Introduction to Algorithms, Second Edition
暂无分享,去创建一个
Ronald L. Rivest | Clifford Stein | Charles E. Leiserson | Thomas H. Cormen | R. Rivest | T. Cormen | C. Leiserson | C. Stein
[1] H. Whitney. On the Abstract Properties of Linear Dependence , 1935 .
[2] E. T.. An Introduction to the Theory of Numbers , 1946, Nature.
[3] Feller William,et al. An Introduction To Probability Theory And Its Applications , 1950 .
[4] J. Kruskal. On the shortest spanning subtree of a graph and the traveling salesman problem , 1956 .
[5] E. F. Moore,et al. Variable-length binary encodings , 1959 .
[6] Stephen Warshall,et al. A Theorem on Boolean Matrices , 1962, JACM.
[7] R. W. Floyd. Algorithm 245: Treesort , 1964, CACM.
[8] J. Edmonds. Paths, Trees, and Flowers , 1965, Canadian Journal of Mathematics - Journal Canadien de Mathematiques.
[9] A. J. Maria. A Remark on Stirling's Formula , 1965 .
[10] Stephen A. Cook,et al. Review: Alan Cobham, Yehoshua Bar-Hillel, The Intrinsic Computational Difficulty of Functions , 1969 .
[11] V. Strassen. Gaussian elimination is not optimal , 1969 .
[12] S. Winograd. ON THE ALGEBRAIC COMPLEXITY OF FUNCTIONS , 1970 .
[13] Stephen A. Cook,et al. The complexity of theorem-proving procedures , 1971, STOC.
[14] C. L. Liu,et al. Introduction to Combinatorial Mathematics. , 1971 .
[15] Robert E. Tarjan,et al. Depth-First Search and Linear Graph Algorithms , 1972, SIAM J. Comput..
[16] Fanica Gavril,et al. Algorithms for Minimum Coloring, Maximum Clique, Minimum Covering by Cliques, and Maximum Independent Set of a Chordal Graph , 1972, SIAM J. Comput..
[17] Ronald L. Graham,et al. An Efficient Algorithm for Determining the Convex Hull of a Finite Planar Set , 1972, Inf. Process. Lett..
[18] Robert W. Floyd,et al. Permuting Information in Idealized Two-Level Storage , 1972, Complexity of Computer Computations.
[19] Richard M. Karp,et al. Reducibility Among Combinatorial Problems , 1972, 50 Years of Integer Programming.
[20] Edward M. Reingold,et al. Binary search trees of bounded balance , 1972, SIAM J. Comput..
[21] Jeffrey D. Ullman,et al. Worst-case analysis of memory allocation algorithms , 1972, STOC.
[22] Ray A. Jarvis,et al. On the Identification of the Convex Hull of a Finite Set of Points in the Plane , 1973, Inf. Process. Lett..
[23] Manuel Blum,et al. Time Bounds for Selection , 1973, J. Comput. Syst. Sci..
[24] Richard M. Karp,et al. A n^5/2 Algorithm for Maximum Matchings in Bipartite Graphs , 1971, SWAT.
[25] A. V. Karzanov,et al. Determining the maximal flow in a network by the method of preflows , 1974 .
[26] Gary L. Miller,et al. Riemann's Hypothesis and tests for primality , 1975, STOC.
[27] László Lovász,et al. On the ratio of optimal integral and fractional covers , 1975, Discret. Math..
[28] Robert E. Tarjan,et al. Efficiency of a Good But Not Linear Set Union Algorithm , 1972, JACM.
[29] Oscar H. Ibarra,et al. Fast Approximation Algorithms for the Knapsack and Sum of Subset Problems , 1975, JACM.
[30] K. Chung,et al. Elementary Probability Theory with Stochastic Processes. , 1975 .
[31] J. Pollard. A monte carlo method for factorization , 1975 .
[32] Peter van Emde Boas,et al. Preserving order in a forest in less than logarithmic time , 1975, 16th Annual Symposium on Foundations of Computer Science (sfcs 1975).
[33] Michael L. Fredman,et al. New Bounds on the Complexity of the Shortest Path Problem , 1976, SIAM J. Comput..
[34] Donald E. Knuth,et al. Big Omicron and big Omega and big Theta , 1976, SIGA.
[35] Teofilo F. Gonzalez,et al. P-Complete Approximation Problems , 1976, J. ACM.
[36] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[37] Elwood S. Buffa,et al. Graph Theory with Applications , 1977 .
[38] Donald B. Johnson,et al. Efficient Algorithms for Shortest Paths in Sparse Networks , 1977, J. ACM.
[39] Allen Van Gelder,et al. Computer Algorithms: Introduction to Design and Analysis , 1978 .
[40] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[41] Mark R. Brown,et al. Implementation and Analysis of Binomial Queue Algorithms , 1978, SIAM J. Comput..
[42] Robert Sedgewick,et al. Implementing Quicksort programs , 1978, CACM.
[43] R. E. Bellman,et al. Review: Eugene L. Lawler, Combinatorial optimization: networks and matroids , 1978 .
[44] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[45] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[46] Douglas Comer,et al. Ubiquitous B-Tree , 1979, CSUR.
[47] Vasek Chvátal,et al. A Greedy Heuristic for the Set-Covering Problem , 1979, Math. Oper. Res..
[48] Richard P. Brent,et al. An improved Monte Carlo factorization algorithm , 1980 .
[49] Kenneth Steiglitz,et al. Combinatorial Optimization: Algorithms and Complexity , 1981 .
[50] László Lovász,et al. Mathematical Structures Underlying Greedy Algorithms , 1981, International Symposium on Fundamentals of Computation Theory.
[51] Andrew Chi-Chih Yao,et al. A Lower Bound to Finding Convex Hulls , 1981, JACM.
[52] János Komlós,et al. Storing a sparse table with O(1) worst case access time , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[53] J. Pasciak,et al. Computer solution of large sparse positive definite systems , 1982 .
[54] Michael Ben-Or,et al. Lower bounds for algebraic computation trees , 1983, STOC.
[55] Don H. Johnson,et al. Gauss and the history of the fast Fourier transform , 1984, IEEE ASSP Magazine.
[56] János Komlós. Linear Verification for Spanning Trees , 1984, FOCS.
[57] Jan van Leeuwen,et al. Worst-case Analysis of Set Union Algorithms , 1984, JACM.
[58] Robert E. Tarjan,et al. Fibonacci heaps and their uses in improved network optimization algorithms , 1984, JACM.
[59] B. Korte,et al. Greedoids - A Structural Framework for the Greedy Algorithm , 1984 .
[60] J. Crabbe. Wilf: Algorithms and Complexity , 1986 .
[61] Robert E. Tarjan,et al. Making data structures persistent , 1986, STOC '86.
[62] Robert E. Tarjan,et al. Efficient algorithms for finding minimum spanning trees in undirected and directed graphs , 1986, Comb..
[63] William H. Press,et al. Numerical Recipes: The Art of Scientific Computing , 1987 .
[64] Herbert Edelsbrunner,et al. Algorithms in Combinatorial Geometry , 1987, EATCS Monographs in Theoretical Computer Science.
[65] Micha Hofri,et al. Probabilistic Analysis of Algorithms , 1987, Texts and Monographs in Computer Science.
[66] Richard M. Karp,et al. Efficient Randomized Pattern-Matching Algorithms , 1987, IBM J. Res. Dev..
[67] Prabhakar Raghavan,et al. Randomized rounding: A technique for provably good algorithms and algorithmic proofs , 1985, Comb..
[68] Frank Thomson Leighton,et al. An approximate max-flow min-cut theorem for uniform multicommodity flow problems with applications to approximation algorithms , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[69] Robert E. Tarjan,et al. Relaxed heaps: an alternative to Fibonacci heaps with applications to parallel computation , 1988, CACM.
[70] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[71] Friedhelm Meyer auf der Heide,et al. Dynamic perfect hashing: upper and lower bounds , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[72] Robert E. Tarjan,et al. Network Flow Algorithms , 1989 .
[73] Robert E. Tarjan,et al. Improved Time Bounds for the Maximum Flow Problem Improved Time Bounds for the Maximum Flow Problem Improved Time Bounds for the Maximum Flow Problem , 2008 .
[74] William Pugh,et al. Skip Lists: A Probabilistic Alternative to Balanced Trees , 1989, WADS.
[75] Michael E. Saks,et al. The cell probe complexity of dynamic data structures , 1989, STOC '89.
[76] Noga Alon,et al. Generating Pseudo-Random Permutations and Maximum Flow Algorithms , 1990, Inf. Process. Lett..
[77] Kurt Mehlhorn,et al. Handbook of Theoretical Computer Science, Volume A: Algorithms and Complexity , 1990 .
[78] Kurt Mehlhorn,et al. Faster algorithms for the shortest path problem , 1990, JACM.
[79] D. Willard,et al. Trans-dichotomous algorithms for minimum spanning trees and shortest paths , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[80] Shirley Dex,et al. JR 旅客販売総合システム(マルス)における運用及び管理について , 1991 .
[81] Mark Allen Weiss,et al. Data structures and algorithm analysis in C , 1991 .
[82] David W. Krumme,et al. Gossiping in Minimal Time , 1992, SIAM J. Comput..
[83] C. Loan. Computational Frameworks for the Fast Fourier Transform , 1992 .
[84] Audra E. Kosh,et al. Linear Algebra and its Applications , 1992 .
[85] Dexter Kozen,et al. The Design and Analysis of Algorithms , 1991, Texts and Monographs in Computer Science.
[86] Robert E. Tarjan,et al. A faster deterministic maximum flow algorithm , 1992, SODA '92.
[87] Robert E. Tarjan,et al. Verification and Sensitivity Analysis of Minimum Spanning Trees in Linear Time , 1992, SIAM J. Comput..
[88] J. Pollard. Factoring with cubic integers , 1993 .
[89] Thomas H. Cormen,et al. Virtual memory for data-parallel computing , 1993 .
[90] David B. Shmoys,et al. Computing near-optimal solutions to combinatorial optimization problems , 1994, Combinatorial Optimization.
[91] Ravindra K. Ahuja,et al. Network Flows: Theory, Algorithms, and Applications , 1993 .
[92] Arne Andersson,et al. Balanced Search Trees Made Simple , 1993, WADS.
[93] Chao Lu,et al. Mathematics of Multidimensional Fourier Transform Algorithms , 1993 .
[94] Steven J. Phillips,et al. Online load balancing and network flow , 1993, STOC.
[95] Prabhakar Raghavan. Randomized Approximation Algorithms in Combinatorial Optimization , 1994, FSTTCS.
[96] Andrew V. Goldberg,et al. Shortest paths algorithms: Theory and experimental evaluation , 1994, SODA '94.
[97] Joseph O'Rourke,et al. Computational Geometry in C. , 1995 .
[98] Monika Henzinger,et al. Fully dynamic biconnectivity and transitive closure , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[99] Uri Zwick,et al. Selecting the median , 1995, SODA '95.
[100] Raimund Seidel,et al. On the All-Pairs-Shortest-Path Problem in Unweighted Undirected Graphs , 1995, J. Comput. Syst. Sci..
[101] Nimrod Megiddo,et al. Improved algorithms and analysis for secretary problems and generalizations , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[102] Philip N. Klein,et al. A randomized linear-time algorithm to find minimum spanning trees , 1995, JACM.
[103] Rajeev Raman,et al. Sorting in linear time? , 1995, STOC '95.
[104] Mike Paterson,et al. Progress in Selection , 1996, SWAT.
[105] J. R. Johnson,et al. Implementation of Strassen's Algorithm for Matrix Multiplication , 1996, Proceedings of the 1996 ACM/IEEE Conference on Supercomputing.
[106] Arne Andersson. Faster deterministic sorting and searching in linear space , 1996, Proceedings of 37th Conference on Foundations of Computer Science.
[107] Satish Rao,et al. Computing vertex connectivity: new bounds from old techniques , 1996, Proceedings of 37th Conference on Foundations of Computer Science.
[108] David P. Williamson,et al. Primal-Dual Approximation Algorithms for Integral Flow and Multicut in Trees, with Applications to Matching and Set Cover , 1993, ICALP.
[109] Susan R. Wilson. INTRODUCTION TO COMPUTATIONAL BIOLOGY: MAPS, SEQUENCES AND GENOMES. , 1996 .
[110] Dorit S. Hochba,et al. Approximation Algorithms for NP-Hard Problems , 1997, SIGA.
[111] Salvador Roura. An Improved Master Theorem for Divide-and-Conquer Recurrences , 1997, ICALP.
[112] Andrew V. Goldberg,et al. Buckets, heaps, lists, and monotone priority queues , 1997, SODA '97.
[113] Rakesh M. Verma. General Techniques for Analyzing Recursive Algorithms with Applications , 1997, SIAM J. Comput..
[114] Rajeev Raman,et al. Recent results on the single-source shortest paths problem , 1997, SIGA.
[115] Mikkel Thorup,et al. Faster deterministic sorting and priority queues in linear space , 1998, SODA '98.
[116] J. Ward,et al. Book Review: Proceedings of the Third International Conference on Spectral and High Order Methods@@@Book Review: An introduction to computational geometry for curves and surfaces@@@Book Review: The mathematics of surfaces@@@Book Review: Algorithmic number theory, Volume I: Efficient algorithms , 1998 .
[117] Robert J. Vanderbei,et al. Linear Programming: Foundations and Extensions , 1998, Kluwer international series in operations research and management service.
[118] Hans Jürgen Prömel,et al. Lectures on Proof Verification and Approximation Algorithms , 1998, Lecture Notes in Computer Science.
[119] Yinyu Ye,et al. Interior point algorithms: theory and analysis , 1997 .
[120] Sanjeev Arora,et al. Polynomial time approximation schemes for Euclidean traveling salesman and other geometric problems , 1998, JACM.
[121] Sanjeev Arora,et al. The approximability of NP-hard problems , 1998, STOC '98.
[122] M. Henzinger,et al. Randomized fully dynamic graph algorithms with polylogarithmic time per operation , 1999, JACM.
[123] M. Douglas McIlroy. A Killer Adversary for Quicksort , 1999, Softw. Pract. Exp..
[124] Alexander Schrijver,et al. Theory of linear and integer programming , 1986, Wiley-Interscience series in discrete mathematics and optimization.
[125] Uri Zwick,et al. All pairs shortest paths in undirected graphs with integer weights , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[126] Pavel A. Pevzner,et al. Computational molecular biology : an algorithmic approach , 2000 .
[127] Bernard Chazelle,et al. A minimum spanning tree algorithm with inverse-Ackermann type complexity , 2000, JACM.
[128] Russ Bubley,et al. Randomized algorithms , 1995, CSUR.
[129] Harold N. Gabow,et al. Path-based depth-first search for strong and biconnected components , 2000, Inf. Process. Lett..
[130] Yijie Han,et al. Improved fast integer sorting in linear space , 2001, SODA '01.
[131] Vijay V. Vazirani,et al. Approximation Algorithms , 2001, Springer Berlin Heidelberg.
[132] Matt Green. The Distribution of Pseudoprimes , 2003 .