Comprehensive resources for Advanced Algorithms topics. Cross-references between weeks and additional materials for exam preparation.
Chapter 16: Greedy Algorithms, Chapter 23: Minimum Spanning Trees, Chapter 24: Single-Source Shortest Paths
TextbookFoundational
Chapter 6: Greedy algorithms with practical problems and pitfalls. Great for understanding when greedy works.
Reference
Original paper on maximum flow. Introduces the concept of augmenting paths and residual graphs.
PaperClassic
Comprehensive textbook on LP, Simplex method, duality, and interior point methods.
Textbook
Detailed notes on Simplex algorithm, pivoting, and degenerate cases.
Course Notes
Understanding the failure function (prefix table) is crucial. It encodes info about pattern overlaps with itself.
Core Concept
Shannon Entropy determines theoretical limit of lossless compression. Knowing entropy helps set realistic expectations.
Theory
Huffman's algorithm produces optimal prefix code because:
Many stream problems have been proven to require Omega(log n) or Omega(sqrt(n)) space. No "free lunch" in streaming.
Theory
P(FP) ~ (1 - e^(-kn/m))^k, where k = hash functions, n = inserted items, m = bit array size.
Minimize by choosing k = (m/n) * ln(2) ~ 0.693 * (m/n)
Formula
The definitive textbook on randomized algorithms. Covers concentration bounds, derandomization techniques.
TextbookAdvanced
| Type | Running Time | Correctness | Example |
|---|---|---|---|
| Las Vegas | Probabilistic | Always correct | Randomized Quicksort |
| Monte Carlo | Deterministic | Probably correct | Miller-Rabin primality test |
Expected O(n log n) time regardless of input. Eliminates adversarial worst case. Practical and widely used.
O(k log^3 n) deterministic test with error probability 4^(-k). Industry standard for cryptography.
Find k-th smallest in O(n) expected time. Uses random pivot like Quicksort.
Advanced Algorithms Cheat Sheet - All Weeks | Last Updated 2024