Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computability and Complexity: From a Programming Perspective (Foundations of Computing)

Buy
Computability and complexity theory should be of central concern to practitioners as well as theorists. Unfortunately, however, the field is known for its impenetrability. Neil Jones's goal as an educator and author is to build a bridge between computability and complexity theory and other areas of computer science, especially programming. In a shift away from the Turing machine- and Gödel number-oriented classical approaches, Jones uses concepts familiar from programming languages to make computability and complexity more accessible to computer scientists and more applicable to practical programming problems.

According to Jones, the fields of computability and complexity theory, as well as programming languages and semantics, have a great deal to offer each other. Computability and complexity theory have a breadth, depth, and generality not often seen in programming languages. The programming language community, meanwhile, has a firm grasp of algorithm design, presentation, and implementation. In addition, programming languages sometimes provide computational models that are more realistic in certain crucial aspects than traditional models.

New results in the book include a proof that constant time factors do matter for its programming-oriented model of computation. (In contrast, Turing machines have a counterintuitive "constant speedup" property: that almost any program can be made to run faster, by any amount. Its proof involves techniques irrelevant to practice.) Further results include simple characterizations in programming terms of the central complexity classes PTIME and LOGSPACE, and a new approach to complete problems for NLOGSPACE, PTIME, NPTIME, and PSPACE, uniformly based on Boolean programs.

Foundations of Computing series

About the Author
Neil D. Jones is Professor of Computer Science at the University of Copenhagen.
(HTML tags aren't allowed.)

LDAP System Administration
LDAP System Administration
If you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail,...
Analyzing Business Data with Excel
Analyzing Business Data with Excel

As one of the most widely used desktop applications ever created, Excel is familiar to just about everyone with a computer and a keyboard. Yet most of us don't know the full extent of what Excel can do, mostly because of its recent growth in power, versatility, and complexity. The truth is that there are many ways Excel can...

Invasion of Privacy!  Big Brother and the Company Hackers
Invasion of Privacy! Big Brother and the Company Hackers

Pop-up ads, cookies, spyware, spam, junk mail, telemarketing calls. Rapidly evolving technology has made you a target and your personal information a desirable commodity. Your profile is out there and it’s available not just to the highest bidder, but to every bidder. Technology, advertising, the media, and government have converged to...


An Introduction to Ultra Wideband Communication Systems
An Introduction to Ultra Wideband Communication Systems

The definitive, end-to-end guide to high-performance UWB system design

With the FCC's approval of new ultra wideband standards, UWB is poised to drive breakthroughs in both commercial and military communications. However, UWB system design is radically different from...

Regular Expression Pocket Reference
Regular Expression Pocket Reference
Ideal as an introduction for beginners and a quick reference for advanced programmers, Regular Expression Pocket Reference is a comprehensive guide to regular expression APIs for C, Perl, PHP, Java, .NET, Python, vi, and the POSIX regular expression libraries. This handy book offers programmers a complete overview...
sed & awk (2nd Edition)
sed & awk (2nd Edition)
The book begins with an overview and a tutorial that demonstrate a progression in functionality from grep to sed to awk. sed and awk share a similar command-line syntax, accepting user instructions in the form of a script. Because all three programs use UNIX regular expressions, an entire chapter is devoted to understanding UNIX regular expression...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy