Mastering Algorithms With C - Kyle Loudon [230]
computational geometry, Geometric Algorithms
computerized election, Data Encryption
concave polygon, Description of Convex Hulls, Questions and Answers
concavity of a function, Understanding the First and Second Derivative, Selecting an Initial Point for Newton's Method
conflict-serializability, Graphs
confusion principle, Description of DES
connected components, Description of Graphs
connected graphs, Description of Graphs
consistency of code, A Bit About Software Engineering
constant-time searches, Hash Tables
convex hulls, Geometric Algorithms, Description of Convex Hulls, Description of Convex Hulls, Description of Convex Hulls, Jarvis's March, Jarvis's March, Implementation and Analysis of Convex Hulls, Implementation and Analysis of Convex Hulls, Questions and Answers, Related Topics
chains, Jarvis's March
convex polygon, Description of Convex Hulls
description of, Description of Convex Hulls
Graham's scan, Related Topics
implementation and analysis of, Implementation and Analysis of Convex Hulls
Jarvis's march, Jarvis's March
smallest polygon, Questions and Answers
convex polygon, Description of Convex Hulls, Questions and Answers
count edges, Return Value
count runs, Questions and Answers
counting network hops, Graphs
counting sort, Sorting and Searching, Description of Counting Sort, Description of Counting Sort, Description of Counting Sort, Implementation and Analysis of Counting Sort, Description of Radix Sort
description of, Description of Counting Sort
implementation and analysis of, Implementation and Analysis of Counting Sort
in radix sort, Description of Radix Sort
stable attribute, Description of Counting Sort
cover function, Set Example: Set Covering
cryptographic algorithms, Data Encryption
cryptographic protocols, Related Topics
cryptography, Data Encryption (see data encryption)
cursors, Related Topics
curve fitting, Numerical Methods
cvxhull function, cvxhull, Implementation and Analysis of Convex Hulls
cycles, Description of Graphs
D
dags, Graphs (see directed acyclic graphs)
dangling pointers, Pointer Fundamentals
data compression, Data Compression, Data Compression, Data Compression, Data Compression, Data Compression, Data Compression, Data Compression, Data Compression, Data Compression, Data Compression, Data Compression, Description of Huffman Coding, Description of LZ77, Related Topics, Related Topics, Related Topics, Related Topics, Related Topics, Related Topics
adaptive Huffman coding, Related Topics
applications of, Data Compression
arithmetic coding, Related Topics
compression ratio, Data Compression
dictionary-based methods, Data Compression
entropy, Data Compression
Huffman coding, Description of Huffman Coding
Lempel-Ziv-1977 (LZ77), Description of LZ77
Lempel-Ziv-1978 (LZ78), Related Topics
Lempel-Ziv-Welch (LZW), Related Topics
lossless, Data Compression
lossy, Data Compression, Related Topics
minimum redundancy coding, Data Compression
Shannon-Fano coding, Related Topics
data correlation, Sets
data dictionaries, Hash Tables
data encryption, Data Encryption, Data Encryption, Description of DES, Description of RSA
applications of, Data Encryption
Data Encryption Standard (DES), Description of DES
Rivest-Shamir-Adleman (RSA), Description of RSA
Data Encryption Standard (DES), Data Encryption, Description of DES, Description of DES, Interface for DES, des_encipher, des_decipher, Implementation and Analysis of DES, DES Example: Block Cipher Modes, Questions and Answers, Questions and Answers
decipher function, des_decipher
description of, Description of DES
encipher function, des_encipher
example of, DES Example: Block Cipher Modes
implementation and analysis of, Implementation and Analysis of DES
interface for, Interface for DES
semiweak key pairs, Questions and Answers
weak keys, Questions and Answers
data hiding, A Bit About Software Engineering
data structures, Introduction, An Introduction to Data Structures, An Introduction to