ARDC Research Link Australia Research Link Australia   BETA Research
Link
Australia
  • ARDC Newsletter Subscribe
  • Contact Us
  • Home
  • About
  • Feedback
  • Explore Collaborations
  • Researcher
  • Funded Activity
  • Organisation
  • Researcher
  • Funded Activity
  • Organisation
  • Researcher
  • Funded Activity
  • Organisation

Need help searching? View our Search Guide.

Advanced Search

Current Selection
Field of Research : Data Encryption
Field of Research : Data Security
Australian State/Territory : ACT
Clear All
Filter by Field of Research
Analysis Of Algorithms And Complexity (1)
Computation Theory and Mathematics (1)
Data Encryption (1)
Data Security (1)
Filter by Socio-Economic Objective
Computer software and services not elsewhere classified (1)
Mathematical sciences (1)
Filter by Funding Provider
Australian Research Council (1)
Filter by Status
Closed (1)
Filter by Scheme
Federation Fellowships (1)
Filter by Country
Australia (1)
Filter by Australian State/Territory
ACT (1)
  • Researchers (4)
  • Funded Activities (1)
  • Organisations (0)
  • Funded Activity

    Federation Fellowships - Grant ID: FF0455774

    Funder
    Australian Research Council
    Funding Amount
    $1,519,710.00
    Summary
    Exploring the Frontiers of Feasible Computation. The project aims to delineate the boundary between feasible and infeasible computational problems. A problem is considered feasible if there is an algorithm to solve it in worst-case time bounded by a polynomial in the input size. This is probably impossible for the important class of NP-complete problems. However, typical examples of NP-complete problems can often be solved in polynomial time, because worst-case problems are rare. The project is .... Exploring the Frontiers of Feasible Computation. The project aims to delineate the boundary between feasible and infeasible computational problems. A problem is considered feasible if there is an algorithm to solve it in worst-case time bounded by a polynomial in the input size. This is probably impossible for the important class of NP-complete problems. However, typical examples of NP-complete problems can often be solved in polynomial time, because worst-case problems are rare. The project is relevant to public-key cryptography, where breaking an encryption scheme should be infeasible, and to many real-life situations where NP-complete problems need to be solved, either exactly or approximately.
    Read more Read less
    More information

    Showing 1-1 of 1 Funded Activites

    Advanced Search

    Advanced search on the Researcher index.

    Advanced search on the Funded Activity index.

    Advanced search on the Organisation index.

    National Collaborative Research Infrastructure Strategy

    The Australian Research Data Commons is enabled by NCRIS.

    ARDC CONNECT NEWSLETTER

    Subscribe to the ARDC Connect Newsletter to keep up-to-date with the latest digital research news, events, resources, career opportunities and more.

    Subscribe

    Quick Links

    • Home
    • About Research Link Australia
    • Product Roadmap
    • Documentation
    • Disclaimer
    • Contact ARDC

    We acknowledge and celebrate the First Australians on whose traditional lands we live and work, and we pay our respects to Elders past, present and emerging.

    Copyright © ARDC. ACN 633 798 857 Terms and Conditions Privacy Policy Accessibility Statement
    Top
    Quick Feedback