From the Publisher:
Create sound software designs with data structures that use modern object-oriented design patterns! Author Bruno Preiss presents the fundamentals of data structures and algorithms from a modern, object-oriented perspective. The text promotes object-oriented design using Java and illustrates the use of the latest object-oriented design patterns. Virtually all the data structures are discussed in the context of a single class hierarchy. This framework clearly shows the relationships between data structures and illustrates how polymorphism and inheritance can be used effectively. Key Features of the Text* All data structures are presented using a common framework. This shows the relationship between the data structures and how they are implemented.* Object-oriented design patterns are used to demonstrate how a good design fits together and transcends the problem at hand.* A single Java software design is used throughout the text to provide a better understanding of the operation of complicated data structures.* Just-in-time presentation of mathematical analysis techniques introduces students to mathematical concepts as needed.
Cited By
- Ahmed S, Lee Y, Hyun S and Koo I (2019). Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest, IEEE Transactions on Information Forensics and Security, 14:10, (2765-2777), Online publication date: 1-Oct-2019.
- Liu F, Ting K and Zhou Z (2012). Isolation-Based Anomaly Detection, ACM Transactions on Knowledge Discovery from Data, 6:1, (1-39), Online publication date: 1-Mar-2012.
- Thompson H and Chadhuri P (2011). An alternative visual analysis of the build heap algorithm, ACM Inroads, 2:3, (31-32), Online publication date: 31-Aug-2011.
- Chen L and Nayak R Social network analysis of an online dating network Proceedings of the 5th International Conference on Communities and Technologies, (41-49)
- Machanick P Peer assessment for action learning of data structures and algorithms Proceedings of the 7th Australasian conference on Computing education - Volume 42, (73-82)