SlideShare a Scribd company logo
1 of 11
IMPORTANCE
• THEORY OF COMPUTATION LAYS A STRONG FOUNDATION FOR A LOT OF ABSTRACT AREAS OF COMPUTER
SCIENCE
• THEORY OF COMPUTATION IS A VERY CLOSE COUSIN OF ARTIFICIAL INTELLIGENCE THAN SAY
PROBABILITY OR COMPUTER VISION.
• TOC TEACHES YOU ABOUT THE ELEMENTARY WAYS IN WHICH A COMPUTER CAN BE MADE TO THINK.
• THERE IS A GREAT DEAL OF WORK THAT WAS MADE POSSIBLE IN THE AREA OF NATURAL LANGUAGE
PROCESSING THAT INVOLVED BUILDING FINITE STATE MACHINES ALSO KNOWN AS FINITE STATE
AUTOMATA
AREAS OF INTEREST
• ALGORITHMS
• COMPUTATION AND BIOLOGY
• COMPLEXITY THEORY
• CRYPTOGRAPHY AND INFORMATION SECURITY (CIS)
• DISTRIBUTED SYSTEM
• PARALLEL COMPUTING
• QUANTUM INFORMATION SCIENCE
ALGORITHM
• DIFFICULTY AND IMPORTANCE OF THE PROBLEMS THAT WE POSE TO COMPUTERS GROW, IT IS
CRUCIALLY IMPORTANT THAT WE DEVISE NEW MATHEMATICAL TOOLS TO ATTACK THEM.
• FIGURING OUT HOW BEST TO ALLOCATE SCARCE RESOURCES AMONG THOUSANDS PROBABILISTIC
INFORMATION.
COMPUTATION AND BIOLOGY
• FOCUSES ON DESIGNING ALGORITHMS TO GAIN BIOLOGICAL INSIGHTS FROM ADVANCES IN AUTOMATED
DATA COLLECTION AND THE SUBSEQUENT LARGE DATA SETS DRAWN FROM THEM.
• WORKS ON A DIVERSE SET OF PROBLEMS, INCLUDING COMPRESSIVE GENOMICS, NETWORK INFERENCE,
STRUCTURAL BIOINFORMATICS, GENOMIC PRIVACY, AND MEDICAL GENOMICS COLLABORATES CLOSELY
WITH BIOLOGISTS IN ORDER TO DESIGN EXPERIMENTS TO MAXIMALLY LEVERAGE THE POWER OF
COMPUTATION FOR BIOLOGICAL EXPLORATIONS.
COMPLEXITY THEORY
• WORK TO DEFINE THE POLYNOMIAL-TIME HIERARCHY IN 1973.
• FOCUSED ON CIRCUIT LOWER BOUNDS, INTERACTIVE PROOFS, AND PROBABILISTIC COMPUTATION.
CRYPTOGRAPHY AND INFORMATION
SECURITY (CIS)
• THE CIS GROUP SEEKS TO DEVELOP TECHNIQUES FOR SECURING TOMORROW'S GLOBAL INFORMATION
INFRASTRUCTURE BY EXPLORING THEORETICAL FOUNDATIONS, NEAR-TERM PRACTICAL APPLICATIONS,
AND LONG-RANGE SPECULATIVE RESEARCH.
• AIM TO UNDERSTAND THE THEORETICAL POWER OF CRYPTOGRAPHY AND THE PRACTICAL ENGINEERING
OF SECURE INFORMATION SYSTEMS, FROM APPROPRIATE DEFINITIONS AND PROOFS OF SECURITY,
THROUGH CRYPTOGRAPHIC ALGORITHM AND PROTOCOL DESIGN, TO IMPLEMENTATIONS OF REAL
APPLICATIONS WITH EASY-TO-USE SECURITY FEATURES.
DISTRIBUTED SYSTEM
• WORKS ON A WIDE RANGE OF PROBLEMS IN DISTRIBUTED COMPUTING THEORY. MUCH OF OUR WORK
STUDIES ALGORITHMS AND LOWER BOUNDS FOR TYPICAL PROBLEMS THAT ARISE IN DISTRIBUTED
SYSTEMS---LIKE RESOURCE ALLOCATION, IMPLEMENTING SHARED MEMORY ABSTRACTIONS, AND
RELIABLE COMMUNICATION
• THE FOCUS WAS ON RATHER STATIC WIRED SYSTEMS (SEE LYNCH'S BOOK ON DISTRIBUTED
ALGORITHMS). HOWEVER, IN THE PAST FEW YEARS, MOST OF OUR WORK HAS BEEN ON DYNAMIC
SYSTEMS, IN WHICH THE PARTICIPANTS MAY COME AND GO
PARALLEL COMPUTING
• THE MULTICORE ALGORITHMICS GROUP DEVELOPS TECHNIQUES FOR DESIGNING, IMPLEMENTING, AND
REASONING ABOUT MULTIPROCESSOR ALGORITHMS FOR MULTICORE MACHINES AND THE
MATHEMATICAL FOUNDATIONS OF THE COMPUTATION MODELS THAT GOVERN THEIR BEHAVIOR.
• THE SUPERTECH RESEARCH GROUP INVESTIGATES THE TECHNOLOGIES THAT SUPPORT SCALABLE HIGH-
PERFORMANCE COMPUTING, INCLUDING HARDWARE, SOFTWARE, AND THEORY.
• THE APPLIED COMPUTING GROUP DESIGNS SOFTWARE FOR HIGH PERFORMANCE COMPUTING, DEVELOPS
ALGORITHMS FOR NUMERICAL LINEAR ALGEBRA AND RESEARCH RANDOM MATRIX THEORY AND ITS
APPLICATIONS.
QUANTUM INFORMATION SCIENCE
• PLAYED A CENTRAL ROLE IN LAUNCHING QUANTUM COMPUTING AND INFORMATION AS A FIELD OF STUDY.
• WORKS ON A VARIETY OF TOPICS IN QUANTUM INFORMATION THEORY AND QUANTUM ALGORITHMS.
• FOCUSES ON THE LIMITS OF QUANTUM COMPUTERS, AND MORE GENERALLY, ON THE INTERFACE BETWEEN
COMPUTATIONAL COMPLEXITY THEORY AND PHYSICS.
THANK YOU




More Related Content

What's hot

Introduction to Parallel Computing
Introduction to Parallel ComputingIntroduction to Parallel Computing
Introduction to Parallel ComputingRoshan Karunarathna
 
Vliw and superscaler
Vliw and superscalerVliw and superscaler
Vliw and superscalerRafi Dar
 
Lecture 1 (distributed systems)
Lecture 1 (distributed systems)Lecture 1 (distributed systems)
Lecture 1 (distributed systems)Fazli Amin
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system modelHarshad Umredkar
 
Lecture 2 more about parallel computing
Lecture 2   more about parallel computingLecture 2   more about parallel computing
Lecture 2 more about parallel computingVajira Thambawita
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer servicesMelvin Cabatuan
 
Data Structure and Algorithms.pptx
Data Structure and Algorithms.pptxData Structure and Algorithms.pptx
Data Structure and Algorithms.pptxSyed Zaid Irshad
 
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...Majid Hajibaba
 
Lecture 1 introduction to parallel and distributed computing
Lecture 1   introduction to parallel and distributed computingLecture 1   introduction to parallel and distributed computing
Lecture 1 introduction to parallel and distributed computingVajira Thambawita
 
Publish subscribe model overview
Publish subscribe model overviewPublish subscribe model overview
Publish subscribe model overviewIshraq Al Fataftah
 
Centralized shared memory architectures
Centralized shared memory architecturesCentralized shared memory architectures
Centralized shared memory architecturesGokuldhev mony
 

What's hot (20)

Parallel processing
Parallel processingParallel processing
Parallel processing
 
Vxworks
VxworksVxworks
Vxworks
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Introduction to Parallel Computing
Introduction to Parallel ComputingIntroduction to Parallel Computing
Introduction to Parallel Computing
 
Vliw and superscaler
Vliw and superscalerVliw and superscaler
Vliw and superscaler
 
Lecture 1 (distributed systems)
Lecture 1 (distributed systems)Lecture 1 (distributed systems)
Lecture 1 (distributed systems)
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
 
Lecture 2 more about parallel computing
Lecture 2   more about parallel computingLecture 2   more about parallel computing
Lecture 2 more about parallel computing
 
Left recursion
Left recursionLeft recursion
Left recursion
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Data Structure and Algorithms.pptx
Data Structure and Algorithms.pptxData Structure and Algorithms.pptx
Data Structure and Algorithms.pptx
 
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
 
Amdahl`s law -Processor performance
Amdahl`s law -Processor performanceAmdahl`s law -Processor performance
Amdahl`s law -Processor performance
 
Code generation
Code generationCode generation
Code generation
 
Lecture 1 introduction to parallel and distributed computing
Lecture 1   introduction to parallel and distributed computingLecture 1   introduction to parallel and distributed computing
Lecture 1 introduction to parallel and distributed computing
 
Publish subscribe model overview
Publish subscribe model overviewPublish subscribe model overview
Publish subscribe model overview
 
Centralized shared memory architectures
Centralized shared memory architecturesCentralized shared memory architectures
Centralized shared memory architectures
 
Expert system
Expert systemExpert system
Expert system
 
Hypervisor
HypervisorHypervisor
Hypervisor
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 

Similar to Importance of theory of computation

Artificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyArtificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyPetar Radanliev
 
Data analytics for engineers- introduction
Data analytics for engineers-  introductionData analytics for engineers-  introduction
Data analytics for engineers- introductionRINUSATHYAN
 
[Keynote] predictive technologies and the prediction of technology - Bob Will...
[Keynote] predictive technologies and the prediction of technology - Bob Will...[Keynote] predictive technologies and the prediction of technology - Bob Will...
[Keynote] predictive technologies and the prediction of technology - Bob Will...PAPIs.io
 
Automated identification of sensitive information
Automated identification of sensitive informationAutomated identification of sensitive information
Automated identification of sensitive informationJeff Long
 
Elastic Software Infrastructure to Support the Industrial Internet
Elastic Software Infrastructure to Support the Industrial InternetElastic Software Infrastructure to Support the Industrial Internet
Elastic Software Infrastructure to Support the Industrial InternetReal-Time Innovations (RTI)
 
Open challenges of current IoT simulators and testbeds
Open challenges of current IoT simulators and testbedsOpen challenges of current IoT simulators and testbeds
Open challenges of current IoT simulators and testbedsATMOSPHERE .
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesHongseok Kim
 
Mediating with Technology.: Opportunities and Risks
Mediating with Technology.: Opportunities and RisksMediating with Technology.: Opportunities and Risks
Mediating with Technology.: Opportunities and RisksNicole Garton
 
Democratizing Science through Cyberinfrastructure - Manish Parashar
Democratizing Science through Cyberinfrastructure - Manish ParasharDemocratizing Science through Cyberinfrastructure - Manish Parashar
Democratizing Science through Cyberinfrastructure - Manish ParasharLarry Smarr
 
International journal of engineering issues vol 2015 - no 2 - paper4
International journal of engineering issues   vol 2015 - no 2 - paper4International journal of engineering issues   vol 2015 - no 2 - paper4
International journal of engineering issues vol 2015 - no 2 - paper4sophiabelthome
 
Towards Joint Doctrine for Military Informatics
Towards Joint Doctrine for Military InformaticsTowards Joint Doctrine for Military Informatics
Towards Joint Doctrine for Military InformaticsBarry Smith
 
Towards Joint Doctrine for Military Informatics
Towards Joint Doctrine for Military InformaticsTowards Joint Doctrine for Military Informatics
Towards Joint Doctrine for Military InformaticsBarry Smith
 
Research in the Age of the Context Machine
Research in the Age of the Context MachineResearch in the Age of the Context Machine
Research in the Age of the Context MachineCarsten Keßler
 

Similar to Importance of theory of computation (20)

Security
SecuritySecurity
Security
 
ΕΛΙΣΜΕ 20181108 Νικήτας Νικητάκος «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέ...
ΕΛΙΣΜΕ 20181108 Νικήτας Νικητάκος «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέ...ΕΛΙΣΜΕ 20181108 Νικήτας Νικητάκος «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέ...
ΕΛΙΣΜΕ 20181108 Νικήτας Νικητάκος «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέ...
 
Herklotz - Information Operations and Security - Spring Review 2013
Herklotz - Information Operations and Security - Spring Review 2013Herklotz - Information Operations and Security - Spring Review 2013
Herklotz - Information Operations and Security - Spring Review 2013
 
lecture2-intro-of-CPS.pdf
lecture2-intro-of-CPS.pdflecture2-intro-of-CPS.pdf
lecture2-intro-of-CPS.pdf
 
Artificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum CryptographyArtificial Intelligence and Quantum Cryptography
Artificial Intelligence and Quantum Cryptography
 
Data analytics for engineers- introduction
Data analytics for engineers-  introductionData analytics for engineers-  introduction
Data analytics for engineers- introduction
 
[Keynote] predictive technologies and the prediction of technology - Bob Will...
[Keynote] predictive technologies and the prediction of technology - Bob Will...[Keynote] predictive technologies and the prediction of technology - Bob Will...
[Keynote] predictive technologies and the prediction of technology - Bob Will...
 
Automated identification of sensitive information
Automated identification of sensitive informationAutomated identification of sensitive information
Automated identification of sensitive information
 
Elastic Software Infrastructure to Support the Industrial Internet
Elastic Software Infrastructure to Support the Industrial InternetElastic Software Infrastructure to Support the Industrial Internet
Elastic Software Infrastructure to Support the Industrial Internet
 
Open challenges of current IoT simulators and testbeds
Open challenges of current IoT simulators and testbedsOpen challenges of current IoT simulators and testbeds
Open challenges of current IoT simulators and testbeds
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy Issues
 
Semantic Technologies for Big Sciences including Astrophysics
Semantic Technologies for Big Sciences including AstrophysicsSemantic Technologies for Big Sciences including Astrophysics
Semantic Technologies for Big Sciences including Astrophysics
 
Mediating with Technology.: Opportunities and Risks
Mediating with Technology.: Opportunities and RisksMediating with Technology.: Opportunities and Risks
Mediating with Technology.: Opportunities and Risks
 
Introduction to Computing Logic Formulation
Introduction to Computing Logic FormulationIntroduction to Computing Logic Formulation
Introduction to Computing Logic Formulation
 
Democratizing Science through Cyberinfrastructure - Manish Parashar
Democratizing Science through Cyberinfrastructure - Manish ParasharDemocratizing Science through Cyberinfrastructure - Manish Parashar
Democratizing Science through Cyberinfrastructure - Manish Parashar
 
International journal of engineering issues vol 2015 - no 2 - paper4
International journal of engineering issues   vol 2015 - no 2 - paper4International journal of engineering issues   vol 2015 - no 2 - paper4
International journal of engineering issues vol 2015 - no 2 - paper4
 
Soft Systems Methodology
Soft Systems MethodologySoft Systems Methodology
Soft Systems Methodology
 
Towards Joint Doctrine for Military Informatics
Towards Joint Doctrine for Military InformaticsTowards Joint Doctrine for Military Informatics
Towards Joint Doctrine for Military Informatics
 
Towards Joint Doctrine for Military Informatics
Towards Joint Doctrine for Military InformaticsTowards Joint Doctrine for Military Informatics
Towards Joint Doctrine for Military Informatics
 
Research in the Age of the Context Machine
Research in the Age of the Context MachineResearch in the Age of the Context Machine
Research in the Age of the Context Machine
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Importance of theory of computation

  • 1.
  • 2. IMPORTANCE • THEORY OF COMPUTATION LAYS A STRONG FOUNDATION FOR A LOT OF ABSTRACT AREAS OF COMPUTER SCIENCE • THEORY OF COMPUTATION IS A VERY CLOSE COUSIN OF ARTIFICIAL INTELLIGENCE THAN SAY PROBABILITY OR COMPUTER VISION. • TOC TEACHES YOU ABOUT THE ELEMENTARY WAYS IN WHICH A COMPUTER CAN BE MADE TO THINK. • THERE IS A GREAT DEAL OF WORK THAT WAS MADE POSSIBLE IN THE AREA OF NATURAL LANGUAGE PROCESSING THAT INVOLVED BUILDING FINITE STATE MACHINES ALSO KNOWN AS FINITE STATE AUTOMATA
  • 3. AREAS OF INTEREST • ALGORITHMS • COMPUTATION AND BIOLOGY • COMPLEXITY THEORY • CRYPTOGRAPHY AND INFORMATION SECURITY (CIS) • DISTRIBUTED SYSTEM • PARALLEL COMPUTING • QUANTUM INFORMATION SCIENCE
  • 4. ALGORITHM • DIFFICULTY AND IMPORTANCE OF THE PROBLEMS THAT WE POSE TO COMPUTERS GROW, IT IS CRUCIALLY IMPORTANT THAT WE DEVISE NEW MATHEMATICAL TOOLS TO ATTACK THEM. • FIGURING OUT HOW BEST TO ALLOCATE SCARCE RESOURCES AMONG THOUSANDS PROBABILISTIC INFORMATION.
  • 5. COMPUTATION AND BIOLOGY • FOCUSES ON DESIGNING ALGORITHMS TO GAIN BIOLOGICAL INSIGHTS FROM ADVANCES IN AUTOMATED DATA COLLECTION AND THE SUBSEQUENT LARGE DATA SETS DRAWN FROM THEM. • WORKS ON A DIVERSE SET OF PROBLEMS, INCLUDING COMPRESSIVE GENOMICS, NETWORK INFERENCE, STRUCTURAL BIOINFORMATICS, GENOMIC PRIVACY, AND MEDICAL GENOMICS COLLABORATES CLOSELY WITH BIOLOGISTS IN ORDER TO DESIGN EXPERIMENTS TO MAXIMALLY LEVERAGE THE POWER OF COMPUTATION FOR BIOLOGICAL EXPLORATIONS.
  • 6. COMPLEXITY THEORY • WORK TO DEFINE THE POLYNOMIAL-TIME HIERARCHY IN 1973. • FOCUSED ON CIRCUIT LOWER BOUNDS, INTERACTIVE PROOFS, AND PROBABILISTIC COMPUTATION.
  • 7. CRYPTOGRAPHY AND INFORMATION SECURITY (CIS) • THE CIS GROUP SEEKS TO DEVELOP TECHNIQUES FOR SECURING TOMORROW'S GLOBAL INFORMATION INFRASTRUCTURE BY EXPLORING THEORETICAL FOUNDATIONS, NEAR-TERM PRACTICAL APPLICATIONS, AND LONG-RANGE SPECULATIVE RESEARCH. • AIM TO UNDERSTAND THE THEORETICAL POWER OF CRYPTOGRAPHY AND THE PRACTICAL ENGINEERING OF SECURE INFORMATION SYSTEMS, FROM APPROPRIATE DEFINITIONS AND PROOFS OF SECURITY, THROUGH CRYPTOGRAPHIC ALGORITHM AND PROTOCOL DESIGN, TO IMPLEMENTATIONS OF REAL APPLICATIONS WITH EASY-TO-USE SECURITY FEATURES.
  • 8. DISTRIBUTED SYSTEM • WORKS ON A WIDE RANGE OF PROBLEMS IN DISTRIBUTED COMPUTING THEORY. MUCH OF OUR WORK STUDIES ALGORITHMS AND LOWER BOUNDS FOR TYPICAL PROBLEMS THAT ARISE IN DISTRIBUTED SYSTEMS---LIKE RESOURCE ALLOCATION, IMPLEMENTING SHARED MEMORY ABSTRACTIONS, AND RELIABLE COMMUNICATION • THE FOCUS WAS ON RATHER STATIC WIRED SYSTEMS (SEE LYNCH'S BOOK ON DISTRIBUTED ALGORITHMS). HOWEVER, IN THE PAST FEW YEARS, MOST OF OUR WORK HAS BEEN ON DYNAMIC SYSTEMS, IN WHICH THE PARTICIPANTS MAY COME AND GO
  • 9. PARALLEL COMPUTING • THE MULTICORE ALGORITHMICS GROUP DEVELOPS TECHNIQUES FOR DESIGNING, IMPLEMENTING, AND REASONING ABOUT MULTIPROCESSOR ALGORITHMS FOR MULTICORE MACHINES AND THE MATHEMATICAL FOUNDATIONS OF THE COMPUTATION MODELS THAT GOVERN THEIR BEHAVIOR. • THE SUPERTECH RESEARCH GROUP INVESTIGATES THE TECHNOLOGIES THAT SUPPORT SCALABLE HIGH- PERFORMANCE COMPUTING, INCLUDING HARDWARE, SOFTWARE, AND THEORY. • THE APPLIED COMPUTING GROUP DESIGNS SOFTWARE FOR HIGH PERFORMANCE COMPUTING, DEVELOPS ALGORITHMS FOR NUMERICAL LINEAR ALGEBRA AND RESEARCH RANDOM MATRIX THEORY AND ITS APPLICATIONS.
  • 10. QUANTUM INFORMATION SCIENCE • PLAYED A CENTRAL ROLE IN LAUNCHING QUANTUM COMPUTING AND INFORMATION AS A FIELD OF STUDY. • WORKS ON A VARIETY OF TOPICS IN QUANTUM INFORMATION THEORY AND QUANTUM ALGORITHMS. • FOCUSES ON THE LIMITS OF QUANTUM COMPUTERS, AND MORE GENERALLY, ON THE INTERFACE BETWEEN COMPUTATIONAL COMPLEXITY THEORY AND PHYSICS.