DIMACS Series in Discrete Mathematics and Theoretical Computer Science Volume 49, 1999
… computer science, and its potential role as a method of coping with intractability is discussed
by Garey and Johnson … In fact, this happened in print at least three times [FL87, Jo87, PY96]. …
by Garey and Johnson … In fact, this happened in print at least three times [FL87, Jo87, PY96]. …
[PDF][PDF] Modern cryptology: an introduction
B Preneel - 1998 - handouts.secappdev.org
… of communications, but in the computer era the protection of … can be found at the core of
computer and network security, of … on telecommunication networks and in computer systems; the …
computer and network security, of … on telecommunication networks and in computer systems; the …
What is chaos, that we should be 12 mindful of it?
J Ford�- The new physics, 1989 - books.google.com
… pictured in the September 1984 issues of Discover magazine … shortest computer program
which prints S is the copy program'PRINT … WH Freeman, New York. This book is an elementary …
which prints S is the copy program'PRINT … WH Freeman, New York. This book is an elementary …
Collective processing and neural states
JJ Hopfield�- World Scientific Publishers, New York, 1984 - books.google.com
… a modern computer. This point is exemplified by the disparity between the tasks which brain
and computer do well. A brain is relatively poor at arithmetic compared to a computer. On …
and computer do well. A brain is relatively poor at arithmetic compared to a computer. On …
Looking Back—My Life as a Mathematician and Cryptographer
DR Stinson�- International Conference on Selected Areas in�…, 2019 - Springer
… I decided to hold at the Computer Science department at the University of … no computer
science training as a student. However, at that time, there were several people in the Computer …
science training as a student. However, at that time, there were several people in the Computer …
An introduction to modern cryptology
B Preneel�- The History of Information Security, 2007 - Elsevier
Publisher Summary This chapter discusses the issues in modern cryptology and provides
an overview of cryptographic algorithms. Problems solved in cryptography include …
an overview of cryptographic algorithms. Problems solved in cryptography include …
Databases with deadline and contingency constraints
N Soparkar, HF Korth…�- …�on Knowledge and Data�…, 1995 - ieeexplore.ieee.org
… Note that the semantics associated with times?amp(d) are entirely … However, note that the
intractability of the problems … the rank of full professor in 1984, and received the endowed …
intractability of the problems … the rank of full professor in 1984, and received the endowed …
On the counting functions
L Li - 1993 - search.proquest.com
… that computing the permanent of a (0,l)-matrix is #P-complete. This is equivalent to computing
… In one step, the value of the oracle function on w is “magically” printed on the answer tape. …
… In one step, the value of the oracle function on w is “magically” printed on the answer tape. …
[BOOK][B] Untangling complex systems: a grand challenge for science
PL Gentili - 2018 - taylorfrancis.com
… Printed on acid-free paper … He entered manually the printed three digit data and launched
the calculations. Finally, he found something unexpected: the data of the second run matched …
the calculations. Finally, he found something unexpected: the data of the second run matched …
Control of Additive Manufacturing
S Mishra�- Encyclopedia of Systems and Control, 2021 - Springer
… defined in the theory of computation, (Garey, Johnson (1979) Computers and intractability,
a guide to the theory of NP-completeness. WH Freeman, San Francisco; Papadimitriou (1995) …
a guide to the theory of NP-completeness. WH Freeman, San Francisco; Papadimitriou (1995) …