Search results
Results from the WOW.Com Content Network
English: Printable pdf version of C Programming Wikibook. This file was created with MediaWiki to LaTeX . The LaTeX source code is attached to the PDF file (see imprint).
Does linear programming admit a strongly polynomial-time algorithm? (This is problem #9 in Smale's list of problems.) How many queries are required for envy-free cake-cutting? What is the algorithmic complexity of the minimum spanning tree problem? Equivalently, what is the decision tree complexity of the MST problem?
Scala—general purpose, designed to express common programming patterns in a concise, elegant, and type-safe way; SequenceL—general purpose functional, main design objectives are ease of programming, code clarity-readability, and automatic parallelization for performance on multicore hardware, and provably free of race conditions; SR—for ...
The magazine said that the book was not easy to read, but that it would expose experienced programmers to both old and new topics. [ 8 ] A review of SICP as an undergraduate textbook by Philip Wadler noted the weaknesses of the Scheme language as an introductory language for a computer science course. [ 9 ]
Coders at Work: Reflections on the Craft of Programming (ISBN 1-430-21948-3) is a 2009 book by Peter Seibel comprising interviews with 15 highly accomplished programmers. The primary topics in these interviews include how the interviewees learned programming, how they debug code, their favorite languages and tools, their opinions on literate ...
C. The C Programming Language; C Traps and Pitfalls; C, The Complete Reference; Code: The Hidden Language of Computer Hardware and Software; Coders at Work; A Commentary on the UNIX Operating System; Concepts, Techniques, and Models of Computer Programming; Core Python Programming
The Underhanded C Contest was a programming contest to turn out code that is malicious, but passes a rigorous inspection, and looks like an honest mistake even if discovered. The contest rules define a task, and a malicious component. Entries must perform the task in a malicious manner as defined by the contest, and hide the malice.
Depending on the programming language, debugging output statements could be quickly activated and "commented out" by using cards with such statements punched with the comment character (e.g., 'C' in Fortran) in column 80 of the card; turning the card end-for-end would put the 'C' in the leading column, which transformed the now backwards card's ...