Full Notes (300 pages, .8Mbytes compressed)Notes by topic
Front Part (Abstract, TOC, and List of Algorithms) 1Compression 1 (Ben Zhao) 14Compression 2 (Gabriel Moy) 23Compression 3 (Ben Liblit) 33Cryptography 1 (Tzu-Yi Chen) 51Cryptography 2 (David Oppenheimer) 59Cryptography 3 (Marat Boshernitsan) 72Linear Programming 1 (Richard Davis) 80Linear Programming 2 (Steven Czerwinski) 95Integer Programming 1 (Andrew Begel) 109Integer Programming 2 (Stephen Chenney) 116Triangulation 1 (Aaron Brown) 128Triangulation 2 (Franklin Cho) 144Triangulation 3 (Michael Downes) 154N-body 1 (Tajh Taylor) 165N-body 2 (Steven Gribble) 183VLSI 1 (Rich Vuduc) 195VLSI 2 (Mehul Shah) 210VLSI 3 + Pattern Matching 1 (Noah Treuhaft) 220Pattern Matching 2 (Felix Wu) 226Indexing 1 (Helen Wang) 234Indexing 2 (Ben Horowitz) 246Indexing 3 and Evolutionary Trees (Amar Chaudhary) 262Clustering 1 (Josh MacDonald) 272Eric Brewer on Hotbot (Carleton Miyamoto) 280References and Assignments 289
Information on algorithms available on the web:
A small sample of companies that sell products that use various algorithms:
OptimizationGeometry and MeshingBiologyCryptographyCPLEX
CAPS Logistics
IBM OSL
Astrokettle
APC
Carmen Systems
Lindo Systems
LogicTools Fluent
Geomagic
Pointwise
Ansys
FEGS
CFDRC
Marc
Femsys
AVL Celera
Curagen
HGSI
MLNM
Hyseq
Genset
Incyte
Variagenics Algorithmic Research
RSA Security
Entrust
Cryptomathic
Netegrity
InterTrust
Zero Knowledge
Mach 5