Listing 1 - 10 of 248 | << page >> |
Sort by
|
Choose an application
This comprehensive textbook presents a clean and coherent account of most fundamental tools and techniques in Parameterized Algorithms and is a self-contained guide to the area. The book covers many of the recent developments of the field, including application of important separators, branching based on linear programming, Cut & Count to obtain faster algorithms on tree decompositions, algorithms based on representative families of matroids, and use of the Strong Exponential Time Hypothesis. A number of older results are revisited and explained in a modern and didactic way. The book provides a toolbox of algorithmic techniques. Part I is an overview of basic techniques, each chapter discussing a certain algorithmic paradigm. The material covered in this part can be used for an introductory course on fixed-parameter tractability. Part II discusses more advanced and specialized algorithmic ideas, bringing the reader to the cutting edge of current research. Part III presents complexity results and lower bounds, giving negative evidence by way of W[1]-hardness, the Exponential Time Hypothesis, and kernelization lower bounds. All the results and concepts are introduced at a level accessible to graduate students and advanced undergraduate students. Every chapter is accompanied by exercises, many with hints, while the bibliographic notes point to original publications and related work.
Complex analysis --- Computer science --- complexe analyse (wiskunde) --- algoritmen
Choose an application
This volume considers the computational complexity of determining whether a system of equations over a fixed algebra A has a solution. It examines in detail the two problems this leads to: SysTermSat(A) and SysPolSat(A), in which equations are built out of terms or polynomials, respectively. The book characterizes those algebras for which SysPolSat can be solved in a polynomial time. So far, studies and their outcomes have not covered algebras that generate a variety admitting type 1 in the sense of Tame Congruence Theory. Since unary algebras admit only type 1, this book focuses on these algebras to tackle the main problem. It discusses several aspects of unary algebras and proves that the Constraint Satisfaction Problem for relational structures is polynomially equivalent to SysTermSat over unary algebras. The book’s final chapters discuss partial characterizations, present conclusions, and describe the problems that are still open.
Mathematical logic --- Logic --- Complex analysis --- Computer science --- complexe analyse (wiskunde) --- wiskunde --- algoritmen --- logica
Choose an application
The advent of multi-core architectures and cloud-computing has brought parallel programming into the mainstream of software development. Unfortunately, writing scalable parallel programs using traditional lock-based synchronization primitives is well known to be a hard, time consuming, and error-prone task, mastered by only a minority of specialized programmers. Building on the familiar abstraction of atomic transactions, Transactional Memory (TM) promises to free programmers from the complexity of conventional synchronization schemes, simplifying the development and verification of concurrent programs, enhancing code reliability, and boosting productivity. Over the last decade TM has been subject to intense research on a broad range of aspects including hardware and operating systems support, language integration, as well as algorithms and theoretical foundations. On the industrial side, the major players of the software and hardware markets have been up-front in the research and development of prototypal products providing support for TM systems. This has recently led to the introduction of hardware TM implementations on mainstream commercial microprocessors and to the integration of TM support for the world’s leading open source compiler. In such a vast inter-disciplinary domain, the Euro-TM COST Action (IC1001) has served as a catalyzer and a bridge for the various research communities looking at disparate, yet subtly interconnected, aspects of TM. This book emerged from the idea having Euro-TM experts compile recent results in the TM area in a single and consistent volume. Contributions have been carefully selected and revised to provide a broad coverage of several fundamental issues associated with the design and implementation of TM systems, including their theoretical underpinnings and algorithmic foundations, programming language integration and verification tools, hardware supports, distributed TM systems, self-tuning mechanisms, as well as lessons learnt from building complex TM-based applications.
Logic --- Complex analysis --- Computer science --- Computer. Automation --- complexe analyse (wiskunde) --- computers --- programmeren (informatica) --- software engineering --- algoritmen
Choose an application
This book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2014, held in Istanbul, Turkey, in September 2014. The 10 full papers presented were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: efficient implementations and designs; attacks; and protocols.
Complex analysis --- Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- cryptografie --- complexe analyse (wiskunde) --- informatica --- algoritmen --- computerbeveiliging --- computernetwerken
Choose an application
This book constitutes the proceedings of the 9th International Workshop on Frontiers in Algorithmics, FAW 2015, held in Guilin, China, in July 2015. The 28 papers presented in this volume were carefully reviewed and selected from 65 submissions. They deal with graph algorithms, approximation algorithms, combinatorial optimization, parameterized algorithms, and online algorithms.
Complex analysis --- Discrete mathematics --- Mathematics --- Computer science --- Computer. Automation --- discrete wiskunde --- complexe analyse (wiskunde) --- computers --- informatica --- externe fixatie (geneeskunde --- algoritmen
Choose an application
This book constitutes the refereed proceedings of the 7th International Conference on Reversible Computation, RC 2015, held in Grenoble, France in July 2015. The 19 papers presented together with 1 invited talk were carefully reviewed and selected from 30 submissions. The Conference on Reversible Computation particularly includes the following topics: reversible machines, reversible languages, design and verification of quantum circuits, design of reversible circuits, and circuit synthesis.
Logic --- Complex analysis --- Computer science --- Computer. Automation --- quantumcomputers --- complexe analyse (wiskunde) --- computers --- ontwerpen --- programmeren (informatica) --- software engineering --- algoritmen
Choose an application
This book constitutes revised selected papers from the International Conference on Membrane Computing, CMC 2015, held in Valencia, Spain, in August 2015. The 22 full papers presented in this volume were carefully reviewed and selected from 34 submissions. The volume also contains 3 invited talks in full-paper length. .
Logic --- Complex analysis --- Mathematical statistics --- Computer science --- Computer. Automation --- patroonherkenning --- factoranalyse --- complexe analyse (wiskunde) --- computers --- programmeren (informatica) --- software engineering --- algoritmen
Choose an application
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.
Complex analysis --- Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- cryptografie --- complexe analyse (wiskunde) --- informatica --- algoritmen --- computerbeveiliging
Choose an application
This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the refereed proceedings of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015. The 219 revised full papers presented together with 77 workshop papers in these four volumes were carefully reviewed and selected from 807 submissions (602 full papers and 205 workshop papers). The first volume comprises the following topics: parallel and distributed architectures; distributed and network-based computing and internet of things and cyber-physical-social computing. The second volume comprises topics such as big data and its applications and parallel and distributed algorithms. The topics of the third volume are: applications of parallel and distributed computing and service dependability and security in distributed and parallel systems. The covered topics of the fourth volume are: software systems and programming models and performance modeling and evaluation. .
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- complexe analyse (wiskunde) --- database management --- software engineering --- algoritmen --- computernetwerken
Choose an application
The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015. The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic insights; modes and constructions; multilinear maps and IO; pseudorandomness; block cipher cryptanalysis; integrity; assumptions; hash functions and stream cipher cryptanalysis; implementations; multiparty computation; zero-knowledge; theory; signatures; non-signaling and information-theoretic crypto; attribute-based encryption; new primitives; and fully homomorphic/functional encryption.
Complex analysis --- Discrete mathematics --- Mathematics --- Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- cryptografie --- discrete wiskunde --- complexe analyse (wiskunde) --- informatica --- externe fixatie (geneeskunde --- algoritmen --- computerbeveiliging
Listing 1 - 10 of 248 | << page >> |
Sort by
|