Search alternatives:
conquer algorithm » control algorithm
cipher algorithm » filter algorithm, linear algorithm, faster algorithm
1
2
3
Subjects: ...QA75 Electronic computers. Computer science...
Get full text
Get full text
Get full text
Conference or Workshop Item
4
5
6
Subjects: ...QA75 Electronic computers. Computer science...
Get full text
Conference or Workshop Item
7
8
Published 2009
Table of Contents: ...I. Foundations. The role of algorithms in computing -- Getting started -- Growth of functions...
Book
9
by Kleinberg, Jon.
Published 2006
Table of Contents: ... algorithms -- Divide and conquer -- Dynamic programming -- Network flow -- NP and computational...
Book
10
... will determine the performance of an algorithm. A Divide-and-Conquer algorithm is the most efficient algorithm...
Get full text
Get full text
Get full text
Article
11
by Sedgewick, Robert, 1946-
Published 1992
Table of Contents: .... Perspective. 6. Analysis of Algorithms. Framework. Classification of Algorithms. Computational Complexity...
Book
12
Published 1999
Table of Contents: ... geometry I ; Computational geometry II / D.T. Lee -- Robot algorithms / Dan Halperin, Lydia Kavraki...
Book
13
by Miller, Russ.
Published 2005
Table of Contents: ... -- Models of computation -- Matrix operations -- Parallel prefix -- Pointer jumping -- Divide-and-conquer...
Book
14
Subjects: ...QA75 Electronic computers. Computer science...
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
15
16
Published 2000
Table of Contents: ... Filtering -- The Divide-and-Conquer Manifesto -- Sequential Sampling Techniques for Algorithmic Learning...
Book
17
by Hau, Yuan Wen
Published 2005
... is one of the critical aspects in majority of electronic communication and computer networks, especially...
Get full text
Get full text
Thesis
18
by Tat Wi, Charomie
Published 2010
..., Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better....
Get full text
Get full text
Undergraduates Project Papers
19
by Charomie, Tat Wi
Published 2010
... which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can...
Get full text
Get full text
Get full text
Undergraduates Project Papers
20
by Smith, Justin R.
Published 1993
Table of Contents: ... Algorithms. 7.2.2. The Brent Scheduling Principle. 7.2.3. Pipelining. 7.2.4. Divide and Conquer. 7.3. MIMD...
Book