Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of Computer Programming: Volume 3: Sorting and Searching (2nd Edition)


The bible of all fundamental algorithms and the work that taught many of today's software developers most of what they know about computer programming.


Byte, September 1995


I can't begin to tell you how many pleasurable hours of study and recreation they have afforded me! I have pored over them in cars, restaurants, at work, at home... and even at a Little League game when my son wasn't in the line-up.


–Charles Long


If you think you're a really good programmer... read [Knuth's] Art of Computer Programming... You should definitely send me a resume if you can read the whole thing.


–Bill Gates


It's always a pleasure when a problem is hard enough that you have to get the Knuths off the shelf. I find that merely opening one has a very useful terrorizing effect on computers.


–Jonathan Laventhol


The first revision of this third volume is the most comprehensive survey of classical computer techniques for sorting and searching. It extends the treatment of data structures in Volume 1 to consider both large and small databases and internal and external memories. The book contains a selection of carefully checked computer methods, with a quantitative analysis of their efficiency. Outstanding features of the second edition include a revised section on optimum sorting and new discussions of the theory of permutations and of universal hashing.


Ebook (PDF version) produced by Mathematical Sciences Publishers (MSP),http://msp.org


(HTML tags aren't allowed.)

Bootstrap for ASP.NET MVC
Bootstrap for ASP.NET MVC

Incorporate Bootstrap into your ASP.NET MVC projects and make your websites more user friendly and dynamic

About This Book

  • Grasp the intricacies of Bootstrap and how to use it with ASP.NET MVC
  • Build your own tools and helpers to assist you in creating ASP.NET MVC Bootstrap sites in an...
PC Magazine Windows Vista Security Solutions
PC Magazine Windows Vista Security Solutions
When you want to defend Windows Vista,it's good to know a PC Magazine expert

Unless a time machine just dropped you in the 21st century, you already know that protecting your computer is essential. Now, here's Vista—new enough that no one is sure exactly what security threats might arise to hijack your...

Socially Responsible IT Management
Socially Responsible IT Management
"A recommended read for all IT professionals and a must read for those in management."Tom Molnar, business systems analyst

"The combination of practicality, ease of implementation, and positive return on investment is what makes this book work so well. The easy-to-implement action steps makes dealing with these ten social

Selling Digital Music, Formatting Culture
Selling Digital Music, Formatting Culture
Selling Digital Music, Formatting Culture documents the transition of recorded music on CDs to music as digital files on computers. More than two decades after the first digital music files began circulating in online archives and playing through new software media players, we have yet to fully internalize the cultural and aesthetic...
What Moroccan Cinema?: A Historical and Critical Study, 1956D2006 (After the Empire: the Francophone World and Postcolonial France)
What Moroccan Cinema?: A Historical and Critical Study, 1956D2006 (After the Empire: the Francophone World and Postcolonial France)

From its early focus on documentary film and nation building to its more recent spotlight on contemporary culture and feature filmmaking, Moroccan cinema has undergone tremendous change since the country's independence in 1956. In What Moroccan Cinema? A Historical and Critical Study, 1956D2006, Sandra Gayle Carter chronicles the changes in...

Mastering Metasploit
Mastering Metasploit

With this book, you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert.

  • Develops Real World Approaches to Penetration testing using Metasploit
  • ...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy