LEADER 04716nam 2200541 a 450 001 9910260622203321 005 20241120174749.0 010 $a9780262313230 010 $a0262313235 010 $a9781299284272 010 $a1299284272 010 $a9780262313223 010 $a0262313227 035 $a(CaBNVSL)mat06482302 035 $a(IDAMS)0b00006481d03dcf 035 $a(IEEE)6482302 035 $a(MiAaPQ)EBC3339585 035 $a(PPN)181441217 035 $a(CKB)2560000000099628 035 $a(FR-PaCSA)88841784 035 $a(FRCYB88841784)88841784 035 $a(EXLCZ)992560000000099628 100 $a20121206d2013 uy 0 101 0 $aeng 135 $aur|n||||||||| 181 $2rdacontent 182 $2isbdmedia 183 $2rdacarrier 200 10$aAlgorithms unlocked /$fThomas H. Cormen 205 $a1st ed. 210 $aCambridge, Mass. $cMIT Press$d2013 215 $a1 PDF (xiii, 222 pages) $cillustrations 311 08$a9780262518802 311 08$a0262518805 320 $aIncludes bibliographical references and index. 327 $aIntro -- Contents -- Preface -- 1 What Are Algorithms and Why Should You Care? -- Correctness -- Resource usage -- Computer algorithms for non-computer people -- Computer algorithms for computer people -- Further reading -- 2 How to Describe and Evaluate Computer Algorithms -- How to describe computer algorithms -- How to characterize running times -- Loop invariants -- Recursion -- Further reading -- 3 Algorithms for Sorting and Searching -- Binary search -- Selection sort -- Insertion sort -- Merge sort -- Quicksort -- Recap -- Further reading -- 4 A Lower Bound for Sorting and How to Beat It -- Rules for sorting -- The lower bound on comparison sorting -- Beating the lower bound with counting sort -- Radix sort -- Further reading -- 5 Directed Acyclic Graphs -- Directed acyclic graphs -- Topological sorting -- How to represent a directed graph -- Running time of topological sorting -- Critical path in a PERT chart -- Shortest path in a directed acyclic graph -- Further reading -- 6 Shortest Paths -- Dijkstra's algorithm -- The Bellman-Ford algorithm -- The Floyd-Warshall algorithm -- Further reading -- 7 Algorithms on Strings -- Longest common subsequence -- Transforming one string to another -- String matching -- Further reading -- 8 Foundations of Cryptography -- Simple substitution ciphers -- Symmetric-key cryptography -- Public-key cryptography -- The RSA cryptosystem -- Hybrid cryptosystems -- Computing random numbers -- Further reading -- 9 Data Compression -- Huffman codes -- Fax machines -- LZW compression -- Further reading -- 10 Hard? Problems -- Brown trucks -- The classes P and NP and NP-completeness -- Decision problems and reductions -- A Mother Problem -- A sampler of NP-complete problems -- General strategies -- Perspective -- Undecidable problems -- Wrap-up -- Further reading -- Bibliography -- Index. 330 $aHave you ever wondered how your GPS can find the fastest way to your destination, selecting one route from seemingly countless possibilities in mere seconds? How your credit card account number is protected when you make a purchase over the Internet? The answer is algorithms. And how do these mathematical formulations translate themselves into your GPS, your laptop, or your smart phone? This book offers an engagingly written guide to the basics of computer algorithms. In Algorithms Unlocked, Thomas Cormen -- coauthor of the leading college textbook on the subject -- provides a general explanation, with limited mathematics, of how algorithms enable computers to solve problems. Readers will learn what computer algorithms are, how to describe them, and how to evaluate them. They will discover simple ways to search for information in a computer; methods for rearranging information in a computer into a prescribed order ("sorting"); how to solve basic problems that can be modeled in a computer with a mathematical structure called a "graph" (useful for modeling road networks, dependencies among tasks, and financial relationships); how to solve problems that ask questions about strings of characters such as DNA structures; the basic principles behind cryptography; fundamentals of data compression; and even that there are some problems that no one has figured out how to solve on a computer in a reasonable amount of time. 606 $aComputer algorithms 615 0$aComputer algorithms. 676 $a005.1 700 $aCormen$b Thomas H$09698 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910260622203321 996 $aAlgorithms unlocked$92670326 997 $aUNINA LEADER 04044nam 22008895 450 001 9910954306103321 005 20240311153913.0 010 $z9780230230545 010 $a9780230354210 010 $a0230354211 024 7 $a10.1057/9780230354210 035 $a(CKB)2550000000084086 035 $a(EBL)851034 035 $a(OCoLC)774695925 035 $a(SSID)ssj0000585443 035 $a(PQKBManifestationID)11350457 035 $a(PQKBTitleCode)TC0000585443 035 $a(PQKBWorkID)10580826 035 $a(PQKB)10889403 035 $a(DE-He213)978-0-230-35421-0 035 $a(MiAaPQ)EBC851034 035 $a(Perlego)3499387 035 $a(EXLCZ)992550000000084086 100 $a20151204d2012 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCommon Prostitutes and Ordinary Citizens $eCommercial Sex in London, 1885-1960 /$fby J. Laite 205 $a1st ed. 2012. 210 1$aLondon :$cPalgrave Macmillan UK :$cImprint: Palgrave Macmillan,$d2012. 215 $a1 online resource (315 p.) 225 1 $aGenders and Sexualities in History,$x2730-9487 300 $aDescription based upon print version of record. 311 08$a9781349311514 311 08$a1349311510 311 08$a9780230230545 311 08$a0230230547 320 $aIncludes bibliographical references and index. 327 $aMachine generated contents note: -- List of Figures -- Acknowledgements -- Introduction: Criminalizing Commercial Sex -- Selling sex: Women, Work, and Prostitution -- Buying Sex: Men and the Marketplace -- The Crusade Begins: The Criminal Law Amendment Act and London's 'Brothels' Before the First World War -- Women in Public and Public Women: Controlling Street Prostitution 1887-1914 -- 'Down on Whores' and 'Living on the Earnings': Violence, Vulnerability and the Law after 1885 -- White Slaves and Alien Prostitutes: Trafficking, Protection, and Punishment in the Early Twentieth Century -- Making War, Taking Fingerprints, and Challenging the Law: Policy Changes and Public Debates after 1914 -- Behind Closed Doors: Off-Street Commercial Sex in the Interwar Years -- Sex, War, and Syndication: Organized Prostitution and the Second World War -- The Shame of London: Prostitution and Panic in the Post-War Metropolis -- Risking the Dangers: Reconsidering Commercial Sex in 'Permissive Britain' -- Conclusion -- Appendix -- Notes -- Bibliography -- Index. 330 $aBetween 1885 and 1960, laws and policies designed to repress prostitution dramatically shaped London's commercial sex industry. This book examines how laws translated into street-level reality, explores how women who sold sex experienced criminalization, and charts the complex dimensions of the underground sexual economy in the modern metropolis. 410 0$aGenders and Sexualities in History,$x2730-9487 606 $aGreat Britain$xHistory 606 $aSocial history 606 $aSex 606 $aHistory, Modern 606 $aEthics 606 $aCriminology 606 $aHistory of Britain and Ireland 606 $aSocial History 606 $aGender Studies 606 $aModern History 606 $aMoral Philosophy and Applied Ethics 606 $aCriminology 615 0$aGreat Britain$xHistory. 615 0$aSocial history. 615 0$aSex. 615 0$aHistory, Modern. 615 0$aEthics. 615 0$aCriminology. 615 14$aHistory of Britain and Ireland. 615 24$aSocial History. 615 24$aGender Studies. 615 24$aModern History. 615 24$aMoral Philosophy and Applied Ethics. 615 24$aCriminology. 676 $a306.740942 686 $aHIS015000$aHIS037070$aHIS037060$aSOC028000$2bisacsh 700 $aLaite$b Julia$f1979-$01793084 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910954306103321 996 $aCommon Prostitutes and Ordinary Citizens$94332511 997 $aUNINA