There's plenty of room at the Top: What will drive computer performance after Moore's law?

CE Leiserson, NC Thompson, JS Emer, BC Kuszmaul… - Science, 2020 - science.org
BACKGROUND Improvements in computing power can claim a large share of the credit for
many of the things that we take for granted in our modern lives: cellphones that are more …

A guided tour to approximate string matching

G Navarro - ACM computing surveys (CSUR), 2001 - dl.acm.org
We survey the current techniques to cope with the problem of string matching that allows
errors. This is becoming a more and more relevant issue for many fast growing areas such …

Model checking

EM Clarke - Foundations of Software Technology and Theoretical …, 1997 - Springer
Abstract Model checking is an automatic technique for verifying finite-state reactive systems,
such as sequential circuit designs and communication protocols. Specifications are …

Optimization by simulated annealing

S Kirkpatrick, CD Gelatt Jr, MP Vecchi - science, 1983 - science.org
There is a deep and useful connection between statistical mechanics (the behavior of
systems with many degrees of freedom in thermal equilibrium at a finite temperature) and …

[BOOK][B] Introduction to algorithms

TH Cormen, CE Leiserson, RL Rivest, C Stein - 2022 - books.google.com
A comprehensive update of the leading algorithms text, with new material on matchings in
bipartite graphs, online algorithms, machine learning, and other topics. Some books on …

How to share a secret

A Shamir - Communications of the ACM, 1979 - dl.acm.org
In this paper we show how to divide data D into n pieces in such a way that D is easily
reconstructable from any k pieces, but even complete knowledge of k-1 pieces reveals …

[BOOK][B] Mental models: Towards a cognitive science of language, inference, and consciousness

PN Johnson-Laird - 1983 - books.google.com
Mental Models offers nothing less than a unified theory of the major properties of mind:
comprehension, inference, and consciousness. In spirited and graceful prose, Johnson …

New directions in cryptography

W Diffie, ME Hellman - … Cryptography: The Work of Whitfield Diffie and …, 2022 - dl.acm.org
Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman: New Directions
in Cryptography Page 1 12 Two kinds of contemporary developments in cryptography are …

Graph-based algorithms for boolean function manipulation

RE Bryant - Computers, IEEE Transactions on, 1986 - ieeexplore.ieee.org
In this paper we present a new data structure for representing Boolean functions and an
associated set of manipulation algorithms. Functions are represented by directed, acyclic …

[BOOK][B] Numerical methods for unconstrained optimization and nonlinear equations

JE Dennis Jr, RB Schnabel - 1996 - SIAM
We are delighted that SIAM is republishing our original 1983 book after what many in the
optimization field have regarded as “premature termination” by the previous publisher. At 12 …