Best of
Computer-Science

1988

Concrete Mathematics: A Foundation for Computer Science


Ronald L. Graham - 1988
    "More concretely," the authors explain, "it is the controlled manipulation of mathematical formulas, using a collection of techniques for solving problems."

The AWK Programming Language


Alfred V. Aho - 1988
    In 1985, a new version of the language was developed, incorporating additional features such as multiple input files, dynamic regular expressions, and user-defined functions. This new version is available for both Unix and MS-DOS. This is the first book on AWK. It begins with a tutorial that shows how easy AWK is to use. The tutorial is followed by a comprehensive manual for the new version of AWK. Subsequent chapters illustrate the language by a range of useful applications, such as: Retrieving, transforming, reducing, and validating data Managing small, personal databases Text processing Little languages Experimenting with algorithms The examples illustrates the books three themes: showing how to use AWK well, demonstrating AWKs versatility, and explaining how common computing operations are done. In addition, the book contains two appendixes: summary of the language, and answers to selected exercises.

Numerical Recipes in C: The Art of Scientific Computing


William H. Press - 1988
    In a self-contained manner it proceeds from mathematical and theoretical considerations to actual practical computer routines. With over 100 new routines bringing the total to well over 300, plus upgraded versions of the original routines, the new edition remains the most practical, comprehensive handbook of scientific computing available today.

Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture


Douglas E. Comer - 1988
    Discover how the basic TCP/IP technology has survived and evolved over two decades of exponential growth, and understand the TCP/IP protocols and technical advances. This edition explains emerging technologies such as Mobile IP, Virtual Private Networks, resource reservation with RSVP, and Ipv6. Comer reveals how to master TCP/IP and how the Internet works. The reader is required to have a modest background in the fundamentals of computer systems, but does not need sophisticated mathematics. As with previous editions, this edition provides an introduction to physical networks and then shows how they are combined to form an internet. It states design principles clearly, and discusses motivations and consequences. THIS NEW EDITION OF VOLUME 1: *Explains how voice and video are sent over IP internets and how IP Telephony operates *Describes Mobile IP (a technology that allows a computer to move fr

Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference


Judea Pearl - 1988
    The author provides a coherent explication of probability as a language for reasoning with partial belief and offers a unifying perspective on other AI approaches to uncertainty, such as the Dempster-Shafer formalism, truth maintenance systems, and nonmonotonic logic.The author distinguishes syntactic and semantic approaches to uncertainty--and offers techniques, based on belief networks, that provide a mechanism for making semantics-based systems operational. Specifically, network-propagation techniques serve as a mechanism for combining the theoretical coherence of probability theory with modern demands of reasoning-systems technology: modular declarative inputs, conceptually meaningful inferences, and parallel distributed computation. Application areas include diagnosis, forecasting, image interpretation, multi-sensor fusion, decision support systems, plan recognition, planning, speech recognition--in short, almost every task requiring that conclusions be drawn from uncertain clues and incomplete information.Probabilistic Reasoning in Intelligent Systems will be of special interest to scholars and researchers in AI, decision theory, statistics, logic, philosophy, cognitive psychology, and the management sciences. Professionals in the areas of knowledge-based systems, operations research, engineering, and statistics will find theoretical and computational tools of immediate practical use. The book can also be used as an excellent text for graduate-level courses in AI, operations research, or applied probability.

File Organization and Processing


Alan L. Tharp - 1988
    Covers specialized data structures, and explains how to choose the appropriate algorithm or data structure for the job at hand. The four sections treat primary file organizations, bit level and related structures, tree structures, and file sorting. Opening chapters cover sequential file organization, direct file organization, indexed sequential file organization, bits of information, secondary key retrieval, and bits and hashing. Following chapters cover binary tree structures, B-trees and derivatives, hashing techniques for expandable files, other tree structures, more on secondary key retrieval, sorting, and applying file structures. Contains pseudocode, or an outline in English, for most algorithms. Includes end-of-section questions, with answers to some. Extensively illustrated.

The New Kornshell Command and Programming Language


Morris I. Bolsky - 1988
    It provides a specification for the KornShell language, tutorial material for those new to ksh (the program that implements the KornShell language), and a comprehensive reference for all ksh users. Covers major new additions to the KornShell language ksh93 (including command completion and a key binding mechanism); provides tutorials for both of the functions of ksh (as an interactive command language, and as a programming language); contains numerous examples illustrating the features of ksh; and features a Quick Reference summary of the KornShell language with page references to the book. For both new users with little shell experience, and for experienced computer users who are familiar with ksh and/or other shells. ISBN of 1st Edition: 0-13-516972-02.

Local Area Networks


Gerd Keiser - 1988
    Its primary market is in electrical engineering,although the course is also taught in computer science departments. A major feature of the text is that it covers both performance analysis and implementation considerations.

A Method of Programming


Edsger W. Dijkstra - 1988
    

Introduction to Functional Programming


Richard S. Bird - 1988
    There are new chapters on program optimisation, abstract datatypes in a functional setting, and programming in a monadic style. There are complete new case studies, and many new exercises. As in the first edition, there is an emphasis on the fundamental techniques for reasoning about functional programs, and for deriving them systematically from their specifications. The book is self-contained, assuming no prior knowledge of programming and is suitable as an introductory undergraduate text for first- or second-year students.

A Small C Compiler: Language, Usage, Theory, and Design


James E. Hendrix - 1988
    

More Programming Pearls: Confessions of a Coder


Jon L. Bentley - 1988
    These techniques deal with real programs and they are realistically illustrated, using the C and Awk languages. Bentley also provides the reader with some tricks of the programmer's trade, like a collection of rules of thumb and hints for finding simple solutions to hard problems.These essays also originally appeared in the author's column in Communication of the ACM, and have been substantially revised, incorporating new sections, problems, and reader comments.

Principles of Artificial Intelligence and Expert Systems Development


David W. Rolston - 1988
    Fast shipping with delivery ALL OVER INDIA with professional customer support for 100% customer satisfaction guarantee

General Principles of Systems Design


Gerald M. Weinberg - 1988
    Partial Contents1: The Problem of PersistenceWeinberg's Law(s) of Twins - The General Systems Approach to Continuity2: AggregatesBirths and Deaths--The Fundamental Aggregate Equation3: Birth-Free AggregatesSocial Versus Innate Survival - Exponential Decay - Unimodal Life Tables, and Ogives4: Reasoning About AggregatesCooperation and Competition--The Law of Collapse - The Law of Typology5: Modeling Differentiated AggregatesThe State Vector - Constructing a System of Equations - To Solve or Not To Solve?6: Programs for Models of Differentiated AggregatesVarieties of Programs - Transitive Closure--The Diagram of Possible Effects7: Structure and BehaviorThe Structure of Structure - Projecting Behavior with a Linear Program8: The Structure-Regulation LawThe Equivalence of Structure and Input - Can a Linear System Be Stable?9: The Search for RegulationThe Problem of Multidimensional Regulation - Separation of Variables10: The Homeostatic HeuristicsThe Internal Environment - Identifying and Essential Variables11: Other Regulatory HeuristicsThe Feedback Principle - Analyzing Feedback Loops - The Piddling Principle12: Types of Regulatory MechanismsConditional and Unconditional Mechanisms - Error-Control - Anticipation13: Regulation and EnvironmentActing on the Environment - The Environment Regulation Laws - The Regulatory Model - The Game of Regulation14: When the Model FailsThe Fundamental Regulator Paradox - Noise - Noise in Communication Systems15: Making Regulation MysteriousThe Impression of Intelligence - The Myth of Superiority16: Overly Simple Views of RegulationThe Kool-Aid Fallacy and the Aspirin Illusion - The False-Alarm Fallacy - Flareback17: Blindness and Reversed VisionHiddenReverses - Denying the Existence of Regulation18: Epilogue

The Zen of Programming


Geoffrey James - 1988
    Will take 25-35 days

An Introduction To Berkeley Unix


Paul S. Wang - 1988
    

Chipmakers, The


Time-Life Books - 1988
    

C Programming Guide


Jack J. Purdum - 1988
    

New Peter Norton Programmer's Guide to the IBM PC and PS/2: The Ultimate Reference to the Entire Family of IBM Personal Computers


Peter Norton - 1988
    It includes technical data, quick reference charts and Norton's characteristically astute insights and covers a range of new topics as well as new information on previously covered topics.New topics include: the 80286 and 80386 microprocessors, the enhanced keyboard, the new VGA and MCGA, the new PS/2 ROM BIOS and all current versions of PC-DOS.

Practical TSO/ISPF for Programmers and the Information Center


James G. Janossy - 1988
    First five chapters provide rapid familiarization with the unique aspects of the IBM terminal device family, logging on and off, the ISPF main menu, and the initial set-up often needed for new accounts. This part of the book can be assimilated in a few hours. Latter five chapters are arranged with examples of the most common way ISO/ISPF is used: for composition of program language code, and composition and submission of job control language to process it. The reader can progress through these chapters performing these processes hands-on, in a self-paced tutorial manner. Reference charts and examples depict a natural flow of the job editing and job submission work.

Functional Programming Using Standard Ml


Ake Wikstrom - 1988
    

Explorations in Parallel Distributed Processing: A Handbook of Models, Programs, and Exercises - IBM Version


James L. McClelland - 1988
    Includes two 5 1/4" DS/DD diskettes for IBM PCs and compatibles

MIPS RISC Architecture


Gerry Kane - 1988
    Focusing on the new R4000 and R6000 chips, this book is organized into two major sections: Chapters 1 through 6 describe the characteristics of the CPU, while Chapter 7 through 9 describe the Floating Point Unit (FPU). This book describes the general characteristics and capabilities of each RISC processor, along with a description of the programming model, memory management unit (MMU), and the registers associated with each processor. Also included is an overview of the underlying concepts that distinguish RISC architecture from Complex Instruction Set Computer (CISC) architecture.