Abstract
Consulting dating on-line sites, or adopting greedy algorithms, exhaustive search, approximation, and random search are some of the strategies that can be used to find a soulmate. We discuss techniques and show true life examples, leaving the choice of selecting the most satisfactory method to the reader interested in such an activity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The relationship between Martin’s conduct and computability theory was pointed out for the first time in [5].
- 2.
If I won’t find her / who is so beautiful / I will settle for / finding her sister ...
References
Big Data and Relationships: Is there a secret Algorithm for Love? The Big Data Landscape. http://www.bigdatalandscape.com/blog/big-data-relationships-secret-algorithm-love
Crescenzi, P.: Firenze. http://www.editelonline.it/222337-1/incontri-in-corso-agenzia-per-single-di-pierluigi-crescenzi-agenzie-matrimoniali.html
Kundera, M.: Laughable Loves. Faber and Faber, London (2000)
Luccio, F., Pagli, L.: Algoritmi divinità e gente comune. ETS, Pisa (1999)
Cutolo, R., Cioffi, G.: Dove sta Zazà. Ed. Musicali Cioffi, Napoli (1944)
Kundera, M.: The Unbearable Lightness of Being. Faber and Faber, London (1984)
Zampa, L.: Bello, onesto, emigrato Australia sposerebbe compaesana illibata. CEIAD Columbia (1971)
Belli, G.: El pergamino de la seducción. Seix Barral, Barcelona (2005)
Reiner, R.: When Harry met Sally. Columbia Pictures (1989) (writer Nora Ephron)
Knuth, D.E.: Stable marriage and its relation to other combinatorial problems. In: CRM Proceedings and Lecture Notes, vol. 10. American Mathematical Society (1991)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Luccio, F., Pagli, L. (2015). Soulmate Algorithms. In: Bodei, C., Ferrari, G., Priami, C. (eds) Programming Languages with Applications to Biology and Security. Lecture Notes in Computer Science(), vol 9465. Springer, Cham. https://doi.org/10.1007/978-3-319-25527-9_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-25527-9_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25526-2
Online ISBN: 978-3-319-25527-9
eBook Packages: Computer ScienceComputer Science (R0)