An introduction to the analysis of algorithms / (Record no. 12667)

MARC details
000 -LEADER
fixed length control field 04491nam a2200241Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250520102651.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250520s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780321905758
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA 76.9.A43 .S43 2013
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Sedgewick, Robert.
Relator term author
245 #3 - TITLE STATEMENT
Title An introduction to the analysis of algorithms /
Statement of responsibility, etc. Robert Sedgewick and Philippe Flajolet.
250 ## - EDITION STATEMENT
Edition statement Second edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Upper Saddle River, New Jersey :
Name of publisher, distributor, etc. Addision-Wesley Publishing Company,
Date of publication, distribution, etc. c2013
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 572 pages :
Other physical details illustrations ;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price amount USD57.61
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Ch. One Analysis of Algorithms -- 1.1. Why Analyze an Algorithm? -- 1.2. Theory of Algorithms -- 1.3. Analysis of Algorithms -- 1.4. Average-Case Analysis -- 1.5. Example: Analysis of Quicksort -- 1.6. Asymptotic Approximations -- 1.7. Distributions -- 1.8. Randomized Algorithms -- ch. Two Recurrence Relations -- 2.1. Basic Properties -- 2.2. First-Order Recurrences -- 2.3. Nonlinear First-Order Recurrences -- 2.4. Higher-Order Recurrences -- 2.5. Methods for Solving Recurrences -- 2.6. Binary Divide-and-Conquer Recurrences and Binary Numbers -- 2.7. General Divide-and-Conquer Recurrences -- ch. Three Generating Functions -- 3.1. Ordinary Generating Functions -- 3.2. Exponential Generating Functions -- 3.3. Generating Function Solution of Recurrences -- 3.4. Expanding Generating Functions -- 3.5. Transformations with Generating Functions -- 3.6. Functional Equations on Generating Functions -- 3.7. Solving the Quicksort Median-of-Three Recurrence with OGFs -- 3.8. Counting with Generating Functions -- 3.9. Probability Generating Functions -- 3.10. Bivariate Generating Functions -- 3.11. Special Functions -- ch. Four Asymptotic Approximations -- 4.1. Notation for Asymptotic Approximations -- 4.2. Asymptotic Expansions -- 4.3. Manipulating Asymptotic Expansions -- 4.4. Asymptotic Approximations of Finite Sums -- 4.5. Euler-Maclaurin Summation -- 4.6. Bivariate Asymptotics -- 4.7. Laplace Method -- 4.8."Normal" Examples from the Analysis of Algorithms -- 4.9."Poisson" Examples from the Analysis of Algorithms -- ch. Five Analytic Combinatorics -- 5.1. Formal Basis -- 5.2. Symbolic Method for Unlabelled Classes -- 5.3. Symbolic Method for Labelled Classes -- 5.4. Symbolic Method for Parameters -- 5.5. Generating Function Coefficient Asymptotics -- ch. Six Trees -- 6.1. Binary Trees -- 6.2. Forests and Trees -- 6.3.Combinatorial Equivalences to Trees and Binary Trees -- 6.4. Properties of Trees -- 6.5. Examples of Tree Algorithms -- 6.6. Binary Search Trees -- 6.7. Average Path Length in Catalan Trees -- 6.8. Path Length in Binary Search Trees -- 6.9. Additive Parameters of Random Trees -- 6.10. Height -- 6.11. Summary of Average-Case Results on Properties of Trees -- 6.12. Lagrange Inversion -- 6.13. Rooted Unordered Trees -- 6.14. Labelled Trees -- 6.15. Other Types of Trees -- ch. Seven Permutations -- 7.1. Basic Properties of Permutations -- 7.2. Algorithms on Permutations -- 7.3. Representations of Permutations -- 7.4. Enumeration Problems -- 7.5. Analyzing Properties of Permutations with CGFs -- 7.6. Inversions and Insertion Sorts -- 7.7. Left-to-Right Minima and Selection Sort -- 7.8. Cycles and In Situ Permutation -- 7.9. Extremal Parameters -- ch. Eight Strings and Tries -- 8.1. String Searching -- 8.2.Combinatorial Properties of Bitstrings -- 8.3. Regular Expressions -- 8.4. Finite-State Automata and the Knuth-Morris-Pratt Algorithm -- 8.5. Context-Free Grammars -- 8.6. Tries -- 8.7. Trie Algorithms -- 8.8.Combinatorial Properties of Tries -- 8.9. Larger Alphabets -- ch. Nine Words and Mappings -- 9.1. Hashing with Separate Chaining -- 9.2. The Balls-and-Urns Model and Properties of Words -- 9.3. Birthday Paradox and Coupon Collector Problem -- 9.4. Occupancy Restrictions and Extremal Parameters -- 9.5. Occupancy Distributions -- 9.6. Open Addressing Hashing -- 9.7. Mappings -- 9.8. Integer Factorization and Mappings.
520 ## - SUMMARY, ETC.
Summary, etc. Despite growing interest, basic information on methods and models for mathematically analyzing algorithms has rarely been directly accessible to practitioners, researchers, or students. An Introduction to the Analysis of Algorithms, Second Edition, organizes and presents that knowledge, fully introducing primary techniques and results in the field.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER ALGORITHMS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Machine Learning LRC - Main National University - Manila General Circulation 01/25/2016 Purchased - Amazon 57.61   GC QA 76.9.A43 .S43 2013 NULIB000010426 05/20/2025 c.1 05/20/2025 Books