Algorithms learning materials and exercises

AI Thread Summary
A teaching assistant in Bosnia and Herzegovina is seeking resources for a course on "Introduction to Computer Algorithms," specifically focusing on mathematical concepts like induction, recursion, and algorithm complexity. The goal is to find examples and tasks that relate these concepts to programming and computer science rather than traditional math. Suggestions include exploring Sedgewick's "Algorithms in C," which may contain relevant material, and reviewing a course from the University of Pennsylvania that outlines necessary mathematical foundations. The assistant is looking for literature in English that can provide practical examples for lab classes.
oujea
Messages
11
Reaction score
0
Hello

I'm teaching assistant at one university in Bosnia and Herzegovina (department for computer science) and I have recently been chosen to be an assistant at "Introduction to computer algorithms" subject. First few classes are based on mathematical background (induction, recursion, algorithm complexity and so on) and I need to find (or make) some examples and tasks for students from this field and to let them work on it during the lab classes, so I'm looking for literature (english) and examples from this field of science, but as much as possible focused on programming and computer science side. Not regular math examples about induction, but something that could be easily interpreted as computer science engineer problem.Do you have any advices where to start from?Thank you in advance
 
Technology news on Phys.org
I already tried there but no luck, there is nothing with focus on mathematical background
 
Sedgewick's 'Algorithms in C' has (I think) a lot of what you want. How much of it is freely available I do not know.
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...

Similar threads

Back
Top