Algorithmic Puzzles


Anany V. Levitin - 2011
    This logic extends far beyond the realm of computer science and into the wide and entertaining world of puzzles. In Algorithmic Puzzles, Anany and Maria Levitin use many classic brainteasers as well as newer examples from job interviews with major corporations to show readers how to apply analytical thinking to solve puzzles requiring well-defined procedures.The book's unique collection of puzzles is supplemented with carefully developed tutorials on algorithm design strategies and analysis techniques intended to walk the reader step-by-step through the various approaches to algorithmic problem solving. Mastery of these strategies--exhaustive search, backtracking, and divide-and-conquer, among others--will aid the reader in solving not only the puzzles contained in this book, but also others encountered in interviews, puzzle collections, and throughout everyday life. Each of the 150 puzzles contains hints and solutions, along with commentary onthe puzzle's origins and solution methods. The only book of its kind, Algorithmic Puzzles houses puzzles for all skill levels. Readers with only middle school mathematics will develop their algorithmic problem-solving skills through puzzles at the elementary level, while seasoned puzzle solvers will enjoy the challenge of thinking throughmore difficult puzzles.

Statistics Hacks: Tips & Tools for Measuring the World and Beating the Odds


Bruce B. Frey - 1980
    These cool tips, tricks, and mind-boggling solutions from the world of statistics, measurement, and research methods will not only amaze and entertain you, but will give you an advantage in several real-world situations-including business.This book is ideal for anyone who likes puzzles, brainteasers, games, gambling, magic tricks, and those who want to apply math and science to everyday circumstances. Several hacks in the first chapter alone-such as the "central limit theorem,", which allows you to know everything by knowing just a little-serve as sound approaches for marketing and other business objectives. Using the tools of inferential statistics, you can understand the way probability works, discover relationships, predict events with uncanny accuracy, and even make a little money with a well-placed wager here and there.Statistics Hacks presents useful techniques from statistics, educational and psychological measurement, and experimental research to help you solve a variety of problems in business, games, and life. You'll learn how to:Play smart when you play Texas Hold 'Em, blackjack, roulette, dice games, or even the lottery Design your own winnable bar bets to make money and amaze your friends Predict the outcomes of baseball games, know when to "go for two" in football, and anticipate the winners of other sporting events with surprising accuracy Demystify amazing coincidences and distinguish the truly random from the only seemingly random--even keep your iPod's "random" shuffle honest Spot fraudulent data, detect plagiarism, and break codes How to isolate the effects of observation on the thing observedWhether you're a statistics enthusiast who does calculations in your sleep or a civilian who is entertained by clever solutions to interesting problems, Statistics Hacks has tools to give you an edge over the world's slim odds.

The Numbers Game: The Commonsense Guide to Understanding Numbers in the News, in Politics, and in Life


Michael Blastland - 2008
    Drawing on their hugely popular BBC Radio 4 show More or Less,, journalist Michael Blastland and internationally known economist Andrew Dilnot delight, amuse, and convert American mathphobes by showing how our everyday experiences make sense of numbers. The radical premise of The Numbers Game is to show how much we already know, and give practical ways to use our knowledge to become cannier consumers of the media. In each concise chapter, the authors take on a different theme—such as size, chance, averages, targets, risk, measurement, and data—and present it as a memorable and entertaining story. If you’ve ever wondered what “average” really means, whether the scare stories about cancer risk should convince you to change your behavior, or whether a story you read in the paper is biased (and how), you need this book. Blastland and Dilnot show how to survive and thrive on the torrent of numbers that pours through everyday life. It’s the essential guide to every cause you love or hate, and every issue you follow, in the language everyone uses.

Code Breaking: A History and Exploration


Rudolf Kippenhahn - 1999
    In Code Breaking , Rudolf Kippenhahn offers readers both an exciting chronicle of cryptography and a lively exploration of the cryptographer’s craft. Rich with vivid anecdotes from a history of coding and decoding and featuring three new chapters, this revised and expanded edition makes the often abstruse art of deciphering coded messages accessible to the general reader and reveals the relevance of codes to our everyday high-tech society. A stylishly written, meticulously researched adventure, Code Breaking explores the ways in which communication can be obscured and, like magic, made clear again.

The 5 Love Languages/Things I Wish I'd Known Before We Got Married Set


Gary Chapman - 2010
    

Elements of Partial Differential Equations


Ian N. Sneddon - 2006
    It emphasizes forms suitable for students and researchers whose interest lies in solving equations rather than in general theory. Solutions to odd-numbered problems appear at the end. 1957 edition.

Python 3 Object Oriented Programming


Dusty Phillips - 2010
    Many examples are taken from real-world projects. The book focuses on high-level design as well as the gritty details of the Python syntax. The provided exercises inspire the reader to think about his or her own code, rather than providing solved problems. If you're new to Object Oriented Programming techniques, or if you have basic Python skills and wish to learn in depth how and when to correctly apply Object Oriented Programming in Python, this is the book for you. If you are an object-oriented programmer for other languages, you too will find this book a useful introduction to Python, as it uses terminology you are already familiar with. Python 2 programmers seeking a leg up in the new world of Python 3 will also find the book beneficial, and you need not necessarily know Python 2.

Bursts: The Hidden Pattern Behind Everything We Do


Albert-László Barabási - 2010
    But now, astonishing new research is revealing patterns in human behavior previously thought to be purely random. Precise, orderly, predictable patterns... Albert Laszlo Barabasi, already the world's preeminent researcher on the science of networks, describes his work on this profound mystery in Bursts, a stunningly original investigation into human nature. His approach relies on the digital reality of our world, from mobile phones to the Internet and email, because it has turned society into a huge research laboratory. All those electronic trails of time stamped texts, voicemails, and internet searches add up to a previously unavailable massive data set of statistics that track our movements, our decisions, our lives. Analysis of these trails is offering deep insights into the rhythm of how we do everything. His finding? We work and fight and play in short flourishes of activity followed by next to nothing. The pattern isn't random, it's "bursty." Randomness does not rule our lives in the way scientists have assumed up until now. Illustrating this revolutionary science, Barabasi artfully weaves together the story of a 16th century burst of human activity-a bloody medieval crusade launched in his homeland, Transylvania-with the modern tale of a contemporary artist hunted by the FBI through our post 9/11 surveillance society. These narratives illustrate how predicting human behavior has long been the obsession, sometimes the duty, of those in power. Barabási's astonishingly wide range of examples from seemingly unrelated areas include how dollar bills move around the U.S., the pattern everyone follows in writing email, the spread of epidemics, and even the flight patterns of albatross. In all these phenomena a virtually identical, mathematically described bursty pattern emerges.Bursts reveals what this amazing new research is showing us about where individual spontaneity ends and predictability in human behavior begins. The way you think about your own potential to do something truly extraordinary will never be the same.

The Algorithm Design Manual


Steven S. Skiena - 1997
    Drawing heavily on the author's own real-world experiences, the book stresses design and analysis. Coverage is divided into two parts, the first being a general guide to techniques for the design and analysis of computer algorithms. The second is a reference section, which includes a catalog of the 75 most important algorithmic problems. By browsing this catalog, readers can quickly identify what the problem they have encountered is called, what is known about it, and how they should proceed if they need to solve it. This book is ideal for the working professional who uses algorithms on a daily basis and has need for a handy reference. This work can also readily be used in an upper-division course or as a student reference guide. THE ALGORITHM DESIGN MANUAL comes with a CD-ROM that contains: * a complete hypertext version of the full printed book. * the source code and URLs for all cited implementations. * over 30 hours of audio lectures on the design and analysis of algorithms are provided, all keyed to on-line lecture notes.

Macroanalysis: Digital Methods and Literary History


Matthew L. Jockers - 2013
    Jockers introduces readers to large-scale literary computing and the revolutionary potential of macroanalysis--a new approach to the study of the literary record designed for probing the digital-textual world as it exists today, in digital form and in large quantities. Using computational analysis to retrieve key words, phrases, and linguistic patterns across thousands of texts in digital libraries, researchers can draw conclusions based on quantifiable evidence regarding how literary trends are employed over time, across periods, within regions, or within demographic groups, as well as how cultural, historical, and societal linkages may bind individual authors, texts, and genres into an aggregate literary culture. Moving beyond the limitations of literary interpretation based on the "close-reading" of individual works, Jockers describes how this new method of studying large collections of digital material can help us to better understand and contextualize the individual works within those collections.

Statistics Without Tears: An Introduction for Non-Mathematicians


Derek Rowntree - 1981
    With it you can prime yourself with the key concepts of statistics before getting involved in the associated calculations. Using words and diagrams instead of figures, formulae and equations, Derek Rowntree makes statistics accessible to those who are non-mathematicians. And just to get you into the spirit of things. Rowntree has included questions in his argument; answer them as you go and you will be able to tell how far you have mastered the subject.

Book of Proof


Richard Hammack - 2009
    It is a bridge from the computational courses (such as calculus or differential equations) that students typically encounter in their first year of college to a more abstract outlook. It lays a foundation for more theoretical courses such as topology, analysis and abstract algebra. Although it may be more meaningful to the student who has had some calculus, there is really no prerequisite other than a measure of mathematical maturity. Topics include sets, logic, counting, methods of conditional and non-conditional proof, disproof, induction, relations, functions and infinite cardinality.

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

How the Brain Learns Mathematics


David A. Sousa - 2007
    Sousa discusses the cognitive mechanisms for learning mathematics and the environmental and developmental factors that contribute to mathematics difficulties. This award-winning text examines:Children's innate number sense and how the brain develops an understanding of number relationships Rationales for modifying lessons to meet the developmental learning stages of young children, preadolescents, and adolescents How to plan lessons in PreK-12 mathematics Implications of current research for planning mathematics lessons, including discoveries about memory systems and lesson timing Methods to help elementary and secondary school teachers detect mathematics difficulties Clear connections to the NCTM standards and curriculum focal points

Computer Vision: Algorithms and Applications


Richard Szeliski - 2010
    However, despite all of the recent advances in computer vision research, the dream of having a computer interpret an image at the same level as a two-year old remains elusive. Why is computer vision such a challenging problem and what is the current state of the art?Computer Vision: Algorithms and Applications explores the variety of techniques commonly used to analyze and interpret images. It also describes challenging real-world applications where vision is being successfully used, both for specialized applications such as medical imaging, and for fun, consumer-level tasks such as image editing and stitching, which students can apply to their own personal photos and videos.More than just a source of "recipes," this exceptionally authoritative and comprehensive textbook/reference also takes a scientific approach to basic vision problems, formulating physical models of the imaging process before inverting them to produce descriptions of a scene. These problems are also analyzed using statistical models and solved using rigorous engineering techniquesTopics and features: Structured to support active curricula and project-oriented courses, with tips in the Introduction for using the book in a variety of customized courses Presents exercises at the end of each chapter with a heavy emphasis on testing algorithms and containing numerous suggestions for small mid-term projects Provides additional material and more detailed mathematical topics in the Appendices, which cover linear algebra, numerical techniques, and Bayesian estimation theory Suggests additional reading at the end of each chapter, including the latest research in each sub-field, in addition to a full Bibliography at the end of the book Supplies supplementary course material for students at the associated website, http: //szeliski.org/Book/ Suitable for an upper-level undergraduate or graduate-level course in computer science or engineering, this textbook focuses on basic techniques that work under real-world conditions and encourages students to push their creative boundaries. Its design and exposition also make it eminently suitable as a unique reference to the fundamental techniques and current research literature in computer vision.