亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? partvii.htm

?? 美國麻省理工的算法導論,英文版,看后程序員宏觀的能力培養有好處
?? HTM
字號:
<HTML><HEAD>

<TITLE>Intro to Algorithms: PART VII: Selected Topics</TITLE></HEAD><BODY BGCOLOR="#FFFFFF">
<a href="chap28.htm"><img align=right src="../../images/next.gif" alt="Next Chapter" border=0></A>
<a href="toc.htm"><img align=right src="../../images/toc.gif" alt="Return to Table of Contents" border=0></A>
<a href="chap27.htm"><img align=right src="../../images/prev.gif" alt="Previous Chapter" border=0></A>


<h1><a name="0918_0001">PART VII: Selected Topics<a name="0918_0001"></h1><P>





<h1>Introduction</h1><P>
This part contains a selection of algorithmic topics that extend and complement earlier material in this book. Some chapters introduce new models of computation such as combinational circuits or parallel computers. Others cover specialized domains such as computational geometry or number theory. The last two chapters discuss some of the known limitations to the design of efficient algorithms and introduce techniques for coping with those limitations.<P>
Chapter 28 presents our first parallel model of computation: comparison networks. Roughly speaking, a comparison network is an algorithm that allows many comparisons to be made simultaneously. This chapter shows how to build a comparison network that can sort <I>n</I> numbers in <I>O</I>(lg<SUP>2</SUP> <I>n</I>) time.<P>
Chapter 29 introduces another parallel model of computation: combinational circuits. This chapter shows that two <I>n</I>-bit numbers can be added in <I>O</I>(lg <I>n</I>) time using a combinational circuit called a carry-lookahead adder. It also shows how to multiply two <I>n</I>-bit numbers in <I>O</I>(lg <I>n</I>) time.<P>
Chapter 30 introduces a general model of parallel computation called the PRAM. The chapter presents basic parallel techniques, including pointer jumping, prefix computations, and the Euler-tour technique. Most of the techniques are illustrated on simple data structures, including lists and trees. The chapter also discusses general issues in parallel computation, including work efficiency and concurrent access to shared memory. It proves Brent's theorem, which shows how a parallel computer can efficiently simulate a combinational circuit. The chapter concludes with a work-efficient, randomized algorithm for list ranking and a remarkably efficient deterministic algorithm for symmetry breaking in a list.<P>
Chapter 31 studies efficient algorithms for operating on matrices. It begins with Strassen's algorithm, which can multiply two <I>n</I> x <I>n</I> matrices in <I>O</I>(<I>n</I><SUP>2.81</SUP>) time. It then presents two general methods--LU decomposition and LUP decomposition--for solving linear equations by Gaussian elimination in <I>O</I>(<I>n</I><SUP>3</SUP>) time. It also shows that Strassen's algorithm can be used to solve linear systems faster and that, asymptotically, matrix inversion and matrix multiplication can be performed equally fast. The chapter concludes by showing how a least-squares approximate solution can be computed when a set of linear equations has no exact solution.<P>
Chapter 32 studies operations on polynomials and shows that a well-known signal-processing technique--the Fast Fourier Transform (FFT)--can be used to multiply two degree-<I>n</I> polynomials in <I>O</I>(<I>n </I>lg <I>n</I>) time. It also investigates efficient implementations of the FFT, including a parallel circuit.<P>
Chapter 33 presents number-theoretic algorithms. After a review of elementary number theory, it presents Euclid's algorithm for computing greatest common divisors. Algorithms for solving modular linear equations and for raising one number to a power modulo another number are presented next. An interesting application of number-theoretic algorithms is presented next: the RSA public-key cryptosystem. This cryptosystem not only can be used to encrypt messages so that an adversary cannot read them, it also can be used to provide digital signatures. The chapter then presents the Miller-Rabin randomized primality test, which can be used to find large primes efficiently--an essential requirement for the RSA system. Finally, the chapter covers Pollard's &quot;rho&quot; heuristic for factoring integers and discusses the state of the art of integer factorization.<P>
Chapter 34 studies the problem of finding all occurrences of a given pattern string in a given text string, a problem that arises frequently in text-editing programs. An elegant approach due to Rabin and Karp is considered first. Then, after examining an efficient solution based on finite automata, the chapter presents the Knuth-Morris-Pratt algorithm, which achieves efficiency by cleverly preprocessing the pattern. The chapter closes with a presentation of a string-matching heuristic due to Boyer and Moore.<P>
Computational geometry is the topic of Chapter 35. After discussing basic primitives of computational geometry, the chapter shows how a "sweeping" method can efficiently determine whether or not a set of line segments contains any intersections. Two clever algorithms for finding the convex hull of a set of points--Graham's scan and Jarvis's march--also illustrate the power of sweeping methods. The chapter closes with an efficient algorithm for finding the closest pair from among a given set of points in the plane.<P>
Chapter 36 concerns NP-complete problems. Many interesting computational problems are NP-complete, but no polynomial-time algorithm is known for solving any of them. This chapter presents techniques for determining when a problem is NP-complete. Several classic problems are proved to be NP-complete: determining if a graph has a hamiltonian cycle, determining if a boolean formula is satisfiable, and determining if a given set of numbers has a subset that adds up to a given target value. The chapter also proves that the famous traveling-salesman problem is NP-complete.<P>
Chapter 37 shows how approximation algorithms can be used to find approximate solutions to NP-complete problems efficiently. For some NP-complete problems, approximate solutions that are near optimal are quite easy to produce, but for others even the best approximation algorithms known work progressively more poorly as the problem size increases. Then, there are some problems for which one can invest increasing amounts of computation time in return for increasingly better approximate solutions. This chapter illustrates these possibilities with the vertex-cover problem, the traveling-salesman problem, the set-covering problem, and the subset-sum problem.<P>
<P>


<P>
<P>
<center>Go to <a href="chap28.htm">Chapter 28</A>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Back to <a href="toc.htm">Table of Contents</A>
</P>
</center>


</BODY></HTML>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩一级成人av| 成人免费在线播放视频| 免费在线观看一区| 欧美精品一区二区三区高清aⅴ | 色综合天天综合| 亚洲最新视频在线播放| 欧美成人午夜电影| 99久久精品免费| 免费高清视频精品| 亚洲视频一区在线| xnxx国产精品| 欧美精三区欧美精三区| 成人自拍视频在线观看| 亚洲va欧美va天堂v国产综合| 日韩一区二区三区电影在线观看| 成人午夜激情影院| 精东粉嫩av免费一区二区三区| 亚洲免费在线视频一区 二区| 精品国产一区二区国模嫣然| 色综合久久久久综合99| 国产成人啪免费观看软件| 亚洲精品国久久99热| 久久久久久久久97黄色工厂| 欧美一区日本一区韩国一区| 不卡视频在线观看| 粉嫩高潮美女一区二区三区| 天堂影院一区二区| 一区二区三区四区高清精品免费观看| 久久综合久久鬼色| 久久蜜桃一区二区| 国产午夜精品久久久久久久| 26uuu欧美日本| 欧美国产日韩亚洲一区| 国产精品乱人伦| 亚洲免费大片在线观看| 亚洲女与黑人做爰| 日韩国产精品久久久| 另类小说一区二区三区| 国产一区二区免费在线| 成人性色生活片| 91丨porny丨中文| 欧美一区二区视频在线观看2020 | 色嗨嗨av一区二区三区| 欧美日韩免费电影| 91精品婷婷国产综合久久| 久久伊人蜜桃av一区二区| 精品日产卡一卡二卡麻豆| 亚洲欧美自拍偷拍| 奇米四色…亚洲| 99久久免费国产| 欧美一区二区精品在线| 欧美激情一二三区| 日韩精品五月天| 丁香啪啪综合成人亚洲小说| 欧美剧情电影在线观看完整版免费励志电影 | 日韩一区二区高清| 亚洲特级片在线| 久久精品国产亚洲a| 色狠狠一区二区| 国产精品丝袜在线| 国内成人精品2018免费看| 欧美精品久久久久久久多人混战| 国产日韩欧美精品综合| 久久国产精品第一页| 欧美日韩亚洲综合一区| 国产精品乱码人人做人人爱| 蜜臀av性久久久久蜜臀av麻豆 | 国产精品88av| 精品成人a区在线观看| 免费观看一级特黄欧美大片| 欧美久久久久中文字幕| 亚洲国产精品影院| 欧美日韩中文另类| 日本欧洲一区二区| 久久亚区不卡日本| 成人激情免费视频| 亚洲成人动漫在线观看| 欧美一区二区三区播放老司机| 日本不卡一区二区三区高清视频| 欧美丰满美乳xxx高潮www| 久久精品99久久久| 欧美激情综合五月色丁香 | 欧美成人r级一区二区三区| 国产精品亚洲一区二区三区在线| 国产精品久久影院| 在线免费观看不卡av| 看国产成人h片视频| 国产精品乱码一区二三区小蝌蚪| 91精彩视频在线观看| 国产精品羞羞答答xxdd| 亚洲综合一二三区| 欧美国产日韩在线观看| 欧美日韩一区二区欧美激情| 国产精品亚洲а∨天堂免在线| 伊人婷婷欧美激情| 国产精品久久久久影院色老大| 欧美日韩一区国产| 色婷婷久久久综合中文字幕 | 亚洲国产精品一区二区www在线| 久久亚洲一区二区三区明星换脸| av激情综合网| 国产原创一区二区| 国精品**一区二区三区在线蜜桃| 一区二区激情视频| 亚洲免费观看高清在线观看| 国产精品福利一区| 国产精品美女久久久久aⅴ国产馆 国产精品美女久久久久av爽李琼 国产精品美女久久久久高潮 | 欧美妇女性影城| 欧美精品xxxxbbbb| 欧美日本在线视频| 91精品久久久久久蜜臀| 777久久久精品| 欧美成人精品二区三区99精品| 在线综合+亚洲+欧美中文字幕| 精品视频在线免费| 欧美色视频一区| 成人久久18免费网站麻豆| 日韩精品久久久久久| 日韩av一区二区三区| 蜜桃av一区二区| 韩国欧美国产一区| 国产成人在线色| 本田岬高潮一区二区三区| 成人国产亚洲欧美成人综合网| 成人免费观看av| 色噜噜夜夜夜综合网| 91精品国产乱码久久蜜臀| 亚洲精品一区二区三区99| 国产精品美女www爽爽爽| 一区二区三区视频在线观看| 美女mm1313爽爽久久久蜜臀| 福利一区二区在线| 69久久夜色精品国产69蝌蚪网| 欧美mv日韩mv国产| 亚洲乱码国产乱码精品精的特点 | 欧美一区二区视频网站| 日本一区二区电影| 久久成人免费网| 色偷偷久久一区二区三区| 2020国产精品自拍| 亚洲国产精品人人做人人爽| 丁香婷婷综合网| 欧美丰满高潮xxxx喷水动漫| 亚洲欧美日韩国产综合在线| 高清国产午夜精品久久久久久| 制服丝袜成人动漫| 亚洲成av人片一区二区梦乃| 成人av电影免费在线播放| 久久一区二区三区四区| 丝袜亚洲另类丝袜在线| 91麻豆国产福利在线观看| 国产日韩欧美制服另类| 日韩精品成人一区二区三区| 91视视频在线观看入口直接观看www | 91首页免费视频| 国产精品久久久久久户外露出| 久久国产免费看| 欧美经典一区二区三区| 国产99久久久国产精品潘金| 国产精品成人一区二区三区夜夜夜| 国产成人在线看| 亚洲图片激情小说| 色欧美日韩亚洲| 免费观看一级特黄欧美大片| 欧美精品一区男女天堂| 91免费看片在线观看| 日韩不卡一二三区| 久久亚洲影视婷婷| 91官网在线观看| 国产高清视频一区| 亚洲成人在线免费| 一区在线中文字幕| 日韩精品最新网址| 日本丶国产丶欧美色综合| 免费不卡在线观看| 亚洲国产乱码最新视频| 国产丝袜在线精品| 91精品国产欧美一区二区| 99免费精品视频| 九九九精品视频| 秋霞午夜鲁丝一区二区老狼| 国产精品国产三级国产a | 久久久久久电影| 日韩一区二区三区电影| 精品视频一区二区不卡| 国产精品中文字幕一区二区三区| 天堂一区二区在线| 一区二区三区四区五区视频在线观看 | 日本一区二区电影| 欧美日韩一区国产| 91免费看`日韩一区二区| 日本中文一区二区三区| 亚洲电影一级黄| 亚洲国产欧美在线| 日精品一区二区| 麻豆国产欧美一区二区三区| 免费三级欧美电影| 国内精品国产成人国产三级粉色| 久久精品国内一区二区三区| 久久99精品国产麻豆婷婷|