Concrete Mathematics

Total Page:16

File Type:pdf, Size:1020Kb

Concrete Mathematics Texas A&M University - San Antonio Concrete Mathematics Concrete Mathematics: A Portfolio of Problems Author: Supervisor: Sean Zachary Prof. Donald Myers Roberson July 1, 2014 1 Chapter 1: Recurrent Problems Many problems in mathematics are recurrent problems, meaning that they are defined in terms of themselves. For example, one can find the greatest common divisor of two integers a and b by the following relation: gcd(a; a) = 1; gcd(a; b) = gcd(b; a mod b) Each successive step reduces the problem into a simpler case. Another recursive function is the factorial: a0 = 1; a1 = 1; an = nan−1 Solving these recurrences can be done in many ways. One may be able to deduce a closed form after finding a pattern in the first few terms. Another method is to unfold the recurrence by successively plugging in previous terms until the base case is reached. Other methods include using the characteristic polynomial for linear recurrences, or the use of generating functions for general recurrences. Generating functions will be examined in depth in Chapter 7 (see the section titled Generating Functions). In this section, we examine one well-known recurrent problem, known as the Josephus Problem. Ac- cording to legend, Flavius Josephus and a group of Jewish rebels were captured by Romans. The rebels formed a circle and killed every third person in the circle until all were dead. The main question of the Josephus problem is as follows: Suppose n people, numbered from 1 to n, stand in a circle. If every other person is killed, which person is the last to survive? To investigate this problem, suppose there are six people in the circle. The first person to die is numbered 2, then next is 4, followed by 6, 3, and 1. The person numbered 5 is the last one surviving. Let J(n) be the person left standing after all other n − 1 persons have killed themselves. We can then say J(6) = 5. Now, let us suppose that we have 2n people in this circle at the start. The first person to die is number 2, then 4, and every even-numbered person until the sword (or whatever object is used to commit suicide with) returns to person number 1. Now, only odd-numbered persons are left in the circle. This situation is similar to starting with n people, only this time their labels have been multiplied by 2 and had 1 subtracted. For example, person 5 would become person 9. So, a form for the survivor amongst an even-numbered group of people is J(2n) = 2J(n) − 1: Using the fact that J(6) = 5, we can deduce that J(12) = 2J(6) − 1 = 9. We can then conclude that J(24) = 17, and J(48) = 33: 1 But what if there are an odd number of people from the start, say, 2n + 1? Execution begins as normal, with persons 2; 4; 6; 8;:::; 2n dying in the first trip around the circle, but now the next to die after 2n is person 1. The people left in the circle are 3; 5; 7;:::; 2n + 1. This is similar to the case with n people, as before, but now numbers are increased by 1 after they are doubled, not decreased by 1. Again, we have a form for determining the survivor in a group of 2n + 1 people; that is, J(2n + 1) = 2J(n) + 1: For example, J(15) = 2J(7) + 1 = 2(2J(3) + 1) + 1 = 15. Combining the previous two general forms with the base case J(1) = 1, we have the following recursion: J(1) = 1; J(2n) = 2J(n) − 1; J(2n + 1) = 2J(n) + 1: For this recursion, it is sufficient to divide the number of people in the circle by 2 and round down to the nearest integer. Repeated application will give the survivor's number. What if we desire a closed-form solution? Such a solution is possible to construct. First, let us generate a short table of values of J(n). n J(n) 1 1 2 1 3 3 4 1 5 3 6 5 7 7 8 1 9 3 10 5 11 7 12 9 13 11 14 13 15 15 16 1 Notice that the table is blocked in certain areas. This sparks some curious thought. 2 First, let's see what happens to powers of two. Suppose k is an integer that is at least zero. Then what is J(2k)? For k = 0, we have J(1) = 1, and for k = 1, we have J(2) = 1 (from the table). Now, assume that, for all integers k up to j, that J(2j) = 1. Now, for k = j + 1, we have: J(2j+1) = 2J(2j) − 1 = 2(1) − 1 = 1 as needed. Hence J(2k) = 1, where k is an integer greater than or equal to zero. What's next to show? Let's try to see what happens between powers of two, say, from 8 to 16. We see that J(8) = 1;J(9) = 3;J(10) = 5; and J(11) = 7. What's happening? The value of the function increases by 2 as n increases by 1. But, we see that J(15) = 15, and J(16) = 1. So, something happens between n = 2j − 1 and n = 2j. Observe that 15 = 23 + 7, and 16 = 24. From the table, this is a transition between new blocks. But what happens at this transition? We see that 8 is the largest power of two that does not exceed 15. While 8 is not larger than 16, it is not the biggest power of two that is less than 16 (here, the desired number is 16). We almost see a pattern. Let l = n − 2j, where 2j = maxf2pj2p < ng. We conjecture that J(n) = 2l + 1. For n = 1, that is, 1 = 20 + 0, we have J(1) = 1, as needed. The case n = 2 is trivial, by the previous derivation, so we move to n = 3. Here, we write 3 = 21 + 1 and so J(3) = 2(1) + 1 = 3. Now assume this holds for every n = 2j, inducting on j. For the case j = q + 1, we must first consider even l. So, suppose l is even. Then J(2q+1 + l) = 2(J(2q + l=2)) − 1 = 2(2(l=2) + 1) − 1 = 2l + 1 as needed. Otherwise, when l is odd (say, l = 2p + 1), the induction step is as follows: J(2q+1 + 2p + 1) = 2J(2q + p) + 1 = 2(2p + 1) + 1 = 2(l − 1) + 3 = 2l + 1 From the first to the second line, we assumed that p was even. However, it can be shown that any even number can be divided by 2 a finite number of times to produce an odd number. So, for odd l, J(2q + l) = 2l + 1. 3 We combine this with the previous result to give a suitable closed form solution for the Josephus problem: J(n) = 2l + 1 where n = 2q + l, and l < 2q. 8. Solve the recurrence Q0 = α; Q1 = β; 1 + Qn−1 Qn = : Qn−2 Solution. The recurrence doesn't seem to have any recognizable pattern at first, so the best way to proceed is to start finding terms using the initial conditions. 1 + β Q = 2 α 1 + β 1 + Q = α 3 β 1 + α + β = αβ 1 + α + β 1 + αβ Q = 4 1 + β α 1 + α = β 1 + α 1 + β Q = 5 1 + α + β αβ = α But, note that Q5 = Q0. This suggests that for every n, Qn = Qn−5. This recurrence is linear, and it n n n−5 5 can be solved. To solve this recurrence, let r = Qn. Then we have r = r , or, equivalently, r = 1. 2π 2π Solving this equation in the complex numbers gives the solution r = cos 5 + i sin 5 . This value of r 2πi can actually be written as exp 5 . To account for the initial condition, it suffices to solve 2πi · 0 α = c exp ; 1 5 whose solution gives c1 = α. Hence, the solution to the recurrence is 2nπi Q = α exp : n 5 4 2 Chapter 2: Sums In mathematics, sums appear in almost every branch. For example, they appear in linear algebra when computing the (i; j) entry of a matrix product: n X cij = aikbkj k=1 where the sum is across k. Also, they appear in calculus and analysis when approximating a function with a polynomial: 1 X f (j)(a) T (x) = (x − a)j j! j=0 But how do sums really work? How can one manipulate a sum and get a closed form? There are many ways to view a sum. First, one can view a sum as a recurrence. Suppose, for the sake of Pn example, that Sn = j=0 aj, where the terms aj come from a sequence. Observe that the sum can also be written as the following recurrence: S0 = a0; Sn = Sn−1 + an: This recurrence says that each successive value of the sum depends on the previous terms. There are many well-known sums to keep in mind. Suppose one wishes to sum the first n integers in succession; that is, what is 1+2+3+:::+n? There are many ways to solve this problem. Perhaps one of the most well-known ways to find this sum is by adding a copy of the sum to itself. This technique is attributed to Gauss, and is told through a story.
Recommended publications
  • Donald Knuth Fletcher Jones Professor of Computer Science, Emeritus Curriculum Vitae Available Online
    Donald Knuth Fletcher Jones Professor of Computer Science, Emeritus Curriculum Vitae available Online Bio BIO Donald Ervin Knuth is an American computer scientist, mathematician, and Professor Emeritus at Stanford University. He is the author of the multi-volume work The Art of Computer Programming and has been called the "father" of the analysis of algorithms. He contributed to the development of the rigorous analysis of the computational complexity of algorithms and systematized formal mathematical techniques for it. In the process he also popularized the asymptotic notation. In addition to fundamental contributions in several branches of theoretical computer science, Knuth is the creator of the TeX computer typesetting system, the related METAFONT font definition language and rendering system, and the Computer Modern family of typefaces. As a writer and scholar,[4] Knuth created the WEB and CWEB computer programming systems designed to encourage and facilitate literate programming, and designed the MIX/MMIX instruction set architectures. As a member of the academic and scientific community, Knuth is strongly opposed to the policy of granting software patents. He has expressed his disagreement directly to the patent offices of the United States and Europe. (via Wikipedia) ACADEMIC APPOINTMENTS • Professor Emeritus, Computer Science HONORS AND AWARDS • Grace Murray Hopper Award, ACM (1971) • Member, American Academy of Arts and Sciences (1973) • Turing Award, ACM (1974) • Lester R Ford Award, Mathematical Association of America (1975) • Member, National Academy of Sciences (1975) 5 OF 44 PROFESSIONAL EDUCATION • PhD, California Institute of Technology , Mathematics (1963) PATENTS • Donald Knuth, Stephen N Schiller. "United States Patent 5,305,118 Methods of controlling dot size in digital half toning with multi-cell threshold arrays", Adobe Systems, Apr 19, 1994 • Donald Knuth, LeRoy R Guck, Lawrence G Hanson.
    [Show full text]
  • Leading the Way in Scientific Computing. Addison-Wesley. I When Looking for the Best in Scientific Computing, You've Come to Rely on Addison-Wesley
    Leading the way in scientific computing. Addison-Wesley. I When looking for the best in scientific computing, you've come to rely on Addison-Wesley. I Take a moment to see how we've made our list even stronger. The LATEX Companion sional programming languages. This book is the definitive user's Michael Goossens, Frank Mittelbach, and Alexander Samarin guide and reference manual for the CWEB system. This book is packed with information needed to use LATEX even 1994 (0-201 -57569-8) approx. 240 pp. Softcover more productively. It is a true companion to Leslie Lamport's users guide as well as a valuable complement to any LATEX introduction. Concrete Mathematics. Second Edition Describes the new LATEX standard. Ronald L. Graham, Donald E. Knuth, and Oren Patashnick 1994 (0-201 -54 199-8) 400 pp. Softcover With improvements to almost every page, the second edition of this classic text and reference introduces the mathematics that LATEX: A Document Preparation System, Second Edition supports advanced computer programming. Leslie Lamport 1994 (0-201 -55802-5) 672 pp. Hardcover The authoritative user's guide and reference manual has been revised to document features now available in the new standard Applied Mathematics@: Getting Started, Getting It Done software release-LATEX~E.The new edition features additional styles William T. Shaw and Jason Tigg and functions, improved font handling, and much more. This book shows how Mathematics@ can be used to solve problems in 1994 (0-201-52983-1) 256 pp. Softcover the applied sciences. Provides a wealth of practical tips and techniques. 1 994 (0-201 -542 1 7-X) 320 pp.
    [Show full text]
  • Types in Logic, Mathematics, and Programming from the Handbook of Proof Theory
    CHAPTER X Types in Logic, Mathematics and Programming Robert L. Constable Computer Science Department, Cornell University Ithaca, New York 1~853, USA Contents 1. Introduction ..................................... 684 2. Typed logic ..................................... 692 3. Type theory ..................................... 726 4. Typed programming languages ........................... 754 5. Conclusion ...................................... 766 6. Appendix ...................................... 768 References ........................................ 773 HANDBOOK OF PROOF THEORY Edited by S. R. Buss 1998 Elsevier Science B.V. All rights reserved 684 R. Constable 1. Introduction Proof theory and computer science are jointly engaged in a remarkable enter- prise. Together they provide the practical means to formalize vast amounts of mathematical knowledge. They have created the subject of automated reasoning and a digital computer based proof technology; these enable a diverse community of mathematicians, computer scientists, and educators to build a new artifact a globally distributed digital library of formalized mathematics. I think that this artifact signals the emergence of a new branch of mathematics, perhaps to be called Formal Mathematics. The theorems of this mathematics are completely formal and are processed digitally. They can be displayed as beautifully and legibly as journal quality mathematical text. At the heart of this library are completely formal proofs created with computer assistance. Their correctness is based on the axioms and rules of various foundational theories; this formal accounting of correctness supports the highest known standards of rigor and truth. The need to formally relate results in different foundational theories opens a new topic in proof theory and foundations of mathematics. Formal proofs of interesting theorems in current foundational theories are very large rigid objects. Creating them requires the speed and memory capacities of modern computer hardware and the expressiveness of modern software.
    [Show full text]
  • Concrete Mathematics: Foundation for Computer Science Free Download
    CONCRETE MATHEMATICS: FOUNDATION FOR COMPUTER SCIENCE FREE DOWNLOAD Ronald Graham,Oren Patashnik,Donald Ervin Knuth | 672 pages | 10 Mar 1994 | Pearson Education (US) | 9780201558029 | English | Boston, United States Concrete Mathematics: A Foundation for Computer Science, Second Edition Seller Inventory ING Reprinted as chapter 18 of the book Digital Typography. Table of contents Product information. The second edition includes important new material about the revolutionary Gosper-Zeilberger algorithm for mechanical summation. Midpoint between a discrete math text and dedicated algorithms text. Original Title. However, I promise to reply in due time. By continuing, you're agreeing to use of cookies. Dewey Decimal. Concrete Mathematics: Foundation for Computer Science response to the widespread use of the first edition as a reference book, the Concrete Mathematics: Foundation for Computer Science and index have also been expanded, and additional nontrivial improvements can be found on almost every page. Credits for Exercises. Apr 15, Bishu rated it it was amazing. Donald Knuth. Concrete Mathematics: Foundation for Computer Science Reviews. Dust Jacket Condition: New. Knuth is known throughout the world for his pioneering work on algorithms and programming techniques, for his invention of the Tex and Metafont systems for computer typesetting, and for his prolific and influential writing. If you like books and love to build cool products, we may be looking for you. This second edition includes important new material about mechanical summation. It is an indispensable text and reference not only Concrete Mathematics: Foundation for Computer Science computer scientists - the authors themselves rely heavily on it! It is an indispensable text and reference not only for computer scientists - the authors themselves rely heavily on it! Other Editions Example 4: A convoluted recurrence.
    [Show full text]
  • Math Never Seen
    TUGboat, Volume 31 (2010), No. 2 221 Math never seen ò Quality criteria Johannes Küster What makes a notation superior to another? What makes a symbol successful (in the sense that other mathemati- Abstract cians accept and adopt it)? e following list gives the Why have certain mathematical symbols and notations most important quality criteria. A mathematical symbol gained general acceptance while others fell into oblivion? or notation should be: To answer this question I present quality criteria for • readable, clear and simple mathematical symbols. I show many unknown, little- • needed known or little-used notations, some of which deserve • international (or derived from Latin) much wider use. • mnemonic I also show some new symbols and some ideas for new notations, especially for some well-known concepts • writable which lack a good notation (Stirling numbers, greatest • pronounceable common divisor and least common multiple). • similar and consistent • distinct and unambiguous • adaptable Ô Introduction • available For TEX’s "20th birthday it seems appropriate to present is list is certainly not exhaustive, but these are the most some ne points of mathematical typography and some important points. Not all criteria are equally important, ideas for new symbols and notations. Let’s start with a and some may conict with others, so few symbols really quotation from e METAFONTbook [ , p. ]: fulll all criteria. — Let me explain each point in turn. Above all, a notation should be readable — but what “Now that authors have for the rst time the power constitutes readability? Certainly it comprises clear and to invent new symbols with great ease, and to have simple.
    [Show full text]
  • ACM Bytecast Don Knuth - Episode 2 Transcript
    ACM Bytecast Don Knuth - Episode 2 Transcript Rashmi: This is ACM Bytecast. The podcast series from the Association for Computing Machinery, the ​ ​ world's largest educational and scientific computing society. We talk to researchers, practitioners, and innovators who are at the intersection of computing research and practice. They share their experiences, the lessons they've learned, and their own visions for the future of computing. I am your host, Rashmi Mohan. Rashmi: If you've been a student of computer science in the last 50 years, chances are you are very familiar and somewhat in awe of our next guest.An author, a teacher, computer scientist, and a mentor, Donald Connote wears many hats. Don, welcome to ACM Bytecast. ​ ​ Don: Hi. Rashmi: I'd like to lead with a simple question that I ask all my guests. If you could please introduce yourself and talk about what you currently do and also give us some insight into what drew you into this field of work. Don: Okay. So I guess the main thing about me is that I'm 82 years old, so I'm a bit older than a lot of the other people you'll be interviewing. But even so, I was pretty young when computers first came out. I saw my first computer in 1956 when I was 18 years old. So although people think I'm an old timer, really, there were lots of other people way older than me. Now, as far as my career is concerned, I always wanted to be a teacher. When I was in first grade, I wanted to be a first grade teacher.
    [Show full text]
  • The Concrete Mathematics of Microfluidic Mixing, Part I
    The Concrete Mathematics of Microfluidic Mixing, Part I∗ UNM TR-CS-2006-09 Jennifer Sager, Maxwell Young, and Darko Stefanovic Department of Computer Science University of New Mexico Albuquerque, NM 87131 May 1, 2006 ∗Supplementary Material to Characterization of Transverse Channel Concentration Profiles Obtainable With a Class of Microfluidic Networks, published in Langmuir, 22(9), 4452–4455 (2006) Abstract We analyze mathematically a previously reported class of passive microfluidic mixing networks. The networks produce nonhomogeneous concentrations in the out- put channel, resulting in diverse concentration profiles. We formally prove that all profiles obtainable with this class of networks can be described as polynomials of degree no higher than the number of input channels less one. We derive explicit for- mulas for the calculation of resultant output concentration profiles and conversely for the calculation of input concentrations needed to obtain set output profiles. 1 Introduction Microfluidic technology presents the opportunity for low-cost fabrication of sophisticated reaction assemblies in which chemical and biochemical reactions, including open-system reactions, can be performed with very small reactant volumes and with high volumetric accuracy. For instance, microfluidic assemblies have found uses in the design of reac- tion chambers for DNA computing [14, 15, 4]. Fluid flow in microfluidic channels is entirely laminar, owing to typical channel cross-sections, flow velocities, and fluid prop- erties. Therefore, when two miscible flows are merged into a common channel, they mix only by diffusion. This means that mixing is generally slower than with turbulent flows and special care must be taken to achieve complete mixing of flows (assuming this is desired).
    [Show full text]
  • A Handbook of Mathematical Discourse
    A Handbook of Mathematical Discourse Version 0.9 Charles Wells April 25, 2002 Charles Wells Professor Emeritus of Mathematics, Case Western Reserve University Affiliate Scholar, Oberlin College Address: 105 South Cedar Street Oberlin, OH 44074, USA Email: [email protected] Website: http://www.cwru.edu/artsci/math/wells/home.html Copyright c 2002 by Charles Wells Contents List of Words and Phrases Entries Preface Bibliography About this Handbook Citations Overview Point of view Index Coverage Left To Do Descriptive and Prescriptive Citations Citations needed Presentation Information needed Superscripted cross references TeX Problems Acknowledgments Things To Do contents wordlist index List of Words and Phrases abstract algebra arbitrary brace compartmentaliza- abstraction argument by bracket tion abuse of notation analogy but componentwise accumulation of argument calculate compositional attributes argument call compute action arity cardinality concept image ad-hoc article cases conceptual blend polymorphism assertion case conceptual affirming the assume category concept consequent assumption character conditional aha at most check assertion algebra attitudes circumflex conjunction algorithm addiction back formation citation connective algorithm bad at math classical category consciousness- alias bare delimiter closed under raising all barred arrow code example all notation codomain consequent always bar cognitive consider analogy behaviors dissonance constructivism and be collapsing contain angle bracket binary operation collective plural
    [Show full text]
  • Donald E. Knuth Papers SC0097
    http://oac.cdlib.org/findaid/ark:/13030/kt2k4035s1 Online items available Guide to the Donald E. Knuth Papers SC0097 Daniel Hartwig & Jenny Johnson Department of Special Collections and University Archives August 2018 Green Library 557 Escondido Mall Stanford 94305-6064 [email protected] URL: http://library.stanford.edu/spc Note This encoded finding aid is compliant with Stanford EAD Best Practice Guidelines, Version 1.0. Guide to the Donald E. Knuth SC00973411 1 Papers SC0097 Language of Material: English Contributing Institution: Department of Special Collections and University Archives Title: Donald E. Knuth papers Creator: Knuth, Donald Ervin, 1938- source: Knuth, Donald Ervin, 1938- Identifier/Call Number: SC0097 Identifier/Call Number: 3411 Physical Description: 39.25 Linear Feet Physical Description: 4.3 gigabyte(s)email files Date (inclusive): 1962-2018 Abstract: Papers reflect his work in the study and teaching of computer programming, computer systems for publishing, and mathematics. Included are correspondence, notes, manuscripts, computer printouts, logbooks, proofs, and galleys pertaining to the computer systems TeX, METAFONT, and Computer Modern; and to his books THE ART OF COMPUTER PROGRAMMING, COMPUTERS & TYPESETTING, CONCRETE MATHEMATICS, THE STANFORD GRAPHBASE, DIGITAL TYPOGRAPHY, SELECTED PAPERS ON ANALYSIS OF ALGORITHMS, MMIXWARE : A RISC COMPUTER FOR THE THIRD MILLENNIUM, and THINGS A COMPUTER SCIENTIST RARELY TALKS ABOUT. Special Collections and University Archives materials are stored offsite and must be paged 36-48 hours in advance. For more information on paging collections, see the department's website: http://library.stanford.edu/depts/spc/spc.html. Immediate Source of Acquisition note Gift of Donald Knuth, 1972, 1980, 1983, 1989, 1996, 1998, 2001, 2014, 2015, 2019.
    [Show full text]
  • Euler in Use Context Support for the Euler Math Font, with Examples
    16 MAPS 32 Adam T. Lindsay Euler in Use ConTEXt support for the Euler math font, with examples Abstract The Euler math font was designed by Hermann Zapf. ConTEXt support was limited until now. We show how to use the Eulervm LaTEX package in combination with some new math definitions and typescripts to give a more informal look to your equations. Keywords ConTeXt, fonts, Euler, math Introduction The Euler math font was designed by Hermann Zapf. The underlying philosophy of Zapf’s Euler design was to “capture the flavor of mathematics as it might be written by a mathematician with excellent handwriting.” ConTEXt support had previously been limited, but now includes nearly all features available with ConTEXt’s mathe- matics support. We show how to use the Eulervm LaTEX package in combination with some relatively new math definitions and typescripts to give a new look to your equations. Along the way, we provide several examples using ConTEXt’s typescript and typeface mechanisms. Although Euler has a somewhat informal feel that may make it inappropriate in certain situations, it does have certain advantages: as it does not directly mirror the form of any particular roman font (and has a robust weight), it mates with many more fonts than Computer Modern Math or others that are available. As D.E. Knuth himself had a hand in its creation, it offers features like optical scaling (e.g., script and scriptscript sizes) and multiple weights (i.e., bold math) not seen in most ‘alternative’ fonts. Most of the disadvantages that previously came with Euler use, chief among them poor glyph coverage, have disappeared with Walter Schmidt’s Euler-VM package.
    [Show full text]
  • Typesetting Concrete Mathematics Testfont Routine [5, Appendix HI; These Tests Put Donald E
    TUGboat, Volume 10 (1989), No. 1 3 1 Typesetting Concrete Mathematics testfont routine [5, Appendix HI; these tests put Donald E. Knuth the characters through their basic paces by type- Stanford University setting formulas such as /A+ ,B1+ C + ... + Z1, a2tb2+c2t..+z2, az+br+c2+...+p,and During 1987 and 1988 I prepared a textbook entitled 3 + 5 + + + . + 2. I noticed among other things Concrete Mathematics [I],written with co-authors that the Fraktur characters had all been placed too Ron Graham and Oren Patashnik. I tried my best high above the baseline, and that more blank space to make the book mathematically interesting, but was needed at the left and right of the characters in I also knew that it would be typographically in- subscript/superscript sizes. After fixing such prob- teresting-because it would be the first major use lems I also needed to set the italic corrections so of a new typeface by Hermann Zapf, commissioned that subscripts and superscripts would have proper by the American Mathematical Society. This type- offsets; and I needed to define suitable kerns with face, called AMS Euler, had been carefully digitized a \skewchar so that accents would appear visually and put into METAFONT form by Stanford's digital centered. AMS Euler contains more than 400 char- typography students [a]; but it had not yet been acters, and Hermann had made them beautiful; my "tuned up" for real applications. My new book job was to find the right adjustments to the spacing served as an ideal test case, because (1) it involved so that they would fit properly into mathematics.
    [Show full text]
  • Computer Science 1
    Computer Science 1 A coordinated MBA/MCS degrees program is also offered in conjunction COMPUTER SCIENCE with the Jesse H. Jones Graduate School of Business. Contact Information Bachelor's Programs Computer Science • Bachelor of Arts (BA) Degree with a Major in Computer Science https://www.cs.rice.edu/ (https://ga.rice.edu/programs-study/departments-programs/ 3122 Duncan Hall engineering/computer-science/computer-science-ba/) 713-348-4834 • Bachelor of Science in Computer Science (BSCS) Degree (https:// ga.rice.edu/programs-study/departments-programs/engineering/ Christopher M. Jermaine computer-science/computer-science-bscs/) Department Chair [email protected] Master's Programs Alan L. Cox • Master of Computer Science (MCS) Degree (https://ga.rice.edu/ Undergraduate Committee Chair programs-study/departments-programs/engineering/computer- [email protected] science/computer-science-mcs/) • Master of Computer Science (MCS) Degree, Online Program (https:// T. S. Eugene Ng ga.rice.edu/programs-study/departments-programs/engineering/ Graduate Committee Chair computer-science/computer-science-mcs-online/) [email protected] • Master of Data Science (MDS) Degree (https://ga.rice.edu/programs- study/departments-programs/engineering/data-science/data- science-mds/) Computer science is concerned with the study of computers and • Master of Data Science (MDS) Degree, Online Program (https:// computing, focusing on algorithms, programs and programming, and ga.rice.edu/programs-study/departments-programs/engineering/ computational systems. The main goal of the discipline is to build a data-science/data-science-mds-online/) systematic body of knowledge, theories, and models that explain the • Master of Science (MS) Degree in the field of Computer Science properties of computational systems and to show how this body of (https://ga.rice.edu/programs-study/departments-programs/ knowledge can be used to produce solutions to real-world computational engineering/computer-science/computer-science-ms/) problems.
    [Show full text]