Lecture 1: Recursion
نویسندگان
چکیده
Reduction is the single most common technique used in designing algorithms. Reducing one problem X to another problem (or set of problems) Y means to write an algorithm for X , using an algorithm or Y as a subroutine or black box. For example, the congressional apportionment algorithm described in Lecture 0 reduces the problem of apportioning Congress to the problem of maintaining a priority queue under the operations INSERT and EXTRACTMAX. Those data structure operations are black boxes; the apportionment algorithm does not depend on any specific implementation. Conversely, when we design a particular priority queue data structure, we typically neither know nor care how our data structure will be used. Whether or not the Census Bureau plans to use our code to apportion Congress is completely irrelevant to our design choices. As a general rule, when we design algorithms, we may not know—and we should not care—how the basic building blocks we use are implemented, or how your algorithm might be used as a basic building block to solve a bigger problem. A particularly powerful kind of reduction is recursion, which can be defined loosely as follows:
منابع مشابه
Axiomatic Set Theory
Lecture 1, 07.03.: We made a review of the material covered in Chapter I of [3], up to Theorem I.9.11 (Transfinite Recursion on Well-founded Relations). Lecture 2, 14.03.: We discussed the notion of a rank, as well as the Mostowski collapsing function material corresponding to Section 9 of [3]. Lecture 3, 04.04.: We discussed hereditarily transitive sets, the DownwardLöwenheim-Skolem-Tarksi The...
متن کاملReal recursive functions and their hierarchy
In the last years, recursive functions over the reals (Theoret. Comput. Sci. 162 (1996) 23) have been 9 considered, first as a model of analog computation, and second to obtain analog characterizations of classical computational complexity classes (Unconventional Models of Computation, UMC 2002, 11 Lecture Notes in Computer Science, Vol. 2509, Springer, Berlin, pp. 1–14). However, one of the op...
متن کاملMath 262 Lecture 10 : 4 / 29 / 04 lecturer : Lincoln Lu scribe : Chris Calabro
The partial duplication model with parameters (p, t, t0, Gt0) where p ∈ (0, 1), t, t0 ∈ N, t ≥ t0, and Gt0 is an initial undirected graph is the probability distribution on undirected graphs Gt described by the following recursion: If t = t0, then Gt = Gt0 . Otherwise, select a graph Gt−1 = (Vt−1, Et−1) from the partial duplication model with parameters (p, t − 1, t0, Gt0) and construct Gt, ini...
متن کاملCS6180 Lecture 22 – Theory of Computability in CTT
This lecture will summarise core ideas in the theory of computing, including basic recursive function theory, using concepts from type theory. A fundamental concept is the type of partial recursive functions over the natural numbers and other types. The basic results include proofs that certain questions about partial functions are unsolvable, such as whether they converge on a specific input. ...
متن کاملRecursion-Closed Algebraic Theories
A class of algebraic theories called “recursion-closed,” which generalize the rational theories studied by J. A. Goguen, J. W. Thatcher, E.G. Wagner and J. B. Wright in [in “Proceedings, 17th IEEE Symposium on Foundations of Computer Science, Houston, Texas, October 1976,” pp. 147-158; in “Mathematical Foundations of Computer Science, 1978,” Lecture Notes in Computer Science, Vol. 64, Springer-...
متن کامل2 Compact Suffix Arrays
The suffix array data structure that we present is due to Grossi and Vitter [1]. It uses a recursive construction that inflates the alphabet size, much like the the suffix array construction that we saw in Lecture 18. Building on this, we will construct a low-space suffix tree by augmenting this suffix array with an additional tree structure. This construction is due to Munro, Raman and Rao [2]...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009