亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? partvii.htm

?? 程序設計的藝術,此書是英文版的,經久不衰,非常的經典
?? HTM
字號:
<HTML><HEAD>

<TITLE>Intro to Algorithms: PART VII: Selected Topics</TITLE></HEAD><BODY BGCOLOR="#FFFFFF">
<a href="chap28.htm"><img align=right src="../../images/next.gif" alt="Next Chapter" border=0></A>
<a href="toc.htm"><img align=right src="../../images/toc.gif" alt="Return to Table of Contents" border=0></A>
<a href="chap27.htm"><img align=right src="../../images/prev.gif" alt="Previous Chapter" border=0></A>


<h1><a name="0918_0001">PART VII: Selected Topics<a name="0918_0001"></h1><P>





<h1>Introduction</h1><P>
This part contains a selection of algorithmic topics that extend and complement earlier material in this book. Some chapters introduce new models of computation such as combinational circuits or parallel computers. Others cover specialized domains such as computational geometry or number theory. The last two chapters discuss some of the known limitations to the design of efficient algorithms and introduce techniques for coping with those limitations.<P>
Chapter 28 presents our first parallel model of computation: comparison networks. Roughly speaking, a comparison network is an algorithm that allows many comparisons to be made simultaneously. This chapter shows how to build a comparison network that can sort <I>n</I> numbers in <I>O</I>(lg<SUP>2</SUP> <I>n</I>) time.<P>
Chapter 29 introduces another parallel model of computation: combinational circuits. This chapter shows that two <I>n</I>-bit numbers can be added in <I>O</I>(lg <I>n</I>) time using a combinational circuit called a carry-lookahead adder. It also shows how to multiply two <I>n</I>-bit numbers in <I>O</I>(lg <I>n</I>) time.<P>
Chapter 30 introduces a general model of parallel computation called the PRAM. The chapter presents basic parallel techniques, including pointer jumping, prefix computations, and the Euler-tour technique. Most of the techniques are illustrated on simple data structures, including lists and trees. The chapter also discusses general issues in parallel computation, including work efficiency and concurrent access to shared memory. It proves Brent's theorem, which shows how a parallel computer can efficiently simulate a combinational circuit. The chapter concludes with a work-efficient, randomized algorithm for list ranking and a remarkably efficient deterministic algorithm for symmetry breaking in a list.<P>
Chapter 31 studies efficient algorithms for operating on matrices. It begins with Strassen's algorithm, which can multiply two <I>n</I> x <I>n</I> matrices in <I>O</I>(<I>n</I><SUP>2.81</SUP>) time. It then presents two general methods--LU decomposition and LUP decomposition--for solving linear equations by Gaussian elimination in <I>O</I>(<I>n</I><SUP>3</SUP>) time. It also shows that Strassen's algorithm can be used to solve linear systems faster and that, asymptotically, matrix inversion and matrix multiplication can be performed equally fast. The chapter concludes by showing how a least-squares approximate solution can be computed when a set of linear equations has no exact solution.<P>
Chapter 32 studies operations on polynomials and shows that a well-known signal-processing technique--the Fast Fourier Transform (FFT)--can be used to multiply two degree-<I>n</I> polynomials in <I>O</I>(<I>n </I>lg <I>n</I>) time. It also investigates efficient implementations of the FFT, including a parallel circuit.<P>
Chapter 33 presents number-theoretic algorithms. After a review of elementary number theory, it presents Euclid's algorithm for computing greatest common divisors. Algorithms for solving modular linear equations and for raising one number to a power modulo another number are presented next. An interesting application of number-theoretic algorithms is presented next: the RSA public-key cryptosystem. This cryptosystem not only can be used to encrypt messages so that an adversary cannot read them, it also can be used to provide digital signatures. The chapter then presents the Miller-Rabin randomized primality test, which can be used to find large primes efficiently--an essential requirement for the RSA system. Finally, the chapter covers Pollard's &quot;rho&quot; heuristic for factoring integers and discusses the state of the art of integer factorization.<P>
Chapter 34 studies the problem of finding all occurrences of a given pattern string in a given text string, a problem that arises frequently in text-editing programs. An elegant approach due to Rabin and Karp is considered first. Then, after examining an efficient solution based on finite automata, the chapter presents the Knuth-Morris-Pratt algorithm, which achieves efficiency by cleverly preprocessing the pattern. The chapter closes with a presentation of a string-matching heuristic due to Boyer and Moore.<P>
Computational geometry is the topic of Chapter 35. After discussing basic primitives of computational geometry, the chapter shows how a "sweeping" method can efficiently determine whether or not a set of line segments contains any intersections. Two clever algorithms for finding the convex hull of a set of points--Graham's scan and Jarvis's march--also illustrate the power of sweeping methods. The chapter closes with an efficient algorithm for finding the closest pair from among a given set of points in the plane.<P>
Chapter 36 concerns NP-complete problems. Many interesting computational problems are NP-complete, but no polynomial-time algorithm is known for solving any of them. This chapter presents techniques for determining when a problem is NP-complete. Several classic problems are proved to be NP-complete: determining if a graph has a hamiltonian cycle, determining if a boolean formula is satisfiable, and determining if a given set of numbers has a subset that adds up to a given target value. The chapter also proves that the famous traveling-salesman problem is NP-complete.<P>
Chapter 37 shows how approximation algorithms can be used to find approximate solutions to NP-complete problems efficiently. For some NP-complete problems, approximate solutions that are near optimal are quite easy to produce, but for others even the best approximation algorithms known work progressively more poorly as the problem size increases. Then, there are some problems for which one can invest increasing amounts of computation time in return for increasingly better approximate solutions. This chapter illustrates these possibilities with the vertex-cover problem, the traveling-salesman problem, the set-covering problem, and the subset-sum problem.<P>
<P>


<P>
<P>
<center>Go to <a href="chap28.htm">Chapter 28</A>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Back to <a href="toc.htm">Table of Contents</A>
</P>
</center>


</BODY></HTML>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
波多野结衣视频一区| 亚洲蜜臀av乱码久久精品| 青青青伊人色综合久久| 欧美日韩国产在线观看| 亚洲妇女屁股眼交7| 欧美色偷偷大香| 午夜精品视频一区| 日韩精品综合一本久道在线视频| 捆绑变态av一区二区三区| 欧美白人最猛性xxxxx69交| 国产一区日韩二区欧美三区| 国产精品免费观看视频| 在线视频国产一区| 蜜桃av噜噜一区| 中文字幕不卡三区| www激情久久| 成人毛片在线观看| 亚洲国产一区在线观看| 欧美精品一区视频| av电影一区二区| 香蕉乱码成人久久天堂爱免费| 欧美zozo另类异族| 91婷婷韩国欧美一区二区| 欧美aaaaa成人免费观看视频| 久久久国产精品午夜一区ai换脸| 色美美综合视频| 精品亚洲porn| 一二三区精品视频| 久久久亚洲国产美女国产盗摄| 色婷婷一区二区| 国产精品一区二区x88av| 一区二区三区高清| 久久综合视频网| 欧美日韩视频第一区| 高清国产一区二区| 天天色天天操综合| 中文字幕中文字幕一区二区| 日韩午夜激情av| 91极品美女在线| 成人高清视频在线观看| 九色综合国产一区二区三区| 一区二区三区高清不卡| 中文字幕av一区二区三区| 欧美一区二区精品久久911| 99精品视频一区| 国产高清不卡一区| 久久国产三级精品| 天堂蜜桃91精品| 亚洲精选免费视频| 国产精品视频观看| 久久综合网色—综合色88| 欧美三级韩国三级日本一级| 成人av午夜电影| 久久av资源站| 亚洲1区2区3区4区| 亚洲色图都市小说| 久久久www免费人成精品| 日韩一区二区视频在线观看| 色婷婷av一区二区三区之一色屋| 国产99久久久久| 韩日av一区二区| 青草av.久久免费一区| av激情亚洲男人天堂| 国产精品911| 久久91精品国产91久久小草| 日韩av一二三| 性欧美大战久久久久久久久| 亚洲日本电影在线| 国产精品乱人伦| 国产精品丝袜一区| 欧美激情在线一区二区| 久久久五月婷婷| 欧美www视频| 欧美电视剧免费全集观看| 91精品国产91综合久久蜜臀| 欧美一区二区在线免费播放| 欧美一区二区三区免费大片 | 亚洲欧美成aⅴ人在线观看 | 中文字幕一区av| 国产精品色婷婷久久58| 国产日韩亚洲欧美综合| 久久久噜噜噜久久中文字幕色伊伊| 精品免费日韩av| 精品国产免费人成电影在线观看四季 | 午夜精品免费在线| 日韩av在线发布| 青娱乐精品视频| 黄色日韩三级电影| 国产激情偷乱视频一区二区三区| 岛国一区二区三区| 91蜜桃传媒精品久久久一区二区| 色88888久久久久久影院野外 | 欧美酷刑日本凌虐凌虐| 欧美丰满嫩嫩电影| 精品日韩一区二区三区免费视频| 精品国产百合女同互慰| 国产精品久久久久毛片软件| 一区二区三区精品视频在线| 日韩中文字幕av电影| 精品一区二区三区在线观看国产 | 蜜桃av噜噜一区二区三区小说| 久久99热99| 91啦中文在线观看| 欧美高清激情brazzers| 国产三区在线成人av| 亚洲视频在线观看三级| 日本美女视频一区二区| 国产91在线看| 欧美日韩一级二级三级| 久久久久高清精品| 亚洲国产视频直播| 国产精品一区免费视频| 欧美性大战久久久久久久| 亚洲精品一区二区三区四区高清 | 国产视频一区在线观看| 亚洲日本va午夜在线影院| 日韩电影免费在线看| 国产成人在线免费观看| 国产欧美一区二区三区沐欲 | 美女一区二区久久| 97se亚洲国产综合在线| 日韩一区二区麻豆国产| 国产精品久久看| 日本成人在线网站| 91网站黄www| 久久―日本道色综合久久| 一区二区三区精品久久久| 国产成人亚洲综合a∨婷婷图片| 在线免费观看成人短视频| 欧美激情一二三区| 美日韩黄色大片| 在线一区二区三区四区| 久久久久久久综合| 日本欧美在线看| 欧美午夜电影网| 亚洲欧洲精品天堂一级| 韩国三级在线一区| 欧美日韩国产一级| 亚洲日本一区二区| 国产精品一区二区男女羞羞无遮挡| 欧美久久久久久久久中文字幕| 国产精品九色蝌蚪自拍| 韩国v欧美v亚洲v日本v| 9191久久久久久久久久久| 亚洲欧美国产77777| 成人美女视频在线看| 精品久久久网站| 日韩 欧美一区二区三区| 欧美综合一区二区三区| 亚洲欧美日韩中文播放| 成人国产亚洲欧美成人综合网| 久久久久久久电影| 麻豆精品一区二区av白丝在线| 欧美日韩的一区二区| 亚洲永久免费av| 欧美在线三级电影| 一区二区在线电影| 色婷婷综合久久久中文一区二区| 国产精品久久久久桃色tv| 成人h动漫精品| 国产精品久久精品日日| av色综合久久天堂av综合| 中文字幕av资源一区| 成人一级视频在线观看| 国产欧美日韩一区二区三区在线观看| 国产在线一区二区综合免费视频| 日韩亚洲欧美高清| 精品在线免费视频| 久久综合av免费| 国产一区二区精品久久91| 久久精品夜色噜噜亚洲a∨| 高清不卡一二三区| 亚洲视频一区二区免费在线观看| 色综合天天综合给合国产| 亚洲精品久久久久久国产精华液| 欧美亚洲图片小说| 日韩成人免费电影| 久久午夜羞羞影院免费观看| 国产suv精品一区二区三区| 欧美国产精品久久| 97久久久精品综合88久久| 亚洲一区二区黄色| 欧美一区二区三区四区在线观看| 久久99久久精品| 中文字幕成人av| 欧美色图12p| 黄页视频在线91| 亚洲色欲色欲www在线观看| 久久天天做天天爱综合色| 成人免费毛片高清视频| 亚洲黄色av一区| 69成人精品免费视频| 精品亚洲aⅴ乱码一区二区三区| 欧美国产一区二区| 欧美偷拍一区二区| 国产呦精品一区二区三区网站| 中文字幕一区二区三区乱码在线| 欧美视频在线观看一区| 乱中年女人伦av一区二区| 中文字幕亚洲一区二区av在线|