Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1

Buy

The TITLE of Volume 4 is Combinatorial Algorithms, and when I proposed it I was strongly inclined to add a subtitle: The Kind of Programming I Like Best. Mv editors have decided to tone down such exuberance, but the fact remains that programs with a combinatorial flavor have always been my favorites.

On the other hand I've often been surprised to find that, in many people's minds, the word "combinatorial" is linked with computational difficulty. Indeed, Samuel Johnson, in his famous dictionary of the English language (1755), said that the corresponding noun "is now generally used in an ill sense." Colleagues tell me tales of woe, in which they report that "the combinatorics of the situation defeated us." Why is it that, for me, combinatorics arouses feelings of pure pleasure, yet for many others it evokes pure panic?

It's true that combinatorial problems are often associated with humongously large numbers. Johnson's dictionary entry also included a quote from Ephraim Chambers, who had stated that the total number of words of length 24 or less,  in a 24-letter alphabet, is 1,391,724,288,887,252,999,425,128,493,402,200. Thecorresponding number for a 10-letter alphabet is 11.111,111.110; and it's only 3905 when the number of letters is 5. Thus a "combinatorial explosion" certainly does occur as the size of the problem grows from 5 to 10 to 24 and beyond.

 

The book is Volume 4A, because Volume 4 has itself become a multivolume undertaking. Combinatorial searching is a rich and important topic, and Knuth has too much to say about it that is new, interesting, and useful to fit into a single volume, or two, or maybe even three. This book alone includes approximately 1500 exercises, with answers for self-study, plus hundreds of useful facts that cannot be found in any other publication. Volume 4A surely belongs beside the first three volumes of this classic work in every serious programmer’s library.

(HTML tags aren't allowed.)

InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Pattern Cutting for Clothing Using CAD: How to Use Lectra Modaris Pattern Cutting Software (Woodhead Publishing Series in Textiles)
Pattern Cutting for Clothing Using CAD: How to Use Lectra Modaris Pattern Cutting Software (Woodhead Publishing Series in Textiles)

The invention of computer aided design (CAD) has revolutionised pattern cutting for clothing. Lectra’s Modaris pattern cutting software is a key tool in pattern production. Using a practical approach and clear examples throughout, Pattern cutting for clothing using CAD is an essential guide for all users of Lectra Modaris.
...

Microsoft C# Professional Projects
Microsoft C# Professional Projects
Use C# to accomplish real-world, professional tasks. C# Professional Projects is your key to unlocking the power of C#. Each project focuses on a specific concept and is based on a real-world situation. Enhance your skills as you work through six projects including creating a customer maintenance system, an employee record system, a creative...

Applied Statistics and Probability for Engineers
Applied Statistics and Probability for Engineers

Real Engineering Situations, Real Engineering Data

With Montgomery and Runger’s best-selling engineering statistics text, you can learn how to apply statistics to real engineering situations. The text shows you how to use statistical methods to design and develop new products, and new manufacturing...

The Essential New Manager's Kit
The Essential New Manager's Kit

If you are a new manager, you know that stepping onto the management career ladder means added responsibilities, heavy workloads, new business challenges, and high expectations. These certainties, combined with little training or formal management education, can make for dramatic workplace pitfalls.

This essential go-to reference is...

Snort for Dummies
Snort for Dummies
Find out how to foil an attack on your network

Choose the right way to deploy and configure Snort — no experience required!

Who knows what evil is poking around your network perimeter? Snort will sniff out worms, system crackers, and other bad guys, and this friendly guide helps you...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy