Handbook of Data Structures and Applications

CRC Press
1
Free sample

Although there are many advanced and specialized texts and handbooks on algorithms, until now there was no book that focused exclusively on the wide variety of data structures that have been reported in the literature. The Handbook of Data Structures and Applications responds to the needs of students, professionals, and researchers who need a mainstream reference on data structures by providing a comprehensive survey of data structures of various types.

Divided into seven parts, the text begins with a review of introductory material, followed by a discussion of well-known classes of data structures, Priority Queues, Dictionary Structures, and Multidimensional structures. The editors next analyze miscellaneous data structures, which are well-known structures that elude easy classification. The book then addresses mechanisms and tools that were developed to facilitate the use of data structures in real programs. It concludes with an examination of the applications of data structures.

The Handbook is invaluable in suggesting new ideas for research in data structures, and for revealing application contexts in which they can be deployed. Practitioners devising algorithms will gain insight into organizing data, allowing them to solve algorithmic problems more efficiently.
Read more
Collapse

About the author

Sartaj K. Sahni is Professor of Computer Science at the University of Minnesota. He has published over 90 research articles in design and analysis of efficient algorithms, parallel computing, interconnection networks, and design automation. He is co-author of Fundamentals of Data Structures and Fundamentals of Computer Algorithms and author of Concepts in Discreet Mathematics and Software Development of Pascal. He took his B. Tech in electrical engineering at the Indian Institute of Technology, Kanpur and his MS and PhD in computer science at Cornell University.

Read more
Collapse
4.0
1 total
Loading...

Additional Information

Publisher
CRC Press
Read more
Collapse
Published on
Oct 28, 2004
Read more
Collapse
Pages
1392
Read more
Collapse
ISBN
9781420035179
Read more
Collapse
Read more
Collapse
Best For
Read more
Collapse
Language
English
Read more
Collapse
Genres
Computers / Computer Science
Computers / General
Computers / Programming / Algorithms
Technology & Engineering / Electrical
Read more
Collapse
Content Protection
This content is DRM protected.
Read more
Collapse
Eligible for Family Library

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Genetic Programming Theory and Practice explores the emerging interaction between theory and practice in the cutting-edge, machine learning method of Genetic Programming (GP). The material contained in this contributed volume was developed from a workshop at the University of Michigan's Center for the Study of Complex Systems where an international group of genetic programming theorists and practitioners met to examine how GP theory informs practice and how GP practice impacts GP theory. The contributions cover the full spectrum of this relationship and are written by leading GP theorists from major universities, as well as active practitioners from leading industries and businesses. Chapters include such topics as John Koza's development of human-competitive electronic circuit designs; David Goldberg's application of "competent GA" methodology to GP; Jason Daida's discovery of a new set of factors underlying the dynamics of GP starting from applied research; and Stephen Freeland's essay on the lessons of biology for GP and the potential impact of GP on evolutionary theory.
The book also includes chapters on the dynamics of GP, the selection of operators and population sizing, specific applications such as stock selection in emerging markets, predicting oil field production, modeling chemical production processes, and developing new diagnostics from genomic data.
Genetic Programming Theory and Practice is an excellent reference for researchers working in evolutionary algorithms and for practitioners seeking innovative methods to solve difficult computing problems.
Physically unclonable functions (PUFs) are innovative physical security primitives that produce unclonable and inherent instance-specific measurements of physical objects; in many ways they are the inanimate equivalent of biometrics for human beings. Since they are able to securely generate and store secrets, they allow us to bootstrap the physical implementation of an information security system. In this book the author discusses PUFs in all their facets: the multitude of their physical constructions, the algorithmic and physical properties which describe them, and the techniques required to deploy them in security applications.

The author first presents an extensive overview and classification of PUF constructions, with a focus on so-called intrinsic PUFs. He identifies subclasses, implementation properties, and design techniques used to amplify submicroscopic physical distinctions into observable digital response vectors. He lists the useful qualities attributed to PUFs and captures them in descriptive definitions, identifying the truly PUF-defining properties in the process, and he also presents the details of a formal framework for deploying PUFs and similar physical primitives in cryptographic reductions. The author then describes a silicon test platform carrying different intrinsic PUF structures which was used to objectively compare their reliability, uniqueness, and unpredictability based on experimental data.

In the final chapters, the author explains techniques for PUF-based entity identification, entity authentication, and secure key generation. He proposes practical schemes that implement these techniques, and derives and calculates measures for assessing different PUF constructions in these applications based on the quality of their response statistics. Finally, he presents a fully functional prototype implementation of a PUF-based cryptographic key generator, demonstrating the full benefit of using PUFs and the efficiency of the processing techniques described.

This is a suitable introduction and reference for security researchers and engineers, and graduate students in information security and cryptography.

©2019 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.