算法分析与设计(双语)
霍红卫 Xidian University
检索结果共
个
1
UNION-FIND
1.1
Administration, Introduction, Dynamic connectivity
1.2
Quick find, Quick union, Improvements.
1.3
Application: Percolation
2
ANALYSIS OF ALGORITHMS
2.1
Introduction, Observations, Mathematical models
2.2
Order-of-growth classifications, Theory of algorithms, Memory
3
MERGESORT
3.1
Top-down mergesort, Bottom-up mergesort,
3.2
Sorting complexity, Comparators, Stability
4
QUICKSORT
4.1
Quicksort, Average-case analysis, Selection
4.2
Dijkstra 3-way partitioning, 3-way quicksort for duplicate keys
4.3
Engineering a systemsort
5
PRIORITY QUEUES
5.1
API and elementary implementations, Applications
5.2
Binary heaps, basic ops: Swim and Sink, Heapsort.
5.3
Application: event-driven simulation
6
SYMBOL TABLES
6.1
API and elementary implementations, Ordered operations
7
UNDIRECTED GRAPHS. DIRECTED GRAPHS
8
MINIMUM SPANNING TREES
8.1
Introduction, Greedy algorithm, Edge-weighted graph API
8.2
Kruskal's algorithm: correctness proof, implementation challenge
8.3
Prim's algorithm: proof of correctness, Implementation challenge.
8.4
Lazy implementation. Eager implementation
8.5
Scientific application: clustering
9
SHORTEST PATHS
9.1
APIs, Shortest-paths properties. Generic shortest-paths algorithm
9.2
Dijkstra's algorithm (Greedy): correctness proof, PQ implementation
9.3
Application: Map routing
9.4
Shortest paths in edge-weighted DAGs
9.5
Application: Seam carving
9.6
Applications: Parallel job scheduling, Critical path method
9.7
Shortest paths with negative weights: Bellman-Ford algorithm (DP)
9.8
Negative cycle application: Arbitrage detection
10
STRING SORTS
10.1
Strings in Java, key-indexed counting
10.2
LSD radix sort, MSD radix sort, 3-way radix quicksort
10.3
Suffix arrays (SA)
10.4
SA application: The Burrows-Wheeler transform (BWT)
11
DATA COMPRESSION
11.1
Introduction, run-length coding
11.2
Huffman compression, LZW compression
11.3
Compressed suffix arrays (CSA)
12
ALGORITHM DESIGN: REVIEW
12.1
Analysis of algorithms
12.2
Greedy, Divide-and-conquer, Dynamic programming
12.3
Network flow
12.4
Randomized algorithms
12.5
Intractability
上一页
下一页