• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Algorithms for Constructing Computably Enumerable Sets » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Algorithms for Constructing Computably Enumerable Sets

ISBN-13: 9783031269035 / Angielski

Kenneth J. Supowit
Algorithms for Constructing Computably Enumerable Sets Kenneth J. Supowit 9783031269035 Birkhauser - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Algorithms for Constructing Computably Enumerable Sets

ISBN-13: 9783031269035 / Angielski

Kenneth J. Supowit
cena 242,07 zł
(netto: 230,54 VAT:  5%)

Najniższa cena z 30 dni: 231,29 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!
inne wydania

Logicians have developed beautiful algorithmic techniques for the construction of computably enumerable sets.  This textbook presents these techniques in a unified way that should appeal to computer scientists.Specifically, the book explains, organizes, and compares various algorithmic techniques used in computability theory (which was formerly called "classical recursion theory").  This area of study has produced some of the most beautiful and subtle algorithms ever developed for any problems.  These algorithms are little-known outside of a niche within the mathematical logic community.  By presenting them in a style familiar to computer scientists, the intent is to greatly broaden their influence and appeal.Topics and features:·         All other books in this field focus on the mathematical results, rather than on the algorithms.·         There are many exercises here, most of which relate to details of the algorithms.·         The proofs involving priority trees are written here in greater detail, and with more intuition, than can be found elsewhere in the literature.·         The algorithms are presented in a pseudocode very similar to that used in textbooks (such as that by Cormen, Leiserson, Rivest, and Stein) on concrete algorithms.·         In addition to their aesthetic value, the algorithmic ideas developed for these abstract problems might find applications in more practical areas.Graduate students in computer science or in mathematical logic constitute the primary audience. Furthermore, when the author taught a one-semester graduate course based on this material, a number of advanced undergraduates, majoring in computer science or mathematics or both, took the course and flourished in it.Kenneth J. Supowitis an Associate Professor Emeritus, Department of Computer Science & Engineering, Ohio State University, Columbus, Ohio, US.

Logicians have developed beautiful algorithmic techniques for the construction of computably enumerable sets.  This textbook presents these techniques in a unified way that should appeal to computer scientists.Specifically, the book explains, organizes, and compares various algorithmic techniques used in computability theory (which was formerly called "classical recursion theory").  This area of study has produced some of the most beautiful and subtle algorithms ever developed for any problems.  These algorithms are little-known outside of a niche within the mathematical logic community.  By presenting them in a style familiar to computer scientists, the intent is to greatly broaden their influence and appeal.Topics and features:·         All other books in this field focus on the mathematical results, rather than on the algorithms.·         There are many exercises here, most of which relate to details of the algorithms.·         The proofs involving priority trees are written here in greater detail, and with more intuition, than can be found elsewhere in the literature.·         The algorithms are presented in a pseudocode very similar to that used in textbooks (such as that by Cormen, Leiserson, Rivest, and Stein) on concrete algorithms.·         In addition to their aesthetic value, the algorithmic ideas developed for these abstract problems might find applications in more practical areas.Graduate students in computer science or in mathematical logic constitute the primary audience. Furthermore, when the author taught a one-semester graduate course based on this material, a number of advanced undergraduates, majoring in computer science or mathematics or both, took the course and flourished in it.Kenneth J. Supowit is an Associate Professor Emeritus, Department of Computer Science & Engineering, Ohio State University, Columbus, Ohio, US.

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Computer Science
Mathematics > Logic
Computers > Data Science - General
Wydawca:
Birkhauser
Seria wydawnicza:
Computer Science Foundations and Applied Logic
Język:
Angielski
ISBN-13:
9783031269035

Preface
1 History
2 This book
3 Acknowledgements
4 A truth universally acknowledged

1 Notation and terms
1 Index of notation and terms
2 Defaults
3 Notes about the pseudo-code
4 Miscellaneous notes about the text

2 Set theory, requirements, witnesses
1 Infinite cardinals
2 Infinitely many infinite cardinals
3 What’s new in this chapter?
4 Exercises

3 Computable and c.e. sets
1 Turing machines
2 Computably enumerable, computable
3 An example of a c.e.n. set
4 What’s new in this chapter?
5 Afternotes
6 Exercises

4 Priorities (a splitting theorem)
1 A priority argument
2 What’s new in this chapter?
3 Afternotes
4 Exercises

5 Reductions, comparability (Kleene-Post Theorem)
1 Oracle Turing machines
2 Turing reductions
3 The theorem
4 What’s new in this chapter?
5 Afternotes
6 Exercises

6 Finite injury (Friedberg-Muchnik Theorem)
1 The theorem
2 What’s new in this chapter?
3 Afternotes
4 Exercises

7 The Permanence Lemma
1 Exercises

8 Permitting (Friedberg-Muchnik below C Theorem)
1 The Lemma
2 The theorem
3 Valid witnesses
4 Types of witnesses
5 The algorithm
6 Verification
7 What’s new in this chapter?
8 Afternotes
9 Exercises

9 Length of agreement (Sacks Splitting Theorem)
1 Definitions and main idea
2 The theorem
3 More definitions
4 The algorithm
5 Verification
6 Why preserve similarities?
7 What’s new in this chapter?
8 Afternotes
9 Exercises . .

10 Introduction to infinite injury
1 A review of finite injury priority arguments
2 Coping with infinite injury
3 Afternotes

11 A tree of guesses (Weak Thickness Lemma)
1 Definitions
2 The “lemma”
3 The tree
4 More definitions
5 The algorithm
6 Verification
7 What’s new in this chapter?
8 Afternotes
9 Exercises

12 An infinitely branching tree (Thickness Lemma)
1 The tree .
2 Definitions
3 The algorithm
4 Verification .
5 What’s new in this chapter?
6 Afternotes
7 Exercises

13 True stages (another proof of the Thickness Lemma)
1 Definitions
2 The algorithm
3 Verification
4 What’s new in this chapter?
5 Afternotes
6 Exercises

14 Joint custody (Minimal Pair Theorem)
1 The theorem
2 The tree .
3 Definitions
4 Interpretation of the guesses
5 The algorithm
6 Verification .
7 What’s new in this chapter?
8 Afternotes
9 Exercises

15 Witness lists (Density Theorem)
1 The tree
2 Definitions
3 The algorithm
3.1 Main code
3.2 Subroutines
3.3 Notes on the algorithm
4 Verification
4.1 More definitions
4.2 Interpretation of the guesses
4.3 Facts
4.4 Lemmas
5 What’s new in this chapter?
6 Designing an algorithm
7 Afternotes
8 Exercises

16 The theme of this book: delaying tactics

Appendix A: a pairing function
Bibliography
1 Books
2 Articles

Solutions to selected exercises

I received an A.B. degree in linguistics from Cornell University in 1978, and a Ph. D. in computer science from the University of Illinois in 1981.  Then I worked three years for Hewlett-Packard in Palo Alto, California.  Subsequently, I taught for four years at Princeton University, and then 34 years at Ohio State University, where I retired in May, 2022, and now have emeritus status.  Along the way, I’ve consulted for IBM, AT&T, Hewlett-Packard, and various small companies.


My research has primarily been in the analysis of algorithms, however, I’ve long been fascinated by computability theory, which has been the focus of my research and much of my teaching in recent years.  In Autumn, 2021, I taught a graduate level course using an earlier draft of this book as the text.

Logicians have developed beautiful algorithmic techniques for the construction of computably enumerable sets.  This textbook presents these techniques in a unified way that should appeal to computer scientists.

Specifically, the book explains, organizes, and compares various algorithmic techniques used in computability theory (which was formerly called "classical recursion theory").  This area of study has produced some of the most beautiful and subtle algorithms ever developed for any problems.  These algorithms are little-known outside of a niche within the mathematical logic community.  By presenting them in a style familiar to computer scientists, the intent is to greatly broaden their influence and appeal.

Topics and features:

·         All other books in this field focus on the mathematical results, rather than on the algorithms.

·         There are many exercises here, most of which relate to details of the algorithms.

·         The proofs involving priority trees are written here in greater detail, and with more intuition, than can be found elsewhere in the literature.

·         The algorithms are presented in a pseudocode very similar to that used in textbooks (such as that by Cormen, Leiserson, Rivest, and Stein) on concrete algorithms.

·         In addition to their aesthetic value, the algorithmic ideas developed for these abstract problems might find applications in more practical areas.

Graduate students in computer science or in mathematical logic constitute the primary audience. Furthermore, when the author taught a one-semester graduate course based on this material, a number of advanced undergraduates, majoring in computer science or mathematics or both, took the course and flourished in it.

Kenneth J. Supowit is an Associate Professor Emeritus, Department of Computer Science & Engineering, Ohio State University, Columbus, Ohio, US.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia