Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
An introduction to Kolmogorov complexity and its applications (2nd ed.)June 1997
  • Authors:
  • Ming Li,
  • Paul Vitányi
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-0-387-94868-3
Published:01 June 1997
Pages:
637
Skip Bibliometrics Section
Reflects downloads up to 04 Oct 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. Consoli S, Korst J, Pauws S and Geleijnse G (2020). Improved metaheuristics for the quartet method of hierarchical clustering, Journal of Global Optimization, 78:2, (241-270), Online publication date: 1-Oct-2020.
  2. ACM
    Nehéz M and Bartalos P Complexity Aspects of Unstructured Sparse Graph Representation Proceedings of the 9th Balkan Conference on Informatics, (1-3)
  3. Mindermann S and Armstrong S Occam's razor is insufficient to infer the preferences of irrational agents Proceedings of the 32nd International Conference on Neural Information Processing Systems, (5603-5614)
  4. Mowshowitz A and Dehmer M (2018). A calculus for measuring the elegance of abstract graphs, Applied Mathematics and Computation, 320:C, (142-148), Online publication date: 1-Mar-2018.
  5. Kuri-Morales A (2017). Closed determination of the number of neurons in the hidden layer of a multi-layered perceptron network, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 21:3, (597-609), Online publication date: 1-Feb-2017.
  6. Antunes L, Bauwens B, Souto A and Teixeira A (2017). Sophistication vs Logical Depth, Theory of Computing Systems, 60:2, (280-298), Online publication date: 1-Feb-2017.
  7. Barmpalias G, Lewis-Pye A and Teutsch J (2016). Lower bounds on the redundancy in computations from random oracles via betting strategies with restricted wagers, Information and Computation, 251:C, (287-300), Online publication date: 1-Dec-2016.
  8. Lu R (2016). A peep at knowledge science in a categorical prospect, Frontiers of Computer Science: Selected Publications from Chinese Universities, 10:5, (767-768), Online publication date: 1-Oct-2016.
  9. Milovanov A Algorithmic Statistics Proceedings of the 11th International Computer Science Symposium on Computer Science --- Theory and Applications - Volume 9691, (280-293)
  10. Nies T, Beecks C, Godin F, Neve W, Stepien G, Arndt D, Vocht L, Verborgh R, Seidl T, Mannens E and Walle R Normalized Semantic Web Distance Proceedings of the 13th International Conference on The Semantic Web. Latest Advances and New Domains - Volume 9678, (69-84)
  11. Javid M, Blackwell T, Zimmer R and Al-Rifaie M Correlation Between Human Aesthetic Judgement and Spatial Complexity Measure Proceedings of the 5th International Conference on Evolutionary and Biologically Inspired Music, Sound, Art and Design - Volume 9596, (79-91)
  12. Schröder M, Steinberg F and Ziegler M Average-Case Bit-Complexity Theory of Real Functions Revised Selected Papers of the 6th International Conference on Mathematical Aspects of Computer and Information Sciences - Volume 9582, (505-519)
  13. ACM
    Feng G, Xiong K, Tang Y, Cui A, Bai J, Li H, Yang Q and Li M Question Classification by Approximating Semantics Proceedings of the 24th International Conference on World Wide Web, (407-417)
  14. Silva F, Correia L and Christensen A R-HybrID Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (735-744)
  15. Simpson S (2015). Symbolic Dynamics, Theory of Computing Systems, 56:3, (527-543), Online publication date: 1-Apr-2015.
  16. Schmidhuber J (2015). Deep learning in neural networks, Neural Networks, 61:C, (85-117), Online publication date: 1-Jan-2015.
  17. Bi J and Cheng Q (2014). Lower bounds of shortest vector lengths in random NTRU lattices, Theoretical Computer Science, 560:P2, (121-130), Online publication date: 4-Dec-2014.
  18. ACM
    Huizinga J, Clune J and Mouret J Evolving neural networks that are both modular and regular Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (697-704)
  19. ACM
    Martins L, Nobre R, Delbem A, Marques E and Cardoso J Exploration of compiler optimization sequences using clustering-based selection Proceedings of the 2014 SIGPLAN/SIGBED conference on Languages, compilers and tools for embedded systems, (63-72)
  20. ACM
    Martins L, Nobre R, Delbem A, Marques E and Cardoso J (2014). Exploration of compiler optimization sequences using clustering-based selection, ACM SIGPLAN Notices, 49:5, (63-72), Online publication date: 5-May-2014.
  21. Costa E, Verwer S and Blockeel H Estimating Prediction Certainty in Decision Trees Proceedings of the 12th International Symposium on Advances in Intelligent Data Analysis XII - Volume 8207, (138-149)
  22. Huy T, Shao H, Tong B and Suzuki E (2013). A feature-free and parameter-light multi-task clustering framework, Knowledge and Information Systems, 36:1, (251-276), Online publication date: 1-Jul-2013.
  23. Raskhodnikova S, Ron D, Rubinfeld R and Smith A (2013). Sublinear Algorithms for Approximating String Compressibility, Algorithmica, 65:3, (685-709), Online publication date: 1-Mar-2013.
  24. Demski A Logical prior probability Proceedings of the 5th international conference on Artificial General Intelligence, (50-59)
  25. Hibbard B Decision support for safe AI design Proceedings of the 5th international conference on Artificial General Intelligence, (117-125)
  26. Hibbard B Avoiding unintended AI behaviors Proceedings of the 5th international conference on Artificial General Intelligence, (107-116)
  27. de Oliveira W, Justino E and Oliveira L Authorship attribution of electronic documents comparing the use of normalized compression distance and support vector machine in authorship attribution Proceedings of the 19th international conference on Neural Information Processing - Volume Part I, (632-639)
  28. Rakthanmanon T, Keogh E, Lonardi S and Evans S (2012). MDL-based time series clustering, Knowledge and Information Systems, 33:2, (371-399), Online publication date: 1-Nov-2012.
  29. Patitz M and Summers S (2012). Identifying Shapes Using Self-assembly, Algorithmica, 64:3, (481-510), Online publication date: 1-Nov-2012.
  30. Grosse R, Salakhutdinov R, Freeman W and Tenenbaum J Exploiting compositionality to explore a large space of model structures Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence, (306-315)
  31. Li Y, Hu C, Chen M and Hu J Investigating aesthetic features to model human preference in evolutionary art Proceedings of the First international conference on Evolutionary and Biologically Inspired Music, Sound, Art and Design, (153-164)
  32. Gurevich Y and Passmore G (2012). Impugning Randomness, Convincingly, Studia Logica, 100:1-2, (193-222), Online publication date: 1-Apr-2012.
  33. ACM
    Nishida K, Banno R, Fujimura K and Hoshide T Tweet classification by data compression Proceedings of the 2011 international workshop on DETecting and Exploiting Cultural diversiTy on the social web, (29-34)
  34. Roshanbin N and Miller J Finding homoglyphs Proceedings of the 12th international conference on Web information system engineering, (1-14)
  35. ACM
    Pavlovic D Gaming security by obscurity Proceedings of the 2011 New Security Paradigms Workshop, (125-140)
  36. Hibbard B Measuring agent intelligence via hierarchies of environments Proceedings of the 4th international conference on Artificial general intelligence, (303-308)
  37. ACM
    Hitchcock J, Pavan A and Vinodchandran N (2011). Kolmogorov Complexity in Randomness Extraction, ACM Transactions on Computation Theory, 3:1, (1-12), Online publication date: 1-Aug-2011.
  38. Thach N, Shao H, Tong B and Suzuki E A compression-based dissimilarity measure for multi-task clustering Proceedings of the 19th international conference on Foundations of intelligent systems, (123-132)
  39. Farjudian A On the Kolmogorov complexity of continuous real functions Proceedings of the 7th conference on Models of computation in context: computability in Europe, (81-91)
  40. V'Yugin V (2011). On universal algorithms for adaptive forecasting, Problems of Information Transmission, 47:2, (166-189), Online publication date: 1-Jun-2011.
  41. Ahmed S, Khan M and Shahjahan M A filter based feature selection approach using lempel ziv complexity Proceedings of the 8th international conference on Advances in neural networks - Volume Part II, (260-269)
  42. Alpcan T A framework for optimization under limited information Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (234-243)
  43. Calude C, Nies A, Staiger L and Stephan F (2011). Universal recursively enumerable sets of strings, Theoretical Computer Science, 412:22, (2253-2261), Online publication date: 1-May-2011.
  44. Kulich T and Kemeňová M (2011). On the paper of Pascal Schweitzer concerning similarities between incompressibility methods and the Lovász Local Lemma, Information Processing Letters, 111:9, (436-439), Online publication date: 1-Apr-2011.
  45. Kanovich M, Rowe P and Scedrov A (2011). Collaborative Planning with Confidentiality, Journal of Automated Reasoning, 46:3-4, (389-421), Online publication date: 1-Apr-2011.
  46. Cook M, Fu Y and Schweller R Temperature 1 self-assembly Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms, (570-589)
  47. ACM
    Zhou Y, Benois-Pineau J and Nicolas H Multi-object particle filter tracking with automatic event analysis Proceedings of the first ACM international workshop on Analysis and retrieval of tracked events and motion in imagery streams, (21-26)
  48. Janzing D and Schölkopf B (2010). Causal inference using the algorithmic Markov condition, IEEE Transactions on Information Theory, 56:10, (5168-5194), Online publication date: 1-Oct-2010.
  49. Mao C, Pao H, Faloutsos C and Lee H SBAD Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning, (78-91)
  50. Said F, Murat A, Ivan L, Marc B and Sofiane B Clustering based on kolmogorov information Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part I, (452-460)
  51. Ay N, Müller M and Szkoła A (2010). Effective complexity and its relation to logical depth, IEEE Transactions on Information Theory, 56:9, (4593-4607), Online publication date: 1-Sep-2010.
  52. Long C, Zhang J and Zhut X A review selection approach for accurate feature rating estimation Proceedings of the 23rd International Conference on Computational Linguistics: Posters, (766-774)
  53. ACM
    Galván-López E, McDermott J, O'Neill M and Brabazon A Towards an understanding of locality in genetic programming Proceedings of the 12th annual conference on Genetic and evolutionary computation, (901-908)
  54. ACM
    Koutnik J, Gomez F and Schmidhuber J Evolving neural networks in compressed weight space Proceedings of the 12th annual conference on Genetic and evolutionary computation, (619-626)
  55. Ambos-Spies K and Bakibayev T Weak completeness notions for exponential time Proceedings of the 37th international colloquium conference on Automata, languages and programming, (503-514)
  56. Long C, Huang M, Zhu X and Li M (2010). A new approach for multi-document update summarization, Journal of Computer Science and Technology, 25:4, (739-749), Online publication date: 1-Jul-2010.
  57. Agadzanyan R and Freivalds R Finite state transducers with intuition Proceedings of the 9th international conference on Unconventional computation, (11-20)
  58. Karpovich P Monotone complexity of a pair Proceedings of the 5th international conference on Computer Science: theory and Applications, (266-275)
  59. Kalinina E Prefix-Free and prefix-correct complexities with compound conditions Proceedings of the 5th international conference on Computer Science: theory and Applications, (259-265)
  60. Rigau J, Feixas M, Sbert M and Wallraven C Toward Auvers period Proceedings of the Sixth international conference on Computational Aesthetics in Graphics, Visualization and Imaging, (99-106)
  61. Shanker O (2010). Complex network dimension and path counts, Theoretical Computer Science, 411:26-28, (2454-2458), Online publication date: 1-Jun-2010.
  62. ACM
    Chen T, Dick S and Miller J (2010). Detecting visually similar Web pages, ACM Transactions on Internet Technology, 10:2, (1-38), Online publication date: 1-May-2010.
  63. Jain S and Stephan F (2010). Numberings optimal for learning, Journal of Computer and System Sciences, 76:3-4, (233-250), Online publication date: 1-May-2010.
  64. Allender E, Loui M and Regan K Other complexity classes and measures Algorithms and theory of computation handbook, (24-24)
  65. Galas D, Nykter M, Carter G, Price N and Shmulevich I (2010). Biological information as set-based complexity, IEEE Transactions on Information Theory, 56:2, (667-677), Online publication date: 1-Feb-2010.
  66. Brodzik A (2010). Rapid sequence homology assessment by subsampling the genome space using difference sets, IEEE Transactions on Information Theory, 56:2, (756-770), Online publication date: 1-Feb-2010.
  67. ACM
    Gottlob G and Senellart P (2010). Schema mapping discovery from data instances, Journal of the ACM, 57:2, (1-37), Online publication date: 1-Jan-2010.
  68. Popescu F Robust statistics for describing causality in multivariate time series Proceedings of the 12th International Conference on Neural Information Processing Systems (NIPS)Mini-Symposium on Causality in Time Series, (30-64)
  69. Li Y, Lu T, Guo L, Tian Z and Qi L Optimizing network anomaly detection scheme using instance selection mechanism Proceedings of the 28th IEEE conference on Global telecommunications, (425-431)
  70. Kettunen K Packing it all up in search for a language independent MT quality measure tool - part two Proceedings of the 4th conference on Human language technology: challenges for computer science and linguistics, (567-576)
  71. ACM
    Briscoe G and De Wilde P Digital ecosystems Proceedings of the International Conference on Management of Emergent Digital EcoSystems, (44-48)
  72. Case J and Kötzing T Difficulties in forcing fairness of polynomial time inductive inference Proceedings of the 20th international conference on Algorithmic learning theory, (263-277)
  73. Dębowski Ł Computable Bayesian compression for uniformly discretizable statistical models Proceedings of the 20th international conference on Algorithmic learning theory, (53-67)
  74. Rosa M, Gaglio S, Rizzo R and Urso A (2009). Normalised compression distance and evolutionary distance of genomic sequences: comparison of clustering results, International Journal of Knowledge Engineering and Soft Data Paradigms, 1:4, (345-362), Online publication date: 1-Oct-2009.
  75. Long C, Zhang J, Huang M, Zhu X, Li M and Ma B Specialized Review Selection for Feature Rating Estimation Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01, (214-221)
  76. Connor R, Simeoni F and Iakovos M Structural Entropic Difference Proceedings of the 2009 Second International Workshop on Similarity Search and Applications, (21-29)
  77. Brodhead P and Kjos-Hanssen B Numberings and Randomness Proceedings of the 5th Conference on Computability in Europe: Mathematical Theory and Computational Practice, (49-58)
  78. Lutz J A Divergence Formula for Randomness and Dimension Proceedings of the 5th Conference on Computability in Europe: Mathematical Theory and Computational Practice, (342-351)
  79. Jain S, Stephan F and Teutsch J Index Sets and Universal Numberings Proceedings of the 5th Conference on Computability in Europe: Mathematical Theory and Computational Practice, (270-279)
  80. Razavi S and Giurcaneanu C (2009). Optimally distinguishable distributions, IEEE Transactions on Signal Processing, 57:7, (2445-2455), Online publication date: 1-Jul-2009.
  81. Shwartz L, Diao Y and Grabarnik G Multi-tenant solution for IT service management Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management, (721-731)
  82. Cebrián M, Alfonseca M and Ortega A (2009). Towards the validation of plagiarism detection tools by means of grammar evolution, IEEE Transactions on Evolutionary Computation, 13:3, (477-485), Online publication date: 1-Jun-2009.
  83. Wallraven C, Cunningham D, Rigau J, Feixas M and Sbert M Aesthetic appraisal of art - from eye movements to computers Proceedings of the Fifth Eurographics conference on Computational Aesthetics in Graphics, Visualization and Imaging, (137-144)
  84. Cardaci M, Di Gesù V, Petrou M and Tabacchi M (2009). A fuzzy approach to the evaluation of image complexity, Fuzzy Sets and Systems, 160:10, (1474-1484), Online publication date: 15-May-2009.
  85. Apolloni B and Bassis S (2009). New perspectives in computational intelligence: nothing so intelligent as randomness, nothing so effective as asymmetry, International Journal of Computational Intelligence Studies, 1:1, (6-36), Online publication date: 1-May-2009.
  86. Cornuéjols G, Guenin B and Tunçel L (2009). Lehman matrices, Journal of Combinatorial Theory Series B, 99:3, (531-556), Online publication date: 1-May-2009.
  87. ACM
    Cabuk S, Brodley C and Shields C (2009). IP Covert Channel Detection, ACM Transactions on Information and System Security, 12:4, (1-29), Online publication date: 1-Apr-2009.
  88. ACM
    Zeng Z, Wang J, Zhang J and Zhou L FOGGER Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, (517-528)
  89. Hou Y, Zhang P, Xu X, Zhang X and Li W (2009). Nonlinear dimensionality reduction by locally linear inlaying, IEEE Transactions on Neural Networks, 20:2, (300-315), Online publication date: 1-Feb-2009.
  90. Schweitzer P (2009). Using the incompressibility method to obtain local lemma results for Ramsey-type problems, Information Processing Letters, 109:4, (229-232), Online publication date: 15-Jan-2009.
  91. lzak D (2009). Degrees of conditional (in)dependence, Information Sciences: an International Journal, 179:3, (197-209), Online publication date: 15-Jan-2009.
  92. Golynski A Cell probe lower bounds for succinct data structures Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (625-634)
  93. Day A On process complexity Proceedings of the Fifteenth Australasian Symposium on Computing: The Australasian Theory - Volume 94, (31-36)
  94. Doshi P and Gmytrasiewicz P (2009). Monte Carlo sampling methods for approximating interactive POMDPs, Journal of Artificial Intelligence Research, 34:1, (297-337), Online publication date: 1-Jan-2009.
  95. Bengio Y (2009). Learning Deep Architectures for AI, Foundations and Trends® in Machine Learning, 2:1, (1-127), Online publication date: 1-Jan-2009.
  96. Takahashi H (2008). On a definition of random sequences with respect to conditional probability, Information and Computation, 206:12, (1375-1382), Online publication date: 1-Dec-2008.
  97. Staiger L (2008). On Oscillation-free ε-random Sequences, Electronic Notes in Theoretical Computer Science (ENTCS), 221, (287-297), Online publication date: 1-Dec-2008.
  98. Mielke J (2008). Refined Bounds on Kolmogorov Complexity for ω-Languages, Electronic Notes in Theoretical Computer Science (ENTCS), 221, (181-189), Online publication date: 1-Dec-2008.
  99. Ziegler M and Koolen W (2008). Kolmogorov Complexity Theory over the Reals, Electronic Notes in Theoretical Computer Science (ENTCS), 221, (153-169), Online publication date: 1-Dec-2008.
  100. ACM
    Long C, Zhu X, Li M and Ma B Information shared by many objects Proceedings of the 17th ACM conference on Information and knowledge management, (1213-1220)
  101. Jain S and Stephan F Numberings Optimal for Learning Algorithmic Learning Theory, (434-448)
  102. Case J and Kötzing T Dynamic Modeling in Inductive Inference Algorithmic Learning Theory, (404-418)
  103. Case J and Kötzing T Dynamically Delayed Postdictive Completeness and Consistency in Learning Algorithmic Learning Theory, (389-403)
  104. Chernov A, Kalnishkan Y, Zhdanov F and Vovk V Supermartingales in Prediction with Expert Advice Algorithmic Learning Theory, (199-213)
  105. Liu C and Tanaka K (2008). Complexity Oscillations in Random Reals, IEICE - Transactions on Information and Systems, E91-D:10, (2517-2518), Online publication date: 1-Oct-2008.
  106. Calude C, Nies A, Staiger L and Stephan F Universal Recursively Enumerable Sets of Strings Proceedings of the 12th international conference on Developments in Language Theory, (170-182)
  107. Muchnik A and Romashchenko A A Random Oracle Does Not Help Extract the Mutual Information Proceedings of the 33rd international symposium on Mathematical Foundations of Computer Science, (527-538)
  108. Ryabko B (2008). Applications of Kolmogorov Complexity and Universal Codes to Nonparametric Estimation of Characteristics of Time Series, Fundamenta Informaticae, 83:1-2, (177-196), Online publication date: 15-Aug-2008.
  109. Toffoli T, Capobianco S and Mentrasti P (2008). When–and how–can a cellular automaton be rewritten as a lattice gas?, Theoretical Computer Science, 403:1, (71-88), Online publication date: 1-Aug-2008.
  110. Zhang X, Hao Y, Zhu X and Li M (2008). New information distance measure and its application in question answering system, Journal of Computer Science and Technology, 23:4, (557-572), Online publication date: 1-Jul-2008.
  111. Lutz J and Mayordomo E Dimensions of Points in Self-similar Fractals Proceedings of the 14th annual international conference on Computing and Combinatorics, (215-224)
  112. Pankov S A computational approximation to the AIXI model Proceedings of the 2008 conference on Artificial General Intelligence 2008: Proceedings of the First AGI Conference, (256-267)
  113. Milch B Artificial General Intelligence through Large-Scale, Multimodal Bayesian Learning Proceedings of the 2008 conference on Artificial General Intelligence 2008: Proceedings of the First AGI Conference, (248-255)
  114. Rigau J, Feixas M and Sbert M Informational dialogue with van Gogh's paintings Proceedings of the Fourth Eurographics conference on Computational Aesthetics in Graphics, Visualization and Imaging, (115-122)
  115. ACM
    Senellart P and Gottlob G On the complexity of deriving schema mappings from database instances Proceedings of the twenty-seventh ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (23-32)
  116. Jain S, Martin E and Stephan F (2008). Absolute versus probabilistic classification in a logical setting, Theoretical Computer Science, 397:1-3, (114-128), Online publication date: 10-May-2008.
  117. Poland J (2008). Nonstochastic bandits, Theoretical Computer Science, 397:1-3, (77-93), Online publication date: 10-May-2008.
  118. Hölzl R and Merkle W Generation complexity versus distinction complexity Proceedings of the 5th international conference on Theory and applications of models of computation, (457-466)
  119. Rojas C (2008). Computability and information in models of randomness and chaos†, Mathematical Structures in Computer Science, 18:2, (291-307), Online publication date: 1-Apr-2008.
  120. ACM
    Li Y and Guo L TCM-KNN scheme for network anomaly detection using feature-based optimizations Proceedings of the 2008 ACM symposium on Applied computing, (2103-2109)
  121. Ryabko B (2008). Applications of Kolmogorov Complexity and Universal Codes to Nonparametric Estimation of Characteristics of Time Series, Fundamenta Informaticae, 83:1-2, (177-196), Online publication date: 1-Jan-2008.
  122. Legg S and Hutter M (2007). Universal Intelligence, Minds and Machines, 17:4, (391-444), Online publication date: 1-Dec-2007.
  123. Doty D, Lutz J and Nandakumar S (2007). Finite-state dimension and real arithmetic, Information and Computation, 205:11, (1640-1651), Online publication date: 1-Nov-2007.
  124. Lai H, Li F and Wechsler H Robust face recognition strategies using feed-forward architectures and parts Proceedings of the 3rd international conference on Analysis and modeling of faces and gestures, (290-304)
  125. Lai H, Li F and Wechsler H Robust Face Recognition Strategies Using Feed-Forward Architectures and Parts Analysis and Modeling of Faces and Gestures, (290-304)
  126. Schmidhuber J Simple algorithmic principles of discovery, subjective beauty, selective attention, curiosity & creativity Proceedings of the 10th international conference on Discovery science, (26-38)
  127. ACM
    Nielsen M, Nilsson O, Söderström A and Museth K (2007). Out-of-core and compressed level set methods, ACM Transactions on Graphics, 26:4, (16-es), Online publication date: 1-Oct-2007.
  128. Becher V and Grigorieff S (2007). Random reals à la Chaitin with or without prefix-freeness, Theoretical Computer Science, 385:1-3, (193-201), Online publication date: 1-Oct-2007.
  129. Pothos E (2007). Occam and Bayes in predicting category intuitiveness, Artificial Intelligence Review, 28:3, (257-274), Online publication date: 1-Oct-2007.
  130. Helmer S Measuring the structural similarity of semistructured documents using entropy Proceedings of the 33rd international conference on Very large data bases, (1022-1032)
  131. Burgin M Universality, reducibility, and completeness Proceedings of the 5th international conference on Machines, computations, and universality, (24-38)
  132. Ryabko D Testing component independence using data compressors Proceedings of the 17th international conference on Artificial neural networks, (808-815)
  133. Tzikas D, Kukar M and Likas A Transductive reliability estimation for kernel based classifiers Proceedings of the 7th international conference on Intelligent data analysis, (37-47)
  134. V'yugin V On empirical meaning of randomness with respect to a real parameter Proceedings of the Second international conference on Computer Science: theory and applications, (387-396)
  135. Rumyantsev A Kolmogorov complexity, Lovász local lemma and critical exponents Proceedings of the Second international conference on Computer Science: theory and applications, (349-355)
  136. Perifel S Symmetry of information and nonuniform lower bounds Proceedings of the Second international conference on Computer Science: theory and applications, (315-327)
  137. Buhrman H, Fortnow L, Koucký M, Rogers J and Vereshchagin N Inverting onto functions and polynomial hierarchy Proceedings of the Second international conference on Computer Science: theory and applications, (92-103)
  138. Staiger L (2007). The Kolmogorov complexity of infinite words, Theoretical Computer Science, 383:2-3, (187-199), Online publication date: 3-Sep-2007.
  139. Coeurjolly J, Drouilhet R and Robineau J (2007). Normalized information-based divergences, Problems of Information Transmission, 43:3, (167-189), Online publication date: 1-Sep-2007.
  140. Langs G, Peloschek P, Donner R and Bischof H (2007). Multiple appearance models, Pattern Recognition, 40:9, (2485-2495), Online publication date: 1-Sep-2007.
  141. Raskhodnikova S, Ron D, Rubinfeld R and Smith A Sublinear Algorithms for Approximating String Compressibility Proceedings of the 10th International Workshop on Approximation and the 11th International Workshop on Randomization, and Combinatorial Optimization. Algorithms and Techniques, (609-623)
  142. ACM
    Zhang X, Hao Y, Zhu X, Li M and Cheriton D Information distance from a question to an answer Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, (874-883)
  143. Wehner S (2007). Analyzing worms and network traffic using compression, Journal of Computer Security, 15:3, (303-320), Online publication date: 1-Aug-2007.
  144. Lemeire J, Dirkx E and Verbist F (2007). Causal analysis for performance modeling of computer programs, Scientific Programming, 15:3, (121-136), Online publication date: 1-Aug-2007.
  145. ACM
    Jelasity M, Voulgaris S, Guerraoui R, Kermarrec A and van Steen M (2007). Gossip-based peer sampling, ACM Transactions on Computer Systems, 25:3, (8-es), Online publication date: 1-Aug-2007.
  146. Bienvenu L and Merkle W Reconciling data compression and kolmogorov complexity Proceedings of the 34th international conference on Automata, Languages and Programming, (643-654)
  147. Bienvenu L and Sablik M The dynamics of cellular automata in shift-invariant topologies Proceedings of the 11th international conference on Developments in language theory, (84-95)
  148. Rigau J, Feixas M and Sbert M Conceptualizing Birkhoff's aesthetic measure using Shannon entropy and Kolmogorov complexity Proceedings of the Third Eurographics conference on Computational Aesthetics in Graphics, Visualization and Imaging, (105-112)
  149. Bienvenu L, Doty D and Stephan F Constructive Dimension and Weak Truth-Table Degrees Proceedings of the 3rd conference on Computability in Europe: Computation and Logic in the Real World, (63-72)
  150. Pinto A Comparing Notions of Computational Entropy Proceedings of the 3rd conference on Computability in Europe: Computation and Logic in the Real World, (606-620)
  151. Doty D and Moser P Feasible Depth Proceedings of the 3rd conference on Computability in Europe: Computation and Logic in the Real World, (228-237)
  152. Adriaans P Learning as Data Compression Proceedings of the 3rd conference on Computability in Europe: Computation and Logic in the Real World, (11-24)
  153. Li Y, Fang B, Guo L and Chen Y TCM-KNN algorithm for supervised network intrusion detection Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics, (141-151)
  154. ACM
    Hitchcock J, Lutz J and Terwijn S (2007). The arithmetical complexity of dimension and randomness, ACM Transactions on Computational Logic, 8:2, (13-es), Online publication date: 1-Apr-2007.
  155. ACM
    Li Y, Fang B, Guo L and Chen Y Network anomaly detection based on TCM-KNN algorithm Proceedings of the 2nd ACM symposium on Information, computer and communications security, (13-19)
  156. Cilibrasi R and Vitanyi P (2007). The Google Similarity Distance, IEEE Transactions on Knowledge and Data Engineering, 19:3, (370-383), Online publication date: 1-Mar-2007.
  157. Bienvenu L Kolmogorov-Loveland stochasticity and Kolmogorov complexity Proceedings of the 24th annual conference on Theoretical aspects of computer science, (260-271)
  158. Chaczko Z, Chiang F and Braun R Active MIB Proceedings of the 11th international conference on Computer aided systems theory, (1199-1207)
  159. Taylor R Effective prediction and its computational complexity Proceedings of the thirteenth Australasian symposium on Theory of computing - Volume 65, (145-151)
  160. Legg S and Hutter M Tests of machine intelligence 50 years of artificial intelligence, (232-242)
  161. Evans S, Kourtidis A, Markham T, Miller J, Conklin D and Torres A (2007). MicroRNA target detection and analysis for genes related to breast cancer using MDLcompress, EURASIP Journal on Bioinformatics and Systems Biology, 2007, (1-16), Online publication date: 1-Jan-2007.
  162. Nowostawski M and Purvis M Tagging and Referrals in the EVM Architecture Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology, (551-554)
  163. Hutter M (2006). On generalized computable universal priors and their convergence, Theoretical Computer Science, 364:1, (27-41), Online publication date: 2-Nov-2006.
  164. Wolff J (2006). Medical diagnosis as pattern recognition in a framework of information compression by multiple alignment, unification and search, Decision Support Systems, 42:2, (608-625), Online publication date: 1-Nov-2006.
  165. Pothos E and Wolff J (2006). The Simplicity and Power model for inductive inference, Artificial Intelligence Review, 26:3, (211-225), Online publication date: 1-Nov-2006.
  166. Jurdzinski T and Otto F (2006). Restarting automata with restricted utilization of auxiliary symbols, Theoretical Computer Science, 363:2, (162-181), Online publication date: 28-Oct-2006.
  167. Diao Y and Keller A Quantifying the complexity of IT service management processes Proceedings of the 17th IFIP/IEEE international conference on Distributed Systems: operations and management, (61-73)
  168. Legg S Is there an elegant universal theory of prediction? Proceedings of the 17th international conference on Algorithmic Learning Theory, (274-287)
  169. Poland J The missing consistency theorem for bayesian learning Proceedings of the 17th international conference on Algorithmic Learning Theory, (259-273)
  170. Grushin A and Reggia J (2006). Stigmergic self-assembly of prespecified artificial structures in a constrained and continuous environment, Integrated Computer-Aided Engineering, 13:4, (289-312), Online publication date: 1-Oct-2006.
  171. ACM
    Foschini L, Grossi R, Gupta A and Vitter J (2006). When indexing equals compression, ACM Transactions on Algorithms, 2:4, (611-639), Online publication date: 1-Oct-2006.
  172. Yu R, Hou Y and He P Self-organizing isometric embedding based on statistical criterions Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery, (410-419)
  173. Adriaans P and Jacobs C Using MDL for grammar induction Proceedings of the 8th international conference on Grammatical Inference: algorithms and applications, (293-306)
  174. Li M From three ideas in TCS to three applications in bioinformatics Proceedings of the 31st international conference on Mathematical Foundations of Computer Science, (84-85)
  175. Li M Information distance and its applications Proceedings of the 11th international conference on Implementation and Application of Automata, (1-9)
  176. ACM
    Barbará D, Domeniconi C and Rogers J Detecting outliers using transduction and statistical testing Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (55-64)
  177. Ryabko B, Astola J and Gammerman A (2006). Application of Kolmogorov complexity and universal codes to identity testing and nonparametric testing of serial independence for time series, Theoretical Computer Science, 359:1, (440-448), Online publication date: 14-Aug-2006.
  178. ACM
    Abraham I, Gavoille C and Malkhi D On space-stretch trade-offs Proceedings of the eighteenth annual ACM symposium on Parallelism in algorithms and architectures, (207-216)
  179. Li J, Li H, Wong L, Pei J and Dong G Minimum description length principle Proceedings of the 21st national conference on Artificial intelligence - Volume 1, (409-414)
  180. Doty D, Lutz J and Nandakumar S Finite-sate dimension and real arithmetic Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part I, (537-547)
  181. Fortnow L, Hitchcock J, Pavan A, Vinodchandran N and Wang F Extracting kolmogorov complexity with applications to dimension zero-one laws Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part I, (335-345)
  182. Chernov A and Schmidhuber J Prefix-Like complexities and computability in the limit Proceedings of the Second conference on Computability in Europe: logical Approaches to Computational Barriers, (85-93)
  183. Doty D Every sequence is decompressible from a random one Proceedings of the Second conference on Computability in Europe: logical Approaches to Computational Barriers, (153-162)
  184. ACM
    Juba B Estimating relatedness via data compression Proceedings of the 23rd international conference on Machine learning, (441-448)
  185. Ustinov M Non-approximability of the randomness deficiency function Proceedings of the First international computer science conference on Theory and Applications, (364-368)
  186. Muchnik A and Vereshchagin N Shannon entropy vs. kolmogorov complexity Proceedings of the First international computer science conference on Theory and Applications, (281-291)
  187. Roos T, Heikkilä T and Myllymäki P A Compression-Based Method for Stemmatic Analysis Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy, (805-806)
  188. Hutter M On the foundations of universal sequence prediction Proceedings of the Third international conference on Theory and Applications of Models of Computation, (408-420)
  189. Shen A Multisource algorithmic information theory Proceedings of the Third international conference on Theory and Applications of Models of Computation, (327-338)
  190. Cilibrasi R and Vitanyi P Similarity of objects and the meaning of words Proceedings of the Third international conference on Theory and Applications of Models of Computation, (21-45)
  191. De Falco I, Della Cioppa A, Maisto D and Tarantino E A genetic programming approach to solomonoff's probabilistic induction Proceedings of the 9th European conference on Genetic Programming, (24-35)
  192. Li M and Zhu Y Image classification via LZ78 based string kernel Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining, (704-712)
  193. Antunes L, Fortnow L, van Melkebeek D and Vinodchandran N (2006). Computational depth, Theoretical Computer Science, 354:3, (391-404), Online publication date: 4-Apr-2006.
  194. Ferbus-Zanda M and Grigorieff S (2006). Kolmogorov complexities Kmax, Kmin on computable partially ordered sets, Theoretical Computer Science, 352:1, (159-180), Online publication date: 7-Mar-2006.
  195. Kovacs T and Kerber M (2006). A Study of Structural and Parametric Learning in XCS, Evolutionary Computation, 14:1, (1-19), Online publication date: 1-Mar-2006.
  196. Kulkarni A and Bush S (2006). Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics, Journal of Network and Systems Management, 14:1, (69-80), Online publication date: 1-Mar-2006.
  197. Rumyantsev A and Ushakov M Forbidden substrings, kolmogorov complexity and almost periodic sequences Proceedings of the 23rd Annual conference on Theoretical Aspects of Computer Science, (396-407)
  198. Kjos-Hanssen B, Merkle W and Stephan F Kolmogorov complexity and the recursion theorem Proceedings of the 23rd Annual conference on Theoretical Aspects of Computer Science, (149-161)
  199. Fortnow L, Lee T and Vereshchagin N Kolmogorov complexity with error Proceedings of the 23rd Annual conference on Theoretical Aspects of Computer Science, (137-148)
  200. Sadakane K and Grossi R Squeezing succinct data structures into entropy bounds Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (1230-1239)
  201. Kao M and Schweller R Reducing tile complexity for self-assembly through temperature programming Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (571-580)
  202. ACM
    Veldhuizen T Tradeoffs in metaprogramming Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation, (150-159)
  203. Ahlswede R Introduction General Theory of Information Transfer and Combinatorics, (1-44)
  204. Barbosa V, Miranda F and Agostini M (2006). Cell-centric heuristics for the classification of cellular automata, Parallel Computing, 32:1, (44-66), Online publication date: 1-Jan-2006.
  205. Blanchard F, Cervelle J and Formenti E (2005). Some results about the chaotic behavior of cellular automata, Theoretical Computer Science, 349:3, (318-336), Online publication date: 16-Dec-2005.
  206. Seo J, Lee C, Shon T, Cho K and Moon J A new DDoS detection model using multiple SVMs and TRA Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (976-985)
  207. Seo J, Lee C, Kim J, Shon T and Moon J PPF model with CTNT to defend web server from DDoS attack Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (986-995)
  208. Ramakrishnan S and Thakur M An SDS modeling approach for simulation-based control Proceedings of the 37th conference on Winter simulation, (1473-1482)
  209. Seo J, Lee C, Shon T and Moon J SVM approach with CTNT to detect DDoS attacks in grid computing Proceedings of the 4th international conference on Grid and Cooperative Computing, (59-70)
  210. Lee T and Romashchenko A (2005). Resource bounded symmetry of information revisited, Theoretical Computer Science, 345:2-3, (386-405), Online publication date: 22-Nov-2005.
  211. Kuri-Morales A and Ortiz-Posadas M A new approach to sequence representation of proteins in bioinformatics Proceedings of the 4th Mexican international conference on Advances in Artificial Intelligence, (880-889)
  212. ACM
    Narayanan A and Shmatikov V Fast dictionary attacks on passwords using time-space tradeoff Proceedings of the 12th ACM conference on Computer and communications security, (364-372)
  213. Li F and Wechsler H (2005). Open Set Face Recognition Using Transduction, IEEE Transactions on Pattern Analysis and Machine Intelligence, 27:11, (1686-1697), Online publication date: 1-Nov-2005.
  214. Freiling F and Ghosh S Code stabilization Proceedings of the 7th international conference on Self-Stabilizing Systems, (128-139)
  215. Gács P (2005). Uniform test of algorithmic randomness over a general space, Theoretical Computer Science, 341:1, (91-137), Online publication date: 5-Sep-2005.
  216. McGregor S How do evolved digital logic circuits generalise successfully? Proceedings of the 8th European conference on Advances in Artificial Life, (363-372)
  217. Keller B and Lutz R (2005). Evolutionary induction of stochastic context free grammars, Pattern Recognition, 38:9, (1393-1406), Online publication date: 1-Sep-2005.
  218. ACM
    Shetty J and Adibi J Discovering important nodes through graph entropy the case of Enron email database Proceedings of the 3rd international workshop on Link discovery, (74-81)
  219. Köhler S, Schindelhauer C and Ziegler M On approximating real-world halting problems Proceedings of the 15th international conference on Fundamentals of Computation Theory, (454-466)
  220. ACM
    Doshi P and Gmytrasiewicz P Approximating state estimation in multiagent settings using particle filters Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, (320-327)
  221. Li M and Sleep R An LZ78 based string kernel Proceedings of the First international conference on Advanced Data Mining and Applications, (678-689)
  222. ACM
    Laing K and Rajaraman R A space lower bound for name-independent compact routing in trees Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures, (216-216)
  223. Špalek R and Szegedy M All quantum adversary methods are equivalent Proceedings of the 32nd international conference on Automata, Languages and Programming, (1299-1311)
  224. Doshi P and Gmytrasiewicz P A particle filtering based approach to approximating interactive POMDPs Proceedings of the 20th national conference on Artificial intelligence - Volume 2, (969-974)
  225. Li H, Zhang K and Jiang T The regularized EM algorithm Proceedings of the 20th national conference on Artificial intelligence - Volume 2, (807-812)
  226. Gmytrasiewicz P and Doshi P (2005). A framework for sequential planning in multi-agent settings, Journal of Artificial Intelligence Research, 24:1, (49-79), Online publication date: 1-Jul-2005.
  227. Downey R, Merkle W and Reimann J Schnorr dimension Proceedings of the First international conference on Computability in Europe: new Computational Paradigms, (96-105)
  228. Vyugin M and V'yugin V (2005). Predictive complexity and information, Journal of Computer and System Sciences, 70:4, (539-554), Online publication date: 1-Jun-2005.
  229. ACM
    Vitányi P Time, space, and energy in reversible computing Proceedings of the 2nd conference on Computing frontiers, (435-444)
  230. V'Yugin V and Maslov V (2005). Concentration Theorems for Entropy and Free Energy, Problems of Information Transmission, 41:2, (134-149), Online publication date: 1-Apr-2005.
  231. Becher V and Figueira S (2005). Kolmogorov Complexity for Possibly Infinite Computations, Journal of Logic, Language and Information, 14:2, (133-148), Online publication date: 1-Mar-2005.
  232. Merkle W, Miller J, Nies A, Reimann J and Stephan F Kolmogorov-Loveland randomness and stochasticity Proceedings of the 22nd annual conference on Theoretical Aspects of Computer Science, (422-433)
  233. Buhrman H, Fortnow L, Newman I and Vereshchagin N Increasing kolmogorov complexity Proceedings of the 22nd annual conference on Theoretical Aspects of Computer Science, (412-421)
  234. Fenner S, Lutz J, Mayordomo E and Reardon P (2005). Weakly useful sequences, Information and Computation, 197:1-2, (41-54), Online publication date: 1-Feb-2005.
  235. Kukar M and Grošelj C (2005). Transductive machine learning for reliable medical diagnostics, Journal of Medical Systems, 29:1, (13-32), Online publication date: 1-Feb-2005.
  236. Nowostawski M, Purvis M and Cranefield S An architecture for self-organising evolvable virtual machines Engineering Self-Organising Systems, (100-122)
  237. Davie G (2004). Characterising the Martin-Löf random sequences using computably enumerable sets of measure one, Information Processing Letters, 92:3, (157-160), Online publication date: 1-Nov-2004.
  238. ACM
    Keogh E, Lonardi S and Ratanamahatana C Towards parameter-free data mining Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, (206-215)
  239. Li H, Zhang K and Jiang T Minimum Entropy Clustering and Applications to Gene Expression Analysis Proceedings of the 2004 IEEE Computational Systems Bioinformatics Conference, (142-151)
  240. Jauregui V, Pagnucco M and Foo N On the intended interpretations of actions Proceedings of the 8th Pacific Rim International Conference on Trends in Artificial Intelligence, (13-22)
  241. Vinterbo S (2004). Privacy, IEEE Transactions on Knowledge and Data Engineering, 16:8, (939-948), Online publication date: 1-Aug-2004.
  242. Gammerman A, Kalnishkan Y and Vovk V On-line prediction with kernels and the complexity approximation principle Proceedings of the 20th conference on Uncertainty in artificial intelligence, (170-176)
  243. ACM
    Carette J Understanding expression simplification Proceedings of the 2004 international symposium on Symbolic and algebraic computation, (72-79)
  244. Soloveichik D and Winfree E Complexity of self-assembled shapes Proceedings of the 10th international conference on DNA computing, (344-354)
  245. Royer J (2004). On the computational complexity of Longeley's H functional, Theoretical Computer Science, 318:1-2, (225-241), Online publication date: 6-Jun-2004.
  246. Burgin M (2004). Algorithmic complexity of recursive and inductive algorithms, Theoretical Computer Science, 317:1-3, (31-60), Online publication date: 4-Jun-2004.
  247. ACM
    Ben-Amram A (2004). A complexity-theoretic proof of a Recursion-Theoretic Theorem, ACM SIGACT News, 35:2, (111-112), Online publication date: 1-Jun-2004.
  248. Schmidhuber J (2004). Optimal Ordered Problem Solver, Machine Language, 54:3, (211-254), Online publication date: 1-Mar-2004.
  249. Müller M (2004). Can user models be learned at all? Inherent problems in machine learning for user modelling, The Knowledge Engineering Review, 19:1, (61-88), Online publication date: 1-Mar-2004.
  250. Kalnishkan Y, Vovk V and Vyugin M (2004). Loss functions, complexities, and the legendre transformation, Theoretical Computer Science, 313:2, (195-207), Online publication date: 17-Feb-2004.
  251. Aggarwal G, Goldwasser M, Kao M and Schweller R Complexities for generalized models of self-assembly Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (880-889)
  252. Păatraşcu M and Demaine E Tight bounds for the partial-sums problem Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (20-29)
  253. Lutz J (2003). The dimensions of individual strings and sequences, Information and Computation, 187:1, (49-79), Online publication date: 25-Nov-2003.
  254. Vyugin M (2003). Systems of Strings with High Mutual Complexity, Problems of Information Transmission, 39:4, (395-399), Online publication date: 1-Oct-2003.
  255. V'Yugin V and Maslov V (2003). Extremal Relations between Additive Loss Functions and the Kolmogorov Complexity, Problems of Information Transmission, 39:4, (380-394), Online publication date: 1-Oct-2003.
  256. Grünwald P and Vitányi P (2003). Kolmogorov Complexity and Information Theory.With an Interpretation in Terms of Questions and Answers, Journal of Logic, Language and Information, 12:4, (497-529), Online publication date: 1-Sep-2003.
  257. Demaine E and López-Ortiz A (2003). A linear lower bound on index size for text retrieval, Journal of Algorithms, 48:1, (2-15), Online publication date: 1-Aug-2003.
  258. Antunes L and Fortnow L Sophistication revisited Proceedings of the 30th international conference on Automata, languages and programming, (267-277)
  259. Sow D, Olshefski D, Beigi M and Banavar G Prefetching based on web usage mining Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware, (262-281)
  260. Li F and Wechsler H Open world face recognition with credibility and confidence measures Proceedings of the 4th international conference on Audio- and video-based biometric person authentication, (462-469)
  261. Srikanth R (2003). A Computational Model for Quantum Measurement, Quantum Information Processing, 2:3, (153-199), Online publication date: 1-Jun-2003.
  262. Yamakami T Nearly bounded error probabilistic sets Proceedings of the 5th Italian conference on Algorithms and complexity, (213-226)
  263. ACM
    Heering J (2003). Quantification of structural information, ACM SIGSOFT Software Engineering Notes, 28:3, (6-6), Online publication date: 1-May-2003.
  264. Wolff J (2003). Information Compression by Multiple Alignment, Unification and Search as a Unifying Principle in Computing and Cognition, Artificial Intelligence Review, 19:3, (193-230), Online publication date: 1-May-2003.
  265. Li M, Chen X, Li X, Ma B and Vitányi P The similarity metric Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms, (863-872)
  266. Schmidhuber J Exploring the predictable Advances in evolutionary computing, (579-612)
  267. Benedetto D, Caglioti E and Loreto V (2003). Zipping Out Relevant Information, Computing in Science and Engineering, 5:1, (80-85), Online publication date: 1-Jan-2003.
  268. Standish R Diversity evolution Proceedings of the eighth international conference on Artificial life, (131-137)
  269. Ageev M (2002). Martin's game, Theoretical Computer Science, 289:1, (871-876), Online publication date: 23-Oct-2002.
  270. Vyugin M and V'yugin V (2002). On complexity of easy predictable sequences, Information and Computation, 178:1, (241-252), Online publication date: 10-Oct-2002.
  271. Vilalta R and Drissi Y (2002). A perspective view and survey of meta-learning, Artificial Intelligence Review, 18:2, (77-95), Online publication date: 1-Oct-2002.
  272. Gammerman A and Vovk V (2002). Prediction algorithms and confidence measures based on algorithmic randomness theory, Theoretical Computer Science, 287:1, (209-217), Online publication date: 25-Sep-2002.
  273. ACM
    Gupta V (2002). Communication complexity for file synchronization is undecidable, ACM SIGACT News, 33:3, (110-112), Online publication date: 1-Sep-2002.
  274. Şlȩzak D (2002). Approximate entropy reducts, Fundamenta Informaticae, 53:3,4, (365-390), Online publication date: 30-May-2002.
  275. Brighton H (2002). Compositional Syntax From Cultural Transmission, Artificial Life, 8:1, (25-54), Online publication date: 31-Mar-2002.
  276. Kalnishkan Y (2002). General linear relations between different types of predictive complexity, Theoretical Computer Science, 271:1-2, (181-200), Online publication date: 28-Jan-2002.
  277. Grigorieff S and Marion J (2002). Kolmogorov complexity and non-determnism, Theoretical Computer Science, 271:1-2, (151-180), Online publication date: 28-Jan-2002.
  278. Vyugin M (2002). Information distance and conditional complexities, Theoretical Computer Science, 271:1-2, (145-150), Online publication date: 28-Jan-2002.
  279. Vereshchagin N and Vyugin M (2002). Independent minimum length programs to translate between given strings, Theoretical Computer Science, 271:1-2, (131-143), Online publication date: 28-Jan-2002.
  280. Romanshchenko A, Shen A and Vereshchagin N (2002). Combinatorial interpretation of Kolmogorov complexity, Theoretical Computer Science, 271:1-2, (111-123), Online publication date: 28-Jan-2002.
  281. Muchnik A (2002). Conditional complexity and codes, Theoretical Computer Science, 271:1-2, (97-109), Online publication date: 28-Jan-2002.
  282. Chernov A, Muchnik A, Romashchenko A, Shen A and Vereshchagin N (2002). Upper semi-lattice of binary strings with the relation "x is simple conditional to y", Theoretical Computer Science, 271:1-2, (69-95), Online publication date: 28-Jan-2002.
  283. Vereshchagin N (2002). Kolmogorov complexity conditional to large integers, Theoretical Computer Science, 271:1-2, (59-67), Online publication date: 28-Jan-2002.
  284. Durand B, Shen A and Vereshchagin N (2002). Descriptive complexity of computable sequences, Theoretical Computer Science, 271:1-2, (47-58), Online publication date: 28-Jan-2002.
  285. Durand B and Porrot S (2002). Comparison between the complexity of a function and the complexity of its graph, Theoretical Computer Science, 271:1-2, (37-46), Online publication date: 28-Jan-2002.
  286. Ślȩzak D Approximate Bayesian networks Technologies for constructing intelligent systems, (313-325)
  287. Case J, Jain S, Kaufmann S, Sharma A and Stephan F (2001). Predictive learning models for concept drift, Theoretical Computer Science, 268:2, (323-349), Online publication date: 17-Oct-2001.
  288. ACM
    Durand B, Levin L and Shen A Complex tilings Proceedings of the thirty-third annual ACM symposium on Theory of computing, (732-739)
  289. ACM
    (2001). Limits to software estimation, ACM SIGSOFT Software Engineering Notes, 26:4, (54-59), Online publication date: 1-Jul-2001.
  290. Parekh R and Honavar V (2001). Learning DFA from Simple Examples, Machine Language, 44:1-2, (9-35), Online publication date: 1-Jul-2001.
  291. Goldsmith J (2001). Unsupervised learning of the morphology of a natural language, Computational Linguistics, 27:2, (153-198), Online publication date: 1-Jun-2001.
  292. Kukushkina O, Polikarpov A and Khmelev D (2001). Using Literal and Grammatical Statistics for Authorship Attribution, Problems of Information Transmission, 37:2, (172-184), Online publication date: 1-Apr-2001.
  293. Hernández-Orallo J and José Ramírez-Quintana M (2001). Predictive Software, Automated Software Engineering, 8:2, (139-166), Online publication date: 1-Apr-2001.
  294. ACM
    Gavoille C (2001). Routing in distributed networks, ACM SIGACT News, 32:1, (36-52), Online publication date: 1-Mar-2001.
  295. Demaine E and López-Ortiz A A linear lower bound on index size for text retrieval Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms, (289-294)
  296. Hernandez-Orallo J (2000). Beyond the Turing Test, Journal of Logic, Language and Information, 9:4, (447-466), Online publication date: 1-Oct-2000.
  297. ACM
    Jiang T, Li M and Vitányi P (2000). A lower bound on the average-case complexity of shellsort, Journal of the ACM, 47:5, (905-911), Online publication date: 1-Sep-2000.
  298. ACM
    Rothemund P and Winfree E The program-size complexity of self-assembled squares (extended abstract) Proceedings of the thirty-second annual ACM symposium on Theory of computing, (459-468)
  299. ACM
    Chen X, Kwong S and Li M A compression algorithm for DNA sequences and its applications in genome comparison Proceedings of the fourth annual international conference on Computational molecular biology
  300. ACM
    Sutherland K (2000). Book reviews, intelligence, 11:1, (51-59), Online publication date: 1-Apr-2000.
  301. Galindo J and Tamayo P (2000). Credit Risk Assessment Using Statistical and MachineLearning, Computational Economics, 15:1-2, (107-143), Online publication date: 1-Apr-2000.
  302. Karhumäki J, Plandowski W and Rytter W (2000). Pattern-matching problems for two-dimensional images described by finite automata, Nordic Journal of Computing, 7:1, (1-13), Online publication date: 1-Mar-2000.
  303. Gammermann A (2000). Support vector machine learning algorithm and transduction, Computational Statistics, 15:1, (31-39), Online publication date: 1-Mar-2000.
  304. Fortnow L, Pavan A and Selman A Distributionally-hard languages Proceedings of the 5th annual international conference on Computing and combinatorics, (184-193)
  305. ACM
    Kalnishkan Y Linear relations between square-loss and Kolmogorov complexity Proceedings of the twelfth annual conference on Computational learning theory, (226-232)
  306. Schuler R Universal distributions and time-bounded kolmogorov complexity Proceedings of the 16th annual conference on Theoretical aspects of computer science, (434-443)
  307. Durand B, Shen A and Vereshagin N Descriptive complexity of computable sequences Proceedings of the 16th annual conference on Theoretical aspects of computer science, (153-162)
  308. ACM
    Vovk V and Watkins C Universal portfolio selection Proceedings of the eleventh annual conference on Computational learning theory, (12-23)
Contributors
  • Nanjing University
  • Center for Mathematics and Computer Science - Amsterdam

Reviews

William Ian Gasarch

The string 111111111111 looks less “random” than the string 100110001001. Kolmogorov complexity imposes rigorous definition on just such an intuitive notion of randomness. Once this is done, new questions arise and some old questions can be answered. Chapters 1 through 4 carefully establish the rigorous definitions needed to study randomness. If this were the authors' only goal, they would not need four chapters in which to accomplish it. However, they also explore many issues that lead to or are consequences of the definitions. Chapter 1 contains motivation for the subject and a quick review of combinatorics, probability, and computability. It serves as a good refresher course, but is too mature for first-time learners. Chapters 2 and 3 define the complexity of a string and some notions of randomness. Informally, the complexity of a string x is the shortest description of x . Chapter 4 explores connections between Kolmogorov complexity and probability. The authors discuss a distribution that gives more complex strings a higher probability. Chapters 5 through 7 apply Kolmogorov complexity to computer science. Chapter 8 applies Kolmogorov complexity to physics. Most of the applications use only a small part of the contents of chapters 1 through 4. This is good, because readers who are only interested in applications can read these chapters after having learned a few things from the preceding chapters. Chapter 5 applies Kolmogorov complexity to inference. According to the concept of Occam's razor, the least complex explanation of a phenomenon is the best one. Since Kolmogorov complexity gives a precise measure of the complexity of a string, Occam's razor can be made rigorous. This chapter carries this out for Bayesian inference and probably approximately correct (PAC) learning. In most cases the learning procedure is not quite practical, but some interesting theorems are proven. Chapter 6 applies Kolmogorov complexity to combinatorics, algorithm analysis, formal language theory, and circuits (the application to circuits is new in the second edition). This is the most interesting chapter for computer scientists interested in applications. The chapter uses very little Kolmogorov complexity theory, but rather focuses on the existence and abundance of incompressible strings. Some of these applications are described below. There are many more in both the text and the exercises. Chapter 7 covers resource-bounded Kolmogorov complexity. Intuitively, C t,s x is the shortest program that prints out x in time t x and space s x . The authors prove interesting theorems about C t,s and then use C t,s to prove theorems in complexity theory. Chapter 8 applies Kolmogorov complexity to physics. A computation is thought to lose energy. If it is reversible, however, then (theoretically) no energy is lost. Hence, this chapter spends some pages on reversible computation. In thermodynamics, one speaks of the information within a system. Since Kolmogorov complexity gives a rigorous definition of information, connections between the concepts are made. This is a great book. The other extant literature on Kolmogorov complexity is scattered, in need of translation, or otherwise hard to access. This book puts it all in one place in a readable, enjoyable style. In this second edition, the authors have added many new results that have been proven since the first edition was published in 1993 [1] .

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations