Computational complexity theory/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Housekeeping Bot
No edit summary
Line 31: Line 31:
{{Bot-created_related_article_subpage}}
{{Bot-created_related_article_subpage}}
<!-- Remove the section above after copying links to the other sections. -->
<!-- Remove the section above after copying links to the other sections. -->
==Articles related by keyphrases (Bot populated)==
{{r|Mathematics}}
{{r|Nobel Prize}}
{{r|Content Management System}}

Revision as of 16:00, 31 July 2024

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Computational complexity theory.
See also changes related to Computational complexity theory, or pages that link to Computational complexity theory or to this page or whose text contains "Computational complexity theory".

Parent topics

Subtopics

Other related topics

Bot-suggested topics

Auto-populated based on Special:WhatLinksHere/Computational complexity theory. Needs checking by a human.

  • Algorithm [r]: A sequence of steps used to solve a problem. [e]
  • Asymmetric key cryptography [r]: A category of cryptographic techniques, which greatly simplify key management, which are based on mathematically related key pairs, such that the "public" key can be used to encrypt and be freely available, and only the holder of the "private" key can decrypt the message [e]
  • Big O notation [r]: Mathematical notation to express various upper bounds concerning asymptotic behaviour of functions, e.g. the complexity of algorithms in computer science. [e]
  • Brute force attack [r]: An attempt to break a cipher by trying all possible keys; long enough keys make this impractical. [e]
  • Complexity of algorithms [r]: How fast the execution time (or memory usage) increases as the data set to be processed grows. [e]
  • Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
  • Digital object identifier [r]: Unique label for a computer readable object that can be found on the internet, usually used in academic journals. [e]
  • Exponential growth [r]: Increase of a quantity x with time t according to the equation x = Kat, where K and a are constants, a is greater than 1, and K is greater than 0. [e]
  • Integrated circuit [r]: Miniaturized electronic circuit that has been manufactured in the surface of a thin substrate of semiconductor material. [e]
  • MPEG-1 [r]: One of the earliest practical standards for high quality, low bitrate audio and video compression; includes the MP3 audio format. [e]
  • Mathematics [r]: The study of quantities, structures, their relations, and changes thereof. [e]
  • NP complexity class [r]: Class of decision problems that can be solved in nondeterministic polynomial time or, equivalently, can be checked in polynomial time. [e]
  • Operations research [r]: A set of quantitative techniques for optimum decisionmaking, often with uncertainty, which were first used to solve military operational problems [e]
  • Pi (mathematical constant) [r]: Greek letter π and mathematical constant that is approximately equal to 3.14159. [e]

Articles related by keyphrases (Bot populated)