CSE 417: Algorithms and Computational Complexity

Slides:



Advertisements
Similar presentations
IEOR 4004: Introduction to Operations Research Deterministic Models January 22, 2014.
Advertisements

8/25/2009 Sofya Raskhodnikova Intro to Theory of Computation L ECTURE 1 Theory of Computation Course information Overview of the area Finite Automata Sofya.
Feb 12, 2002Mårten Trolin1 Applied Cryptography Main goal –Give some practical experience on cryptographic technics used today. –Show how to use existing.
CSE 311 Foundations of Computing I Spring 2013 Lecture 1 Propositional Logic.
Tractable and intractable problems for parallel computers
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
CSE 311 Foundations of Computing I Autumn 2011 Lecture 1 Propositional Logic.
1 CSE 417: Algorithms and Computational Complexity Winter 2001 Lecture 21 Instructor: Paul Beame.
Lecture 14 Go over midterm results Algorithms Efficiency More on prime numbers.
CS 415 Algorithm Analysis Instructor: B. (Ravi) Ravikumar
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Algorithmic Problems in Algebraic Structures Undecidability Paul Bell Supervisor: Dr. Igor Potapov Department of Computer Science
1 CSE 417: Algorithms and Computational Complexity Winter 2001 Lecture 22 Instructor: Paul Beame.
1 CSE 417: Algorithms and Computational Complexity Winter 2001 Lecture 6 Instructor: Paul Beame TA: Gidon Shavit.
1 CSE 417: Algorithms and Computational Complexity Winter 2001 Lecture 18 Instructor: Paul Beame.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
CSE 220 (Data Structures and Analysis of Algorithms) Instructor: Saswati Sarkar T.A. Dimosthenes Anthomelidis
1 CSE 417: Algorithms and Computational Complexity Winter 2001 Lecture 5 Instructor: Paul Beame TA: Gidon Shavit.
CSE 311 Foundations of Computing I Autumn 2012 Lecture 1 Propositional Logic 1.
Introduction to the Theory of Computation
CMPS 3223 Theory of Computation Automata, Computability, & Complexity by Elaine Rich ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Slides provided.
1 CS 233 Data Structures and Algorithms 황승원 Fall 2010 CSE, POSTECH.
CS 390 Introduction to Theoretical Computer Science.
CS1502 Formal Methods in Computer Science Lecture Notes 16 Review for Exam2 continued Theory of Computation Introduction.
Feb 11, 2003Mårten Trolin1 Applied Cryptography Main goal –Give some practical experience on cryptographic technics used today. –Show how to use existing.
Introduction to Algorithms (2 nd edition) by Cormen, Leiserson, Rivest & Stein Chapter 1: The Role of Algorithms in Computing (slides by N. Adlai A. DePano)
CSCI 3160 Design and Analysis of Algorithms Tutorial 10 Chengyu Lin.
15-499Page 1 Course Course: Algorithms and Applications (15-499) Instructor Instructor: Guy Blelloch TA TA: Shuchi Chawla URL URL:
Nawaf M Albadia
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
Limits to Computation How do you analyze a new algorithm? –Put it in the form of existing algorithms that you know the analysis. –For example, given 2.
Complexity & Computability. Limitations of computer science  Major reasons useful calculations cannot be done:  execution time of program is too long.
Complexity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Notes Over 3.1 Solving a System Graphically Graph the linear system and estimate the solution. Then check the solution algebraically.
Hard Problems Some problems are hard to solve.  No polynomial time algorithm is known.  E.g., NP-hard problems such as machine scheduling, bin packing,
Theory of Computation. Introduction to The Course Lectures: Room ( Sun. & Tue.: 8 am – 9:30 am) Instructor: Dr. Ayman Srour (Ph.D. in Computer Science).
CSC 108H: Introduction to Computer Programming Summer 2011 Marek Janicki.
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
RAIK 283 Data Structures and Algorithms
CSE15 Discrete Mathematics 03/06/17
Lecture 1 (Part 1) Introduction/Overview Tuesday, 9/9/08
Formal Foundations-II [Theory of Automata]
Applied Cryptography Main goal
Introduction to the Theory of Computation
Evaluating Algebraic Expressions
CSE 311 Foundations of Computing I
1.5 Intractable problems.
Public Key Encryption and the RSA Algorithm
Unsolvable Problems December 4, 2017.
CS154, Lecture 18:.
Roadmap to Programming work, right, fast KISS
CS416 Compiler Design lec00-outline September 19, 2018
Data Structures (CS212D) Overview & Review.
Notes Over 4.7 Solving an Equation Graphically
Subhash Khot Theory Group
Objective of This Course
Week # 1: Overview & Review
CS 583 Fall 2006 Analysis of Algorithms
Data Structures (CS212D) Overview & Review.
Quantum Computation and Information Chap 1 Intro and Overview: p 28-58
CS416 Compiler Design lec00-outline February 23, 2019
CSE 321 Discrete Structures
4-9问题的形式化描述.
Hard Problems Some problems are hard to solve.
Solving Systems Algebraically
Lecture One: Automata Theory Amjad Ali
Algorithms CSCI 235, Spring 2019 Lecture 37 The Halting Problem
Announcements Jack group member by Thursday!! Quiz-8? HW10
Week 11 - Wednesday CS221.
Presentation transcript:

CSE 417: Algorithms and Computational Complexity Winter 2001 Instructor: Paul Beame TA: Gidon Shavit

What the course is about Design of Algorithms design methods common or important types of problems how to analyze algorithms

What the course is about Computability Turing machines and ideal computers there are well-defined problems that even ideal computers can’t solve e.g. halting problem

What the course is about Complexity and NP-completeness simply being able to solve problems in principle is not enough algorithms must be efficient, too NP wide class of useful problems whose solutions can be easily checked but not necessarily found efficiently NP-completeness useful for understanding when problems are hard to solve

On hardness Cryptography (e.g. RSA, SSL in browsers) In principle Secret: p,q prime, say 512 bits each Public: n which equals pxq, 1024 bits In principle there is an algorithm that given n will find p and q by trying all 2512 possible p’s. In practice security of RSA depends on the fact that no efficient algorithm is known for this

Algorithms versus Machines We all know about Moore’s Law and the exponential improvements in hardware but... Example: Numerical linear algebra for weather prediction 1967-1987 7 orders of magnitude improvement in speed 3 orders of magnitude improvement in hardware 4 orders of magnitude improvement in algorithms

What you’ll have to do No programming Written homework assignments goals of the course are not nitty-gritty programming detail getting them right is of course very important but too time-consuming for the amount of material Written homework assignments English exposition and pseudo-code Analysis and argument as well as design Midterm & Final Exam

Rough Division of Time Algorithms (6 weeks) Analysis of Algorithms Basic Algorithmic Design Techniques Graph Algorithms Fast Fourier Transform Pattern Matching & Finite Automata Turing Machines & Computability (1.5 weeks) Complexity & NP-completeness (2 weeks) Improvements: N/5, (N-5a)/4, … => N^2 c = N-5a-4b loop on b only 0,…4, since 5 @4 cents can be replaced by 4 @ 5 cents [BUT may not work for more general denominations]