• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Artificial Intelligence Experimental results on the crossover point in
Artificial Intelligence Experimental results on the crossover point in

HAPLO-ASP: Haplotype Inference Using Answer Set Programming
HAPLO-ASP: Haplotype Inference Using Answer Set Programming

... propositional theory prepared for MINISAT by SHIP S is smaller than the one prepared by H APLO -ASP. Experimenting with HIPAG Problems. We have compared H APLO -ASP with the haplotype inference system H APLO -IHP [7] with respect to the computation time and the accuracy of generated haplotypes. We h ...
26 Optimal Bounds for Johnson-Lindenstrauss
26 Optimal Bounds for Johnson-Lindenstrauss

for Sublinear Time Maximum Inner Product Search (MIPS)
for Sublinear Time Maximum Inner Product Search (MIPS)

... Solving the MIPS problem can have significant practical impact. [19, 13] proposed solutions based on tree data structure combined with branch and bound space partitioning technique similar to k-d trees [9]. Later, the same method was generalized for general max kernel search [5], where the runtime g ...
User Interfaces and Mobile Web
User Interfaces and Mobile Web

1.7. Mathematical Induction
1.7. Mathematical Induction

... stronger assumption, you proceed as before to show that P(k + 1) is true. • It may be shown that Regular Induction implies Strong Induction and vice versa. That is, anything that can be proven using Regular Induction can be proven using Strong Induction, and vice versa. However, the benefit of using ...
Binary Integer Programming in associative data models
Binary Integer Programming in associative data models

Bachelier`s Predecessors - Efficient Market Hypothesis
Bachelier`s Predecessors - Efficient Market Hypothesis

Facing the Reality of Data Stream Classification: Coping with Scarcity of Labeled Data
Facing the Reality of Data Stream Classification: Coping with Scarcity of Labeled Data

ppt - Department of Mathematics | University of Washington
ppt - Department of Mathematics | University of Washington

On Cantorian spacetime over number systems with division by zero
On Cantorian spacetime over number systems with division by zero

... definitions, these bricks acquire an abstract mathematical existence, even though they may imply some paradoxical consequences at a deeper level. Hence one could still build quite nonexistent abstract building with nonexistent bricks. Therefore we should try to discover all properties of those abstra ...
Chapter 1 Security Problems in Computing
Chapter 1 Security Problems in Computing

...  Merkle and Hellman provided an algorithm for the receiver to use a superincreasing knapsack (the private key) to decrypt the ciphertext. csci5233 computer security & integrity (Chap. 3) ...
Locality Preserving Hashing Kang Zhao, Hongtao Lu and Jincheng Mei
Locality Preserving Hashing Kang Zhao, Hongtao Lu and Jincheng Mei

Constructing university timetable using constraint
Constructing university timetable using constraint

Chapter 5 Preliminaries on Semiparametric Theory and Missing Data Problem
Chapter 5 Preliminaries on Semiparametric Theory and Missing Data Problem

... variates, V , are available, then, they can be used as a surrogate variables in order to gain efficiency. The methodology is also developed for longitudinal data and is presented under a monotone missing data pattern. However, some extensions to arbitrary missing data patterns are also studied. In p ...
A Survey of Partially Observable Markov Decision Processes
A Survey of Partially Observable Markov Decision Processes

Ultimate Hacking: Hands On
Ultimate Hacking: Hands On

Near-field imaging of scattering obstacles with the factorization method
Near-field imaging of scattering obstacles with the factorization method

Solution of a Mathematical Model Describing the Change of
Solution of a Mathematical Model Describing the Change of

Recognition of On-Line Handwritten Commutative Diagrams
Recognition of On-Line Handwritten Commutative Diagrams

PowerPoint
PowerPoint

... Christopher Moretti – University of Notre Dame ...
convergence results for ant routing algorithms via stochastic approximation and optimization
convergence results for ant routing algorithms via stochastic approximation and optimization

Combinatorial Rectangles in Communication Complexity
Combinatorial Rectangles in Communication Complexity

... A protocol P over domain X × Y with range Z is a binary tree, where each internal node v is labeled either by a function av : X → Σ or by a function bv : Y → Σ, and each leaf is labeled with an element z ∈ {0, 1}. ...
Constructions, proofs and the meaning of logical constants
Constructions, proofs and the meaning of logical constants

... study of these theories has been prompted by at least three sorts of considerations. The first theories were proposed by Kreisel around 1960 as a means of formalizing the intended interpreation for the intuitionistic logical constants as presented in Heyting’s Introduction from 1956. Here, in Kreise ...
Time-Memory Trade-Off for Lattice Enumeration in a Ball
Time-Memory Trade-Off for Lattice Enumeration in a Ball

< 1 ... 3 4 5 6 7 8 9 10 11 ... 98 >

Theoretical computer science



Theoretical computer science is a division or subset of general computer science and mathematics that focuses on more abstract or mathematical aspects of computing and includes the theory of computation.It is not easy to circumscribe the theory areas precisely and the ACM's Special Interest Group on Algorithms and Computation Theory (SIGACT) describes its mission as the promotion of theoretical computer science and notes:Template:""To this list, the ACM's journal Transactions on Computation Theory adds coding theory, computational learning theory and theoretical computer science aspects of areas such as databases, information retrieval, economic models and networks. Despite this broad scope, the ""theory people"" in computer science self-identify as different from the ""applied people."" Some characterize themselves as doing the ""(more fundamental) 'science(s)' underlying the field of computing."" Other ""theory-applied people"" suggest that it is impossible to separate theory and application. This means that the so-called ""theory people"" regularly use experimental science(s) done in less-theoretical areas such as software system research. It also means that there is more cooperation than mutually exclusive competition between theory and application.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report