogram), is a 2D histogram that is invariant to the translation, rotation and scale of geometric shapes. We efficiently implement the DCT on the GPU, allowing its use in real-time queries of large model databases. We validate the DCT with the Princeton and Toyohashi Shape Benchmarks, containing 1815 and 10000 models respectively. Results show that DCT can discriminate meaningful classes of these benchmarks, and is fast to compute and robust against shape transformations and different levels of subdivision and smoothness.
Alamoudi, Rami Hussain. "Interaction Based Measure of Manufacturing Systems Complexity and Supply Chain Systems Vulnerability Using Information Entropy." Scholarly Repository, 2008. http://scholarlyrepository.miami.edu/oa_dissertations/76.
Full textThost, Veronika. "Using Ontology-Based Data Access to Enable Context Recognition in the Presence of Incomplete Information." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-227633.
Full textDash, Santanu Kumar. "Adaptive constraint solving for information flow analysis." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/16354.
Full textEugénio, António Luís Beja. "The information systems and technology innovation process: a study using an agent-based approach." Master's thesis, Instituto Superior de Economia e Gestão, 2007. http://hdl.handle.net/10400.5/636.
Full textUm modelo abstracto baseado em agentes é utilizado para estudar a inovação em Sistemas de Informação e em Tecnologia de Informação, no plano organizacional, utilizando uma aproximação sócio-cognitiva. A conclusão do estudo indica que o poder dos profissionais conhecedores de tecnologias de informação na decisão de adopção de uma determinada inovação varia com o nível de concordância de ideias entre eles e os decisores, ao mesmo tempo que depende da taxa de depreciação das transacções, conduzindo a uma forte flutuação de poder quando o ambiente é instável.
An abstract Agent Based Model is used to study Information Systems and Information Technology innovation on an organizational realm, using a socio-cognitive approach. Conclusion is drawn that the power of the knowledge workers in the decision to adopt an IS/IT innovation within an organization varies with the matching level of ideas between them and the top management, while being dependant of the transactions’ depreciation rate, leading to a strong fluctuation of power when the environment is unstable.
Syed, Tamseel Mahmood. "Precoder Design Based on Mutual Information for Non-orthogonal Amplify and Forward Wireless Relay Networks." University of Akron / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=akron1392043776.
Full textClément, François. "An Optimization Perspective on the Construction of Low-Discrepancy Point Sets." Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS138.
Full textDiscrepancy measures are metrics designed to quantify how well spread a point set is in a given space. Among these, the L∞ star discrepancy is arguably one of the most popular. Indeed, by the Koksma-Hlawka inequality~cite{Hlawka,Koksma}, when replacing an integral by the average of function evaluations in specific points, the error made is bounded by a product of two terms, one depending only on the function and the other on the L∞ star discrepancy of the points. This leads to a variety of applications, from computer vision to financial mathematics and to design of experiments where well-spread points covering a space are essential.Low-discrepancy sets used in such applications usually correspond to number theoretic designs, with a wide variety of possible constructions. Despite the high demand in practice, the design of these point sets remains largely the work of mathematicians, often more interested in finding asymptotic bounds than in adapting the point sets to the desired applications. This results in point sets that, while theoretically excellent, sometimes leave a lot to be desired for applications, in particular high-dimensional ones. Indeed, the constructions are not tailored to the many different settings found in applications and are thus suboptimal. Furthermore, not only do we not know how low the discrepancy of point sets of a given size in a fixed dimension can go, but often we do not even know the discrepancy of existing constructions. This leaves essential questions unanswered in the design of low-discrepancy sets and sequences. In this thesis, we tackle the problem of constructing low-discrepancy sets from a computational perspective. With optimization approaches applied in isolation or on top of existing sets and sequences, we provide a diverse set of methods to generate excellent low-discrepancy sets, largely outperforming the discrepancy of known constructions in a wide variety of contexts. In particular, we describe a number of examples such as provably optimal sets for very few points in dimension 2, or improved sets of hundreds of points in moderate dimensions via subset selection. Finally, we extend recent work on greedy one-dimensional sequence construction to show that greedy L2 construction of point sets provides excellent empirical results with respect to the L∞ star discrepancy
Domercant, Jean Charles. "ARC-VM: an architecture real options complexity-based valuation methodology for military systems-of-systems acquisitions." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/42928.
Full textМельничук, Андрій Богданович, and Andrii Melnychuk. "Методи захисту інформації в рамках предметно-орієнтованого проєктування інформаційних систем." Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36742.
Full textПредметно-орієнтоване проектування — це підхід до проектування програмного забезпечення. Метод проєктування визначає у собі практики як спілкуватись із спеціалістами, самої, предметної області та набір правил проектування де кінцевий код буде відображати у собі всі поняття самого домену. У деяких випадках розділення проблем, передбачених предметно орієнтованим підходом, важко досягти, а саме, коли розглядається функціональність, яка не залежить від домену, але є тісно пов’язаною з функціональністю, пов’язаною з предметною областю. Дані проблеми стосуються блоку програми яка б відповідала за безпеку. На жаль, засновник досліджуваного підходу не визначив як саме можна поєднати таку логіку, тому було досліджено різні методи забезпечення захисту даних та аналіз найкращих варіантів реалізації, які можна застосовувати у реальних проектах.
Domain Driven Design — is an approach to software design. The approach method defines the practices of how to communicate with specialists, of the subject area and a set of design rules where the final code will reflect all the concepts of the domain itself. In some cases, the separation covered by a subject-oriented approach is difficult to achieve, namely when considering functionality that is independent of the domain but is closely related to functionality related to the subject area. These issues are related to the security unit. Unfortunately, the founder of the researched approach did not define exactly how such logic can be combined. That is why were researched the different methods of data protection and analysis of the best implementation options that can be used in real projects.
ПЕРЕЛІК УМОВНИХ СКОРОЧЕНЬ…8 ВСТУП… 9 РОЗДІЛ 1. АНАЛІЗ ПРЕДМЕТНО-ОРІЄНТОВАНОГО ПРОЄКТУВАННЯ ТА ПРОБЛЕМИ БЕЗПЕКИ У НЬОМУ…13 1.1. Предметно-орієнтоване проєктування…13 1.2 Архітектура та структура проекту при DDD проєктуванні… 16 1.3 Аспектно-орієнтоване програмування…18 1.4 Вимірювання складності реалізації методу… 20 1.5 Проблема захисту даних при проектуванні…22 РОЗДІЛ 2. ЗАХИСТ ІНФОРМАЦІЇ В РАМКАХ ПРЕДМЕТНО-ОРІЄНТОВАНОГО ПРОЄКТУВАННЯ…24 2.1 Предмет дослідження проблеми захисту інформації… 24 2.2 Критерії оцінки варіантів реалізації безпеки в рамках предметно-орієнтованому проектуванні… 26 2.3 Аналіз методу захисту інформації, яка вбудована у шар предметної області… 28 2.3.1 Опис підходу та його плюси…28 2.3.2 Недоліки підходу… 30 2.3.3 Висновок по підрозділу…30 2.4 Аналіз методу захисту інформації, яка винесена в окремий контекст… 31 2.4.1 Опис підходу та його плюси…31 2.4.2 Недоліки підходу… 32 2.4.3 Висновок по підрозділу…34 2.5 Аналіз методу захисту інформації, з використанням фасаду предметної області… 34 2.5.1 Опис підходу та його плюси…35 2.5.2 Недоліки підходу… 36 2.5.3 Висновок по підрозділу…36 2.6 Аналіз методу захисту інформації, з використанням аспектно-орієнтованого підходу…37 2.6.1 Опис підходу та його плюси…37 2.6.2 Недоліки підходу… 38 2.6.3 Висновок по підрозділу…39 РОЗДІЛ 3. РЕАЛІЗАЦІЯ МЕТОДІВ ЗАХИСТУ ТА ПОРІВНЯННЯ СКЛАДНОСТІ…40 3.1 Реалізація базової структури проекту…40 3.1.1 Вибір середовища та технологія для створення інформаційної системи… 40 3.1.2 Розробка головного ядра інформаційної системи… 40 3.1.3 Розробка відокремленого контексту безпеки… 42 3.1.4 Розробка інтерфейсу користувача… 43 3.2 Аналіз складності у реалізацій та підтримки кожного із методів…44 3.2.1 Визначення значення залежностей у інформаційній системі…44 3.2.2 Вимірювання цикломатичної складності… 44 3.3 Підсумки отриманих результатів…45 РОЗДІЛ 4. ОХОРОНА ПРАЦІ ТА БЕЗПЕКА У НАДЗВИЧАЙНИХ СИТУАЦІЯХ…47 4.1 Охорона праці…47 4.2 Підвищення стійкості роботи підприємств будівельної галузі у воєнний час…49 ВИСНОВКИ… 54 СПИСОК ВИКОРИСТАНИХ ДЖЕРЕЛ… 56 ДОДАТКИ…59
Kuhn, John. "A THEORY OF COMPLEX ADAPTIVE INQUIRING ORGANIZATIONS: APPLICATION TO CONTINUOUS ASSURANCE OF CORPORATE FINANCIAL INFORMATION." Doctoral diss., University of Central Florida, 2009. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2432.
Full textPh.D.
Department of Management Information Systems
Business Administration
Business Administration PhD
Books on the topic "Information-Based Complexity"
W, Wasilkowski G., and Woźniakowski H, eds. Information-based complexity. Boston: Academic Press, 1988.
Find full textPetras, Iasonas. Contributions to Information-Based Complexity and to Quantum Computing. [New York, N.Y.?]: [publisher not identified], 2013.
Find full textCvetkov, Viktor. Basics of complexity theory. ru: INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/2110856.
Full textZu, Qiaohong. Pervasive Computing and the Networked World: Joint International Conference, ICPCA/SWS 2012, Istanbul, Turkey, November 28-30, 2012, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textBaryshev, Ruslan. Proactive library in the information and educational environment of the University. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1123649.
Full textKaliski, Burton S. Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop Redwood Shores, CA, USA, August 13 15, 2002 Revised Papers. Berlin: Springer-Verlag Berlin Heidelberg, 2003.
Find full textChristof, Paar, and SpringerLink (Online service), eds. RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textJianying, Zhou, Li Hui, and SpringerLink (Online service), eds. Information Security: 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings. Berlin, Heidelberg: Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textStanescu, Liana. Creating New Medical Ontologies for Image Annotation: A Case Study. New York, NY: Springer Science+Business Media, LLC, 2012.
Find full text1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Boston, MA: Springer Science+Business Media, LLC, 2011.
Find full textBook chapters on the topic "Information-Based Complexity"
Traub, J. F. "Introduction to Information-Based Complexity." In Complexity in Information Theory, 63–76. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4612-3774-7_3.
Full textStandish, Russell K. "Information-Based Complexity of Networks." In Advances in Network Complexity, 209–27. Weinheim, Germany: Wiley-VCH Verlag GmbH & Co. KGaA, 2013. http://dx.doi.org/10.1002/9783527670468.ch09.
Full textPolkowski, Lech. "Granulation of Knowledge: Similarity Based Approach in Information and Decision Systems." In Computational Complexity, 1464–87. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1800-9_94.
Full textLin, Grace Y., Richard Breitwieser, Feng Cheng, John T. Eagen, and Markus Ettl. "Product Hardware Complexity and Its Impact on Inventory and Customer On-Time Delivery." In Information-Based Manufacturing, 61–79. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1599-9_4.
Full textZhao, Weidong, Haitao Liu, and Xi Liu. "Role Identification Based on the Information Dependency Complexity." In Advanced Data Mining and Applications, 276–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-53917-6_25.
Full textTraub, Joseph F. "Information-based complexity: Recent results and open problems." In Fundamentals of Computation Theory, 86–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/3-540-54458-5_52.
Full textMockus, Jonas, William Eddy, Audris Mockus, Linas Mockus, and Gintaras Reklaitis. "Information-Based Complexity (IBC) and the Bayesian Heuristic Approach." In Nonconvex Optimization and Its Applications, 31–46. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4757-2627-5_2.
Full textPolkowski, Lech. "Granulation of Knowledge: Similarity Based Approach in Information and Decision Systems." In Encyclopedia of Complexity and Systems Science, 4411–35. New York, NY: Springer New York, 2009. http://dx.doi.org/10.1007/978-0-387-30440-3_262.
Full textPolkowski, Lech. "Granulation of Knowledge: Similarity Based Approach in Information and Decision Systems." In Encyclopedia of Complexity and Systems Science, 1–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-642-27737-5_262-2.
Full textEguchi, Takao, Tsuyoshi Koga, and Kazuhiro Aoyama. "MANAGEMENT OF RELATIONSHIPS BETWEEN PRODUCT INFORMATION ON MODEL BASED DESIGN PROCESS." In Gain competitive advantage by managing complexity, 211–24. München: Carl Hanser Verlag GmbH & Co. KG, 2012. http://dx.doi.org/10.3139/9783446434127.017.
Full textConference papers on the topic "Information-Based Complexity"
Wasilkowski, G. W. "Information-Based Complexity; An Overview." In 1990 American Control Conference. IEEE, 1990. http://dx.doi.org/10.23919/acc.1990.4790762.
Full textKipp, Teresa A. "Fusion by the information-based complexity approach." In Optical Engineering and Photonics in Aerospace Sensing, edited by Lynn E. Garn and Lynda L. Graceffo. SPIE, 1993. http://dx.doi.org/10.1117/12.161456.
Full textMoore, Philip. "The Complexity of Context in Mobile Information Systems." In 2009 International Conference on Network-Based Information Systems (NBIS). IEEE, 2009. http://dx.doi.org/10.1109/nbis.2009.10.
Full textFoucart, Simon. "Complexity of multivariate problems based on binary information." In 2017 International Conference on Sampling Theory and Applications (SampTA). IEEE, 2017. http://dx.doi.org/10.1109/sampta.2017.8024351.
Full textFuhrer, Julian, Alejandro Blenkmann, Tor Endestad, Anne-Kristin Solbakk, and Kyrre Glette. "Complexity-based Encoded Information Quantification in Neurophysiological Recordings." In 2022 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC). IEEE, 2022. http://dx.doi.org/10.1109/embc48229.2022.9871501.
Full textPizzolante, Raffaele, Arcangelo Castiglione, Bruno Carpentieri, and Alfredo De Santis. "Parallel Low-Complexity Lossless Coding of Three-Dimensional Medical Images." In 2014 17th International Conference on Network-Based Information Systems (NBiS). IEEE, 2014. http://dx.doi.org/10.1109/nbis.2014.107.
Full textRavari, Alireza Norouzzadeh, and Hamid D. Taghirad. "Transformation invariant 3D object recognition based on information complexity." In 2014 Second RSI/ISM International Conference on Robotics and Mechatronics (ICRoM). IEEE, 2014. http://dx.doi.org/10.1109/icrom.2014.6991019.
Full textAimin, Luo, Huang Li, and Luo Xueshan. "Entropy-Based Complexity Analysis for Architecture of Information System." In 2008 IEEE International Conference on Networking, Sensing and Control (ICNSC). IEEE, 2008. http://dx.doi.org/10.1109/icnsc.2008.4525503.
Full textLee, Gil-beom, Youn-chul Shin, Joo-heon Park, and Myeong-jin Lee. "Low-complexity camera tamper detection based on edge information." In 2014 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW). IEEE, 2014. http://dx.doi.org/10.1109/icce-tw.2014.6904034.
Full textSun Yanming, Zhang Kaisheng, Zhang Xiaohua, and Zheng Shixiong. "Modeling of manufacturing information system based on complexity science." In International Technology and Innovation Conference 2006 (ITIC 2006). IEE, 2006. http://dx.doi.org/10.1049/cp:20060765.
Full textReports on the topic "Information-Based Complexity"
Parlett, Beresford. Some Basic Information on Information-Based Complexity Theory. Fort Belvoir, VA: Defense Technical Information Center, July 1989. http://dx.doi.org/10.21236/ada256585.
Full textSanders, David M., and William B. Carlton. Information Overload at the Tactical Level (an Application of Agent Based Modeling and Complexity Theory in Combat Modeling). Fort Belvoir, VA: Defense Technical Information Center, August 2002. http://dx.doi.org/10.21236/ada405459.
Full textMascagni, Giulia, Roel Dom, and Fabrizio Santoro. The VAT in Practice: Equity, Enforcement and Complexity. Institute of Development Studies (IDS), January 2021. http://dx.doi.org/10.19088/ictd.2021.002.
Full textPilkevych, Ihor, Oleg Boychenko, Nadiia Lobanchykova, Tetiana Vakaliuk, and Serhiy Semerikov. Method of Assessing the Influence of Personnel Competence on Institutional Information Security. CEUR Workshop Proceedings, April 2021. http://dx.doi.org/10.31812/123456789/4374.
Full textBaader, Franz, Stefan Borgwardt, and Marcel Lippmann. Temporal Conjunctive Queries in Expressive DLs with Non-simple Roles. Technische Universität Dresden, 2015. http://dx.doi.org/10.25368/2022.222.
Full textBorgwardt, Stefan, and Walter Forkel. Closed-World Semantics for Conjunctive Queries with Negation over ELH⊥ Ontologies. Technische Universität Dresden, 2019. http://dx.doi.org/10.25368/2023.222.
Full textKud, A. A. Figures and Tables. Reprinted from “Comprehensive сlassification of virtual assets”, A. A. Kud, 2021, International Journal of Education and Science, 4(1), 52–75. KRPOCH, 2021. http://dx.doi.org/10.26697/reprint.ijes.2021.1.6.a.kud.
Full textLutz, Carsten, and Frank Wolter. Modal Logics of Topological Relations. Technische Universität Dresden, 2004. http://dx.doi.org/10.25368/2022.142.
Full textKoopmann, Patrick. Ontology-Mediated Query Answering for Probabilistic Temporal Data with EL Ontologies (Extended Version). Technische Universität Dresden, 2018. http://dx.doi.org/10.25368/2022.242.
Full textLutz, Carsten, Carlos Areces, Ian Horrocks, and Ulrike Sattler. Keys, Nominals, and Concrete Domains. Technische Universität Dresden, 2002. http://dx.doi.org/10.25368/2022.122.
Full text