Unambiguous functions in logarithmic space - CiE 2009

Michael Soltys
Michael SoltysProfessor, Chair of the Department of Computer Science at California State University-Channel Islands em California State University-Channel Islands
Unambiguous Functions in Logarithmic Space
Grzegorz Herman Michael Soltys
Computability in Europe
July 21, 2009
The Context
The Context
nondeterminism for bounded space well understood. . .
The Context
nondeterminism for bounded space well understood. . .
except L vs. NL (since 2004, SL vs. NL)
The Context
nondeterminism for bounded space well understood. . .
except L vs. NL (since 2004, SL vs. NL)
unambiguity seems to be the most useful intermediate step
The Context
nondeterminism for bounded space well understood. . .
except L vs. NL (since 2004, SL vs. NL)
unambiguity seems to be the most useful intermediate step
a breakthrough due to Reinhardt and Allender (1997):
UL/poly = NL/poly
The Context
nondeterminism for bounded space well understood. . .
except L vs. NL (since 2004, SL vs. NL)
unambiguity seems to be the most useful intermediate step
a breakthrough due to Reinhardt and Allender (1997):
UL/poly = NL/poly
no major results since
Rationale
Rationale
want to measure relative (un)ambiguity of problems
Rationale
want to measure relative (un)ambiguity of problems
need a meaningful notion of unambiguous nondeterministic
reductions
Rationale
want to measure relative (un)ambiguity of problems
need a meaningful notion of unambiguous nondeterministic
reductions
need a well-behaved model for computing functions
Nondeterministic Function Classes: Existing Models
Nondeterministic Function Classes: Existing Models
multi-valued functions, or
Nondeterministic Function Classes: Existing Models
multi-valued functions, or
functions expressing properties of computation graphs
(e.g., #L, GapL), or
Nondeterministic Function Classes: Existing Models
multi-valued functions, or
functions expressing properties of computation graphs
(e.g., #L, GapL), or
deterministic computation with oracle queries
(e.g., FNL = FLNL).
Nondeterministic Function Classes: Our Model
Nondeterministic Function Classes: Our Model
nondeterministic machines with deterministic answers
Nondeterministic Function Classes: Our Model
nondeterministic machines with deterministic answers
oracle-based input and output
Nondeterministic Function Classes: Our Model
nondeterministic machines with deterministic answers
oracle-based input and output
explicit failures (uncatchable exceptions)
Nondeterministic Function Classes: Our Model
nondeterministic machines with deterministic answers
oracle-based input and output
explicit failures (uncatchable exceptions)
(un)ambiguity captured by the shape of computation graphs
Reductions: The Definition
Reductions: The Definition
A function φ : A → B reduces to ψ : C → D if there exist:
Reductions: The Definition
A function φ : A → B reduces to ψ : C → D if there exist:
uniformly unambiguous, parametrized family of input
transformations:
θi : A → C, and
Reductions: The Definition
A function φ : A → B reduces to ψ : C → D if there exist:
uniformly unambiguous, parametrized family of input
transformations:
θi : A → C, and
a function gathering the results on the transformed inputs:
ξ : D∗ → B,
Reductions: The Definition
A function φ : A → B reduces to ψ : C → D if there exist:
uniformly unambiguous, parametrized family of input
transformations:
θi : A → C, and
a function gathering the results on the transformed inputs:
ξ : D∗ → B, such that
ξ(ψ(θ0(x)), . . . , ψ(θp(|x|)(x))) = φ(x)
Reductions: An Example
Reductions: An Example
target problem: counting up to k simple paths
between s and t
Reductions: An Example
target problem: counting up to k simple paths
between s and t
reduced problem: counting up to k + 1 simple paths
between s and t
Reductions: An Example
target problem: counting up to k simple paths
between s and t
reduced problem: counting up to k + 1 simple paths
between s and t
restriction: class of graphs closed under edge removal
Other Benefits
Other Benefits
relating the ambiguity of computation
to that of the input graph
Other Benefits
relating the ambiguity of computation
to that of the input graph
(minor) improvements of known results
Other Benefits
relating the ambiguity of computation
to that of the input graph
(minor) improvements of known results
(e.g., combining [Allender, Reinhardt] with [Buntrock et al.])
Thank You!
1 de 34

Recomendados

Algorithms Lecture 7: Graph Algorithms por
Algorithms Lecture 7: Graph AlgorithmsAlgorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsBenha University
3.6K visualizações103 slides
Introduction to Algorithms and Asymptotic Notation por
Introduction to Algorithms and Asymptotic NotationIntroduction to Algorithms and Asymptotic Notation
Introduction to Algorithms and Asymptotic NotationAmrinder Arora
9.9K visualizações27 slides
Sdt por
SdtSdt
SdtPraveena Suresh Babu
393 visualizações16 slides
A star algorithms por
A star algorithmsA star algorithms
A star algorithmssandeep54552
762 visualizações14 slides
[Question Paper] Introduction To C++ Programming (Revised Course) [April / 2015] por
[Question Paper] Introduction To C++ Programming (Revised Course) [April / 2015][Question Paper] Introduction To C++ Programming (Revised Course) [April / 2015]
[Question Paper] Introduction To C++ Programming (Revised Course) [April / 2015]Mumbai B.Sc.IT Study
43 visualizações2 slides
[Question Paper] Object Oriented Programming With C++ (Revised Course) [Janua... por
[Question Paper] Object Oriented Programming With C++ (Revised Course) [Janua...[Question Paper] Object Oriented Programming With C++ (Revised Course) [Janua...
[Question Paper] Object Oriented Programming With C++ (Revised Course) [Janua...Mumbai B.Sc.IT Study
151 visualizações2 slides

Mais conteúdo relacionado

Mais procurados

Game Paper por
Game PaperGame Paper
Game PaperSiddharth Gupta
415 visualizações9 slides
Lecture8 syntax analysis_4 por
Lecture8 syntax analysis_4Lecture8 syntax analysis_4
Lecture8 syntax analysis_4Mahesh Kumar Chelimilla
165 visualizações23 slides
Lecture5 syntax analysis_1 por
Lecture5 syntax analysis_1Lecture5 syntax analysis_1
Lecture5 syntax analysis_1Mahesh Kumar Chelimilla
256 visualizações11 slides
Sen17513 winter2015-question-paper por
Sen17513 winter2015-question-paperSen17513 winter2015-question-paper
Sen17513 winter2015-question-papervaishali rane
47 visualizações4 slides
Lecture7 syntax analysis_3 por
Lecture7 syntax analysis_3Lecture7 syntax analysis_3
Lecture7 syntax analysis_3Mahesh Kumar Chelimilla
125 visualizações15 slides
A* algorithm por
A* algorithmA* algorithm
A* algorithmKomal Samdariya
634 visualizações18 slides

Mais procurados(20)

Game Paper por Siddharth Gupta
Game PaperGame Paper
Game Paper
Siddharth Gupta415 visualizações
Sen17513 winter2015-question-paper por vaishali rane
Sen17513 winter2015-question-paperSen17513 winter2015-question-paper
Sen17513 winter2015-question-paper
vaishali rane47 visualizações
A* algorithm por Komal Samdariya
A* algorithmA* algorithm
A* algorithm
Komal Samdariya634 visualizações
Algorithmic Notations por Muhammad Muzammal
Algorithmic NotationsAlgorithmic Notations
Algorithmic Notations
Muhammad Muzammal23.3K visualizações
The dag representation of basic blocks por Shabeen Taj
The dag representation of basic blocksThe dag representation of basic blocks
The dag representation of basic blocks
Shabeen Taj2.3K visualizações
Cs6660 compiler design may june 2017 answer key por appasami
Cs6660 compiler design may june 2017  answer keyCs6660 compiler design may june 2017  answer key
Cs6660 compiler design may june 2017 answer key
appasami3.8K visualizações
Directed Acyclic Graph Representation of basic blocks por Mohammad Vaseem Akaram
Directed Acyclic Graph Representation of basic blocksDirected Acyclic Graph Representation of basic blocks
Directed Acyclic Graph Representation of basic blocks
Mohammad Vaseem Akaram3.1K visualizações
Design and Analysis of Algorithms por Arvind Krishnaa
Design and Analysis of AlgorithmsDesign and Analysis of Algorithms
Design and Analysis of Algorithms
Arvind Krishnaa23.9K visualizações
Directed Acyclic Graph por AJAL A J
Directed Acyclic Graph Directed Acyclic Graph
Directed Acyclic Graph
AJAL A J6.5K visualizações
Context free grammar por Mohammad Ilyas Malik
Context free grammar Context free grammar
Context free grammar
Mohammad Ilyas Malik12.3K visualizações
Ch06 por Hankyo
Ch06Ch06
Ch06
Hankyo331 visualizações
[Question Paper] C++ and Java (Old Course) [June / 2014] por Mumbai B.Sc.IT Study
[Question Paper] C++ and Java (Old Course) [June / 2014][Question Paper] C++ and Java (Old Course) [June / 2014]
[Question Paper] C++ and Java (Old Course) [June / 2014]
Mumbai B.Sc.IT Study43 visualizações
Graph Traversal Algorithms - Depth First Search Traversal por Amrinder Arora
Graph Traversal Algorithms - Depth First Search TraversalGraph Traversal Algorithms - Depth First Search Traversal
Graph Traversal Algorithms - Depth First Search Traversal
Amrinder Arora6.4K visualizações
Math Functions in C Scanf Printf por yarkhosh
Math Functions in C Scanf PrintfMath Functions in C Scanf Printf
Math Functions in C Scanf Printf
yarkhosh58 visualizações
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka por Edureka!
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
Edureka!1.1K visualizações
Cs6660 compiler design november december 2016 Answer key por appasami
Cs6660 compiler design november december 2016 Answer keyCs6660 compiler design november december 2016 Answer key
Cs6660 compiler design november december 2016 Answer key
appasami4.4K visualizações

Destaque

The proof theoretic strength of the Steinitz exchange theorem - EACA 2006 por
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006Michael Soltys
904 visualizações25 slides
Intro to Cryptography por
Intro to CryptographyIntro to Cryptography
Intro to CryptographyMichael Soltys
1.2K visualizações45 slides
Games on Posets - CiE 2008 por
Games on Posets - CiE 2008Games on Posets - CiE 2008
Games on Posets - CiE 2008Michael Soltys
830 visualizações27 slides
A formal framework for Stringology por
A formal framework for StringologyA formal framework for Stringology
A formal framework for StringologyMichael Soltys
1.1K visualizações9 slides
La, permutations, and the hajós calculus - ICALP 2004 por
La, permutations, and the hajós calculus - ICALP 2004La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004Michael Soltys
735 visualizações34 slides
Fair ranking in competitive bidding procurement: a case analysis por
Fair ranking in competitive bidding procurement: a case analysisFair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysisMichael Soltys
952 visualizações26 slides

Destaque(18)

The proof theoretic strength of the Steinitz exchange theorem - EACA 2006 por Michael Soltys
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
Michael Soltys904 visualizações
Intro to Cryptography por Michael Soltys
Intro to CryptographyIntro to Cryptography
Intro to Cryptography
Michael Soltys1.2K visualizações
Games on Posets - CiE 2008 por Michael Soltys
Games on Posets - CiE 2008Games on Posets - CiE 2008
Games on Posets - CiE 2008
Michael Soltys830 visualizações
A formal framework for Stringology por Michael Soltys
A formal framework for StringologyA formal framework for Stringology
A formal framework for Stringology
Michael Soltys1.1K visualizações
La, permutations, and the hajós calculus - ICALP 2004 por Michael Soltys
La, permutations, and the hajós calculus - ICALP 2004La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004
Michael Soltys735 visualizações
Fair ranking in competitive bidding procurement: a case analysis por Michael Soltys
Fair ranking in competitive bidding procurement: a case analysisFair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysis
Michael Soltys952 visualizações
Feasible Combinatorial Matrix Theory - MFCS2013 por Michael Soltys
Feasible Combinatorial Matrix Theory - MFCS2013Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013
Michael Soltys1.7K visualizações
The Proof Complexity of Linear Algebra - LICS 2002 por Michael Soltys
The Proof Complexity of Linear Algebra - LICS 2002The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002
Michael Soltys903 visualizações
Feasible Combinatorial Matrix Theory - LICS2013 presentation por Michael Soltys
Feasible Combinatorial Matrix Theory - LICS2013 presentationFeasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentation
Michael Soltys1.2K visualizações
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006 por Michael Soltys
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
Michael Soltys1K visualizações
Perceptions of Foundational Knowledge by CS students - WCCCE 2012 por Michael Soltys
Perceptions of Foundational Knowledge by CS students - WCCCE 2012Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Michael Soltys763 visualizações
Algorithms on Strings por Michael Soltys
Algorithms on StringsAlgorithms on Strings
Algorithms on Strings
Michael Soltys1.6K visualizações
Boolean Programs and Quantified Propositional Proof System - por Michael Soltys
Boolean Programs and Quantified Propositional Proof System - Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System -
Michael Soltys2.1K visualizações
Forced repetitions over alphabet lists por Michael Soltys
Forced repetitions over alphabet listsForced repetitions over alphabet lists
Forced repetitions over alphabet lists
Michael Soltys805 visualizações
How Safe is your Data? por Michael Soltys
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
Michael Soltys1.1K visualizações
Circuit Complexity of Shuffle - IWOCA 2013 por Michael Soltys
Circuit Complexity of Shuffle - IWOCA 2013Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013
Michael Soltys958 visualizações
An algorithmic view of Computer Science por Michael Soltys
An algorithmic view of Computer ScienceAn algorithmic view of Computer Science
An algorithmic view of Computer Science
Michael Soltys1.4K visualizações
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005 por Michael Soltys
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
Michael Soltys961 visualizações

Similar a Unambiguous functions in logarithmic space - CiE 2009

Why functional programming and category theory strongly matters - Piotr Parad... por
Why functional programming and category theory strongly matters - Piotr Parad...Why functional programming and category theory strongly matters - Piotr Parad...
Why functional programming and category theory strongly matters - Piotr Parad...Scalac
77 visualizações231 slides
Why functional programming and category theory strongly matters por
Why functional programming and category theory strongly mattersWhy functional programming and category theory strongly matters
Why functional programming and category theory strongly mattersPiotr Paradziński
945 visualizações231 slides
From DOT to Dotty por
From DOT to DottyFrom DOT to Dotty
From DOT to DottyMartin Odersky
6.8K visualizações56 slides
Optimizing with persistent data structures (LLVM Cauldron 2016) por
Optimizing with persistent data structures (LLVM Cauldron 2016)Optimizing with persistent data structures (LLVM Cauldron 2016)
Optimizing with persistent data structures (LLVM Cauldron 2016)Igalia
627 visualizações52 slides
High-dimensional polytopes defined by oracles: algorithms, computations and a... por
High-dimensional polytopes defined by oracles: algorithms, computations and a...High-dimensional polytopes defined by oracles: algorithms, computations and a...
High-dimensional polytopes defined by oracles: algorithms, computations and a...Vissarion Fisikopoulos
32 visualizações79 slides
Winter 10 Undecidability.pptx por
Winter 10 Undecidability.pptxWinter 10 Undecidability.pptx
Winter 10 Undecidability.pptxHarisPrince
3 visualizações30 slides

Similar a Unambiguous functions in logarithmic space - CiE 2009(20)

Why functional programming and category theory strongly matters - Piotr Parad... por Scalac
Why functional programming and category theory strongly matters - Piotr Parad...Why functional programming and category theory strongly matters - Piotr Parad...
Why functional programming and category theory strongly matters - Piotr Parad...
Scalac77 visualizações
Why functional programming and category theory strongly matters por Piotr Paradziński
Why functional programming and category theory strongly mattersWhy functional programming and category theory strongly matters
Why functional programming and category theory strongly matters
Piotr Paradziński945 visualizações
From DOT to Dotty por Martin Odersky
From DOT to DottyFrom DOT to Dotty
From DOT to Dotty
Martin Odersky6.8K visualizações
Optimizing with persistent data structures (LLVM Cauldron 2016) por Igalia
Optimizing with persistent data structures (LLVM Cauldron 2016)Optimizing with persistent data structures (LLVM Cauldron 2016)
Optimizing with persistent data structures (LLVM Cauldron 2016)
Igalia627 visualizações
High-dimensional polytopes defined by oracles: algorithms, computations and a... por Vissarion Fisikopoulos
High-dimensional polytopes defined by oracles: algorithms, computations and a...High-dimensional polytopes defined by oracles: algorithms, computations and a...
High-dimensional polytopes defined by oracles: algorithms, computations and a...
Vissarion Fisikopoulos32 visualizações
Winter 10 Undecidability.pptx por HarisPrince
Winter 10 Undecidability.pptxWinter 10 Undecidability.pptx
Winter 10 Undecidability.pptx
HarisPrince3 visualizações
OXFORD'13 Optimising OWL 2 QL query rewriring por Mariano Rodriguez-Muro
OXFORD'13 Optimising OWL 2 QL query rewriringOXFORD'13 Optimising OWL 2 QL query rewriring
OXFORD'13 Optimising OWL 2 QL query rewriring
Mariano Rodriguez-Muro474 visualizações
Section5 Rbf por kylin
Section5 RbfSection5 Rbf
Section5 Rbf
kylin3.3K visualizações
What can scala puzzlers teach us por Daniel Sobral
What can scala puzzlers teach usWhat can scala puzzlers teach us
What can scala puzzlers teach us
Daniel Sobral1.4K visualizações
Under the hood of scala implicits (Scala eXchange 2014) por Alexander Podkhalyuzin
Under the hood of scala implicits (Scala eXchange 2014)Under the hood of scala implicits (Scala eXchange 2014)
Under the hood of scala implicits (Scala eXchange 2014)
Alexander Podkhalyuzin883 visualizações
Boyd 4.6, 4.7 por Koki Isokawa
Boyd 4.6, 4.7Boyd 4.6, 4.7
Boyd 4.6, 4.7
Koki Isokawa52 visualizações
20101017 program analysis_for_security_livshits_lecture02_compilers por Computer Science Club
20101017 program analysis_for_security_livshits_lecture02_compilers20101017 program analysis_for_security_livshits_lecture02_compilers
20101017 program analysis_for_security_livshits_lecture02_compilers
Computer Science Club264 visualizações
A1 11 functions por vhiggins1
A1 11 functionsA1 11 functions
A1 11 functions
vhiggins1441 visualizações
Distorted diffeomorphisms and path connectedness of Z^d actions on 1-manifolds por Andrius Navas
Distorted diffeomorphisms and path connectedness of Z^d actions on 1-manifoldsDistorted diffeomorphisms and path connectedness of Z^d actions on 1-manifolds
Distorted diffeomorphisms and path connectedness of Z^d actions on 1-manifolds
Andrius Navas71 visualizações
Regression_1.pdf por Amir Saleh
Regression_1.pdfRegression_1.pdf
Regression_1.pdf
Amir Saleh70 visualizações

Último

Design Driven Network Assurance por
Design Driven Network AssuranceDesign Driven Network Assurance
Design Driven Network AssuranceNetwork Automation Forum
19 visualizações42 slides
Network Source of Truth and Infrastructure as Code revisited por
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisitedNetwork Automation Forum
32 visualizações45 slides
Case Study Copenhagen Energy and Business Central.pdf por
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdfAitana
17 visualizações3 slides
HTTP headers that make your website go faster - devs.gent November 2023 por
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023Thijs Feryn
26 visualizações151 slides
Mini-Track: Challenges to Network Automation Adoption por
Mini-Track: Challenges to Network Automation AdoptionMini-Track: Challenges to Network Automation Adoption
Mini-Track: Challenges to Network Automation AdoptionNetwork Automation Forum
17 visualizações27 slides
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
317 visualizações86 slides

Último(20)

Network Source of Truth and Infrastructure as Code revisited por Network Automation Forum
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisited
Network Automation Forum32 visualizações
Case Study Copenhagen Energy and Business Central.pdf por Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana17 visualizações
HTTP headers that make your website go faster - devs.gent November 2023 por Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn26 visualizações
Mini-Track: Challenges to Network Automation Adoption por Network Automation Forum
Mini-Track: Challenges to Network Automation AdoptionMini-Track: Challenges to Network Automation Adoption
Mini-Track: Challenges to Network Automation Adoption
Network Automation Forum17 visualizações
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software317 visualizações
Scaling Knowledge Graph Architectures with AI por Enterprise Knowledge
Scaling Knowledge Graph Architectures with AIScaling Knowledge Graph Architectures with AI
Scaling Knowledge Graph Architectures with AI
Enterprise Knowledge50 visualizações
"Running students' code in isolation. The hard way", Yurii Holiuk por Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays24 visualizações
Info Session November 2023.pdf por AleksandraKoprivica4
Info Session November 2023.pdfInfo Session November 2023.pdf
Info Session November 2023.pdf
AleksandraKoprivica415 visualizações
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker48 visualizações
MVP and prioritization.pdf por rahuldharwal141
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdf
rahuldharwal14137 visualizações
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc72 visualizações
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum43 visualizações
SAP Automation Using Bar Code and FIORI.pdf por Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Virendra Rai, PMP25 visualizações
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... por James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson126 visualizações
virtual reality.pptx por G036GaikwadSnehal
virtual reality.pptxvirtual reality.pptx
virtual reality.pptx
G036GaikwadSnehal18 visualizações
Five Things You SHOULD Know About Postman por Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman38 visualizações
"Surviving highload with Node.js", Andrii Shumada por Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays33 visualizações
Evolving the Network Automation Journey from Python to Platforms por Network Automation Forum
Evolving the Network Automation Journey from Python to PlatformsEvolving the Network Automation Journey from Python to Platforms
Evolving the Network Automation Journey from Python to Platforms
Network Automation Forum17 visualizações

Unambiguous functions in logarithmic space - CiE 2009