نتایج جستجو برای: germicide p

تعداد نتایج: 1269779  

Journal: :international journal of group theory 2012
anitha thillaisundaram

a $p$-group $g$ is $p$-central if $g^{p}le z(g)$‎, ‎and $g$ is‎ ‎$p^{2}$-abelian if $(xy)^{p^{2}}=x^{p^{2}}y^{p^{2}}$ for all $x,yin‎ ‎g$‎. ‎we prove that for $g$ a finite $p^{2}$-abelian $p$-central ‎$p$-group‎, ‎excluding certain cases‎, ‎the order of $g$ divides the ‎order of $text{aut}(g)$‎.

Journal: :Theoría. Revista del Colegio de Filosofía 1999

Journal: :Cadernos Wittgenstein 2000

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2004
Xiaoyang Gu

In this paper, we use resource-bounded dimension theory to investigate polynomial size circuits. We show that for every i ≥ 0, P/poly has ith order scaled p 3 -strong dimension 0. We also show that P/poly i.o. has p 3 -dimension 1/2, p 3 -strong dimension 1. Our results improve previous measure results of Lutz (1992) and dimension results of Hitchcock and Vinodchandran (2004).

1999
LESLIE ANN GOLDBERG MARK JERRUM

The problem of counting unlabelled subtrees of a tree (that is, subtrees that are distinct up to isomorphism) is #P-complete, and hence equivalent in computational difficulty to evaluating the permanent of a 0,1-matrix.

2006
Sergei O. Kuznetsov Sergei A. Obiedkov

Implications of a formal context (G,M, I) have a minimal implication basis, called Duquenne-Guigues basis or stem base. It is shown that the problem of deciding whether a set of attributes is a premise of the stem base is in coNP and determining the size of the stem base is polynomially Turing equivalent to a #P-complete problem.

1991
Teresa M. Przytycka Józef H. Przytycki

We show that an essential part of the new (Jones-type) polynomial link invariants can be computed in subexponential time. This is in a sharp contrast to the result of Jaeger, Vertigan and Welsh that computing the whole polynomial and most of its evaluations is #P-hard.

Journal: :Electr. J. Comb. 2012
Michael Snook

We show that it is #P-complete to count the number of bases of matroids representable over a fixed infinite field or fields of fixed characteristic.

2015
Ji-Jian Chin Syh-Yuan Tan Swee-Huay Heng Raphael Chung-Wei Phan

Most identity-based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent attacks using interactive assumptions such as the one-more RSA inversion assumption or the one-mor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید