Computer Science: An OverviewGeneral literature -- Introductory and Survey. |
From inside the book
Results 1-3 of 5
Page 436
... polynomial time Solution More than a polynomial number of options exists , only one of which leads to a solution our subcommittee problem suggests that there are NP problems that are not true polynomial problems . That is , there appear ...
... polynomial time Solution More than a polynomial number of options exists , only one of which leads to a solution our subcommittee problem suggests that there are NP problems that are not true polynomial problems . That is , there appear ...
Page 490
... Nanosecond 34 Natural language processing 398 Network 109 Network database model 341 , 350-60 NIL pointer 283 Node in a graph 383 in a tree 296 Nondeterministic polynomial ( NP ) problems 435 Nonloss decomposition 346 490 INDEX.
... Nanosecond 34 Natural language processing 398 Network 109 Network database model 341 , 350-60 NIL pointer 283 Node in a graph 383 in a tree 296 Nondeterministic polynomial ( NP ) problems 435 Nonloss decomposition 346 490 INDEX.
Page 491
... Polynomial algorithm 433 Polynomial expression 432 Polynomial problems 434 Pop ( stack operation ) 287 Port 86 POS ( program function ) 218 Precedence rules 199 Primary key 323 Primitives 132-34 Problem solving 141-46 Procedural part ...
... Polynomial algorithm 433 Polynomial expression 432 Polynomial problems 434 Pop ( stack operation ) 287 Port 86 POS ( program function ) 218 Precedence rules 199 Primary key 323 Primitives 132-34 Problem solving 141-46 Procedural part ...
Contents
Contents | 1 |
PART ONE Machine Architecture | 19 |
Data Manipulation | 61 |
Copyright | |
10 other sections not shown
Other editions - View all
Common terms and phrases
abstract data type activities actually algorithm Alice application application software array ASCII assign binary bit patterns block bulk storage called Carol Chapter concept consider contains current entry Current Pointer data structures data types database declare search deleted devices diagram disk employee example execution Figure goal hash head pointer hexadecimal identified implemented input insertion sort instruction integer key field linked list loop machine language machine's memory main memory memory cells modified module move notation operating system parity bit password perform pivot entry position problem produce program counter programming languages pseudocode Questions/Exercises queue record represented request result retrieve routines search tree Section sequence sequential file solution solving sort algorithm stack statement step storage system stored string subprogram Tail pointer tape target value task technique terminal Turing machine two's complement