Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)

Buy

Few technical lerms have gained such rapid notoriety as the appela tion "NP-complete." In the short lime since its introduction in the early 1970's, this term has come to symbolize the abyss of inherent intractability that algorithm designers increasingly face as they seek to solve larger and more complex problems. A wide variety of commonly encountered prob lems from mathematics, computer science, and operations research are now known to be NP-compIete, and the collection of such problems continues to grow almost daily. Indeed, the NP-complete problems are now so pervasive that it is important for anyone concerned with the computational aspects of these fields to be familiar with the meaning and implications of this concept

This book is intended as a detailed guide to the theory of NP- completeness, emphasizing those concepts and techniques that seem to be most useful for applying the theory to practical problems. It can be viewed as consisting of three parts.

The first part, Chapters 1 through 5, covers the basic theory of NP- completeness. Chapter 1 presents a relatively low-level introduction to some of the central notions of computational complexity and discusses the significance of NP-compleieness in this context. Chapters 2 through 5 pro vide the detailed definitions and proof techniques necessary for thoroughly understanding and applying the theory.

The second part. Chapters 6 and 7, provides an overview of two al ternative directions for further study. Chapter 6 concentrates on the search for efficient "approximation" algorithms for NP-complete problems, an area whose development has seen considerable interplay with the theory of NP- completeness. Chapter 7 surveys a large number of theoretical topics in computational complexity, many of which have arisen as a consequence of previous work on NP-completeness. Both of these chapters (especially Chapter 7) are intended solely as introductions to these areas, with our ex pectation being that any reader wishing to pursue particular topics in more detail will do so by consulting the cited references.

The third and final part of the book is the Appendix, which contains an extensive list (more than 300 main entries, and several times this many results in total) of NP-complete and NP-hard problems. Annotations to the main entries discuss what is known about the complexity of subproblems and variants of the stated problems.

(HTML tags aren't allowed.)

Theory of Electromagnetic Wave Propagation (Dover Books on Physics and Chemistry)
Theory of Electromagnetic Wave Propagation (Dover Books on Physics and Chemistry)
This excellent graduate-level text discusses the Maxwell field equations, radiation from monochromatic sources in unbounded regions, radiation from wire antennas, radio-astronomical antennas, electromagnetic waves in a plasma, the Doppler effect and more.

This book represents the substance of a course of lectures I gave during the winter
...
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Introduction to 64 Bit Intel Assembly Language Programming for Linux
Introduction to 64 Bit Intel Assembly Language Programming for Linux
The Intel CPU architecture has evolved over 3 decades from a 1 6 bit CPU with no memory protection, through a period with 32 bit processors with sophisticated architectures into the current series of processors which support all the old modes of operation in addition to a greatly expanded 64 bit mode of operation. Assembly...

Generative Art
Generative Art
As a young man, this career shift wasn’t entirely motivated by a need to restore the right-left hemisphere balance to my young brain; it may also have had something to do with the worry that knowing a lot about Alan Turing and C++ was probably not the best way to get a girlfriend.

My studies of early 1990s ideas
...
Einstein Relatively Simple: Our Universe Revealed
Einstein Relatively Simple: Our Universe Revealed

Einstein Relatively Simple brings together for the first time an exceptionally clear explanation of both special and general relativity. It is for people who always wanted to understand Einstein's ideas but never thought they could.

Told with humor, enthusiasm, and rare clarity, this entertaining book reveals how a former high...

Resilience Assessment and Evaluation of Computing Systems
Resilience Assessment and Evaluation of Computing Systems

The resilience of computing systems includes their dependability as well as their fault tolerance and security. It defines the ability of a computing system to perform properly in the presence of various kinds of disturbances and to recover from any service degradation. These properties are immensely important in a world where many aspects of...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy