Author of the publication

Implicit Computational Complexity and Applications: Resource Control, Security, Real-Number Computation (NII Shonan Meeting 2013-13).

, , and . NII Shonan Meet. Rep., (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Morpion Solitaire 5D: a new upper bound 121 on the maximum score., , , , and . CCCG, Carleton University, Ottawa, Canada, (2013)Invitation to Real Complexity Theory: Algorithmic Foundations to Reliable Numerics with Bit-Costs., and . CoRR, (2018)Weight Balancing on Boundaries and Skeletons., , , , , , , , , and 3 other author(s). SoCG, page 436. ACM, (2014)Proof of the Density Threshold Conjecture for Pinwheel Scheduling.. STOC, page 1816-1819. ACM, (2024)A lower bound on opaque sets., , , and . CoRR, (2014)Distance k-Sectors Exist, , , , and . CoRR, (2009)On Characterizations of Randomized Computation Using Plain Kolmogorov Complexity., and . MFCS (2), volume 8635 of Lecture Notes in Computer Science, page 348-359. Springer, (2014)Simple Strategies Versus Optimal Schedules in Multi-agent Patrolling., and . CIAC, volume 9079 of Lecture Notes in Computer Science, page 261-273. Springer, (2015)Computational Complexity of Smooth Differential Equations., , , and . Logical Methods in Computer Science, (2014)Computational benefit of smoothness: Parameterized bit-complexity of numerical operators on analytic functions and Gevrey's hierarchy., , , and . J. Complex., 31 (5): 689-714 (2015)