Topology Inside NC¹
نویسندگان
چکیده
We show that ACC0 is precisely what can be computed with constant-width circuits of polynomial size and polylogarithmic genus. This extends a characterization given by Hansen, showing that planar constant-width circuits also characterize ACC0. Thus polylogarithmic genus provides no additional computational power in this model. We consider other generalizations of planarity, including crossing number and thickness. We show that thickness two already suffices to capture all of NC1.
منابع مشابه
Topology inside NC1
We show that ACC0 is precisely what can be computed with constant-width circuits of polynomial size and polylogarithmic genus. This extends a characterization given by Hansen, showing that planar constant-width circuits also characterize ACC0. Thus polylogarithmic genus provides no additional computational power in this model. We consider other generalizations of planarity, including crossing n...
متن کاملFunctional, Histomorphometrical and Immunohistochemical Assessment of Sciatic Nerve Regeneration through Inside-Out Vein Graft in Rat
Objective- Comprehensive functional, histomorphometrical and immunohistochemical assessment of sciatic nerve regeneration through an inside-out vein graft in rat. Design- Experimental in vivo study. Animals- Fifty- four healthy male White Albino rats. Procedures- The rats were divided into three experimental groups (n=18), randomly: Sham-operation (NC), Transected control (TC) and Inside-out ve...
متن کاملA Hierarchy Topology Design Using a Hybrid Evolutionary Algorithm in Wireless Sensor Networks
Wireless sensor network a powerful network contains many wireless sensors with limited power resource, data processing, and transmission abilities. Wireless sensor capabilities including computational capacity, radio power, and memory capabilities are much limited. Moreover, to design a hierarchy topology, in addition to energy optimization, find an optimum clusters number and best location of ...
متن کاملASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...
متن کاملDomain Walls in QCD
QCD was shown to have a nontrivial vacuum structure due to the topology of the θ ≡ θ+2πn parameter. As a result of this nontrivial topology, in the large Nc limit, quasi-stable QCD domain walls appear, characterized by a transition in the singlet η field. We discuss the physics of these QCD domain walls as well as related axion domain walls and we present a new type of axion wall which also con...
متن کامل