PART 5: CHALLENGING DIFFICULT PROBLEMS
. . . . . . . . . . . . 281
CHAPTER 15:
Working with Greedy Algorithms
. . . . . . . . . . . . . . . . . . . . 283
Deciding When It Is Better to Be Greedy . . . . . . . . . . . . . . . . . . . . . . . .284
Understanding why greedy is good . . . . . . . . . . . . . . . . . . . . . . . . .285
Keeping greedy algorithms under control . . . . . . . . . . . . . . . . . . . .286
Considering NP complete problems . . . . . . . . . . . . . . . . . . . . . . . . .288
Finding Out How Greedy Can Be Useful . . . . . . . . . . . . . . . . . . . . . . . .290
Arranging cached computer data . . . . . . . . . . . . . . . . . . . . . . . . . . .290
Competing for resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .291
Revisiting Huffman coding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .294
Do'stlaringiz bilan baham: |