[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
Computer Algorithms: Introduction to Design and AnalysisNovember 1999
Publisher:
  • Addison-Wesley Longman Publishing Co., Inc.
  • 75 Arlington Street, Suite 300 Boston, MA
  • United States
ISBN:978-0-201-61244-8
Published:01 November 1999
Pages:
688
Skip Bibliometrics Section
Reflects downloads up to 03 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

From the Publisher:

This edition features an increased emphasis on algorithm design techniques such as divide-and-conquer and greedy algorithms, along with the addition of new topics and exercises. It continues the tradition of solid mathematical analysis and clear writing style: emphasizes the development of algorithms through a step-by-step process rather than by merely presenting the end result; stresses the importance of the algorithm analysis process - continuously re-evaluating, modifying, and perhaps rejecting algorithms until a satisfactory solution is attained; provides extensive treatment of recursion with a clear, student-friendly review of how it works and why it is a valuable programming technique; uses a Java-like pseudocode; and includes an appendix with java examples.

Cited By

  1. ACM
    Muller O, Butman A and Butman M Opening a (Sliding) Window to Advanced Topics Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, (52-57)
  2. Li W, Chen X and Lu S (2017). Content synchronization using device-to-device communication in smart cities, Computer Networks: The International Journal of Computer and Telecommunications Networking, 120:C, (170-185), Online publication date: 19-Jun-2017.
  3. Hervert-Escobar L, Lpez-Ramos F and Esquivel-Flores O (2016). Integrated Approach to Assignment, Scheduling and Routing Problems in a Sales Territory Business Plan, Procedia Computer Science, 80:C, (1887-1896), Online publication date: 1-Jun-2016.
  4. Chung K, Kim S and Yu H An Efficient String Searching Algorithm Based on Occurrence Frequency and Pattern of Vowels and Consonants in a Pattern Revised Selected Papers, Part II, of the 5th International Conference on Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques - Volume 9243, (277-286)
  5. Vegdahl S (2014). Visualizing NP-completeness through circuit-based widgets, Journal of Computing Sciences in Colleges, 30:1, (190-198), Online publication date: 1-Oct-2014.
  6. ACM
    Serfass D and Tang P Comparing parallel performance of Go and C++ TBB on a direct acyclic task graph using a dynamic programming problem Proceedings of the 50th annual ACM Southeast Conference, (268-273)
  7. Quiroz Castellanos M, Cruz Reyes L, Torres-Jiménez J, Santillán C, Locés M, Ibarra J and Valdez G Improving the performance of heuristic algorithms based on causal inference Proceedings of the 10th Mexican international conference on Advances in Artificial Intelligence - Volume Part I, (137-148)
  8. Yang F and Kruggel F (2009). A graph matching approach for labeling brain sulci using location, orientation, and shape, Neurocomputing, 73:1-3, (179-190), Online publication date: 1-Dec-2009.
  9. Van Gelder A Verifying propositional unsatisfiability Proceedings of the 10th international conference on Theory and applications of satisfiability testing, (328-333)
  10. Archambault D, Munzner T and Auber D (2007). TopoLayout, IEEE Transactions on Visualization and Computer Graphics, 13:2, (305-317), Online publication date: 1-Mar-2007.
  11. Koutsoukos X, Kushwaha M, Amundson I, Neema S and Sztipanovits J OASiS Proceedings of the 13th Monterey conference on Composition of embedded systems: scientific and industrial issues, (125-149)
  12. Archambault D, Munzner T and Auber D (2006). Smashing Peacocks Further, IEEE Transactions on Visualization and Computer Graphics, 12:5, (813-820), Online publication date: 1-Sep-2006.
  13. Yu Y and Zhou Z A new approach to estimating the expected first hitting time of evolutionary algorithms Proceedings of the 21st national conference on Artificial intelligence - Volume 1, (555-560)
  14. Lobo A and Baliga G (2006). NP-completeness for all computer science undergraduates, Journal of Computing Sciences in Colleges, 21:6, (53-63), Online publication date: 1-Jun-2006.
  15. ACM
    Ayala-Rincón M, Llanos C, Jacobi R and Hartenstein R (2006). Prototyping time- and space-efficient computations of algebraic operations over dynamically reconfigurable systems modeled by rewriting-logic, ACM Transactions on Design Automation of Electronic Systems (TODAES), 11:2, (251-281), Online publication date: 1-Apr-2006.
  16. Zhu X, Tang B and Gupta H Delay efficient data gathering in sensor networks Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks, (380-389)
  17. Besta M and Stomp F (2005). A complete mechanization of correctness of a string-preprocessing algorithm, Formal Methods in System Design, 27:1-2, (5-27), Online publication date: 1-Sep-2005.
  18. Lingras P and Huang X (2005). Statistical, Evolutionary, and Neurocomputing Clustering Techniques, Artificial Intelligence Review, 23:1, (3-29), Online publication date: 1-Mar-2005.
  19. Sung K and Shirley P (2004). Algorithm analysis for returning adult students, Journal of Computing Sciences in Colleges, 20:2, (62-69), Online publication date: 1-Dec-2004.
  20. ACM
    van den Broek P and Noppen J (2004). Comparison of two approaches to dynamic programming, ACM SIGACT News, 35:4, (111-116), Online publication date: 1-Dec-2004.
  21. van der Poll J and Kotzé P Evaluating reasoning heuristics in the context of multi-level marketing structures Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries, (63-72)
  22. Phipatanasuphorn V and Ramanathan P (2004). Vulnerability of Sensor Networks to Unauthorized Traversal and Monitoring, IEEE Transactions on Computers, 53:3, (364-369), Online publication date: 1-Mar-2004.
  23. Clouqueur T, Ramanathan P and Saluja K Detecting unauthorized activities using a sensor network Wireless sensor networks, (375-398)
  24. ACM
    Brodal G and Fagerberg R On the limits of cache-obliviousness Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, (307-315)
  25. ACM
    Clouqueur T, Phipatanasuphorn V, Ramanathan P and Saluja K Sensor deployment strategy for target detection Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, (42-48)
Contributors
  • San Diego State University
  • University of California, Santa Cruz
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations