Preface |
|
vii | |
|
|
1 | (28) |
|
|
2 | (1) |
|
Professionalism and Ethics |
|
|
3 | (1) |
|
|
3 | (5) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
Development Life Cycle Models |
|
|
8 | (5) |
|
|
10 | (1) |
|
|
11 | (1) |
|
The Evolutionary Development Model |
|
|
12 | (1) |
|
The Unified Modeling Language (UML) |
|
|
13 | (5) |
|
|
15 | (3) |
|
|
18 | (1) |
|
|
19 | (5) |
|
Growth Functions and Big O() Notation |
|
|
20 | (1) |
|
Comparing Growth Functions |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
Software Engineering and Data Structures |
|
|
24 | (5) |
|
|
29 | (54) |
|
Overview of Object-Orientation |
|
|
30 | (1) |
|
|
31 | (3) |
|
|
32 | (1) |
|
|
33 | (1) |
|
Class Libraries and Packages |
|
|
34 | (2) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (3) |
|
|
39 | (1) |
|
|
40 | (3) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
43 | (2) |
|
|
45 | (5) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (2) |
|
|
49 | (1) |
|
Passing Objects as Parameters |
|
|
50 | (1) |
|
|
50 | (2) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (3) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (4) |
|
|
56 | (2) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (4) |
|
|
61 | (1) |
|
|
62 | (2) |
|
|
64 | (1) |
|
|
64 | (6) |
|
References and Class Hierarchies |
|
|
65 | (1) |
|
Polymorphism via Inheritance |
|
|
66 | (2) |
|
Polymorphism via Interfaces |
|
|
68 | (2) |
|
|
70 | (1) |
|
|
71 | (12) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
The Exception Class Hierarchy |
|
|
73 | (10) |
|
|
83 | (36) |
|
Introduction to Collections |
|
|
84 | (3) |
|
|
85 | (2) |
|
|
87 | (1) |
|
|
87 | (5) |
|
|
89 | (2) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (4) |
|
Implementing a Set: With Arrays |
|
|
96 | (2) |
|
|
97 | (1) |
|
|
98 | (15) |
|
The size and isEmpty Operations |
|
|
101 | (1) |
|
|
102 | (2) |
|
|
104 | (1) |
|
The removeRandom Operation |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
109 | (2) |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
113 | (6) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
Analysis of find and contains |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
114 | (5) |
|
|
119 | (24) |
|
|
120 | (2) |
|
|
122 | (3) |
|
|
122 | (2) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
126 | (1) |
|
Implementing a Set: with Links |
|
|
126 | (9) |
|
|
127 | (3) |
|
|
130 | (1) |
|
The removeRandom Operation |
|
|
130 | (2) |
|
|
132 | (1) |
|
|
133 | (2) |
|
|
135 | (8) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
137 | (6) |
|
|
143 | (34) |
|
|
144 | (1) |
|
|
144 | (4) |
|
Implementing a Black Jack Game |
|
|
148 | (29) |
|
|
148 | (4) |
|
|
152 | (5) |
|
|
157 | (4) |
|
|
161 | (4) |
|
|
165 | (7) |
|
|
172 | (5) |
|
|
177 | (34) |
|
|
178 | (4) |
|
Using Stacks: Evaluating Postfix Expressions |
|
|
182 | (7) |
|
Using Stacks: Traversing a Maze |
|
|
189 | (6) |
|
Implementing Stacks: With Links |
|
|
195 | (3) |
|
|
195 | (1) |
|
|
196 | (2) |
|
|
198 | (1) |
|
Implementing Stacks: With Arrays |
|
|
198 | (3) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
Implementing Stacks: The java.util.Stack Class |
|
|
201 | (2) |
|
|
202 | (1) |
|
Inheritance and Implementation |
|
|
202 | (1) |
|
Analysis of Stack Implementations |
|
|
203 | (8) |
|
|
204 | (1) |
|
|
205 | (6) |
|
|
211 | (38) |
|
|
212 | (3) |
|
|
215 | (3) |
|
Using Queues: Ticket Counter Simulation |
|
|
218 | (4) |
|
|
222 | (5) |
|
Implementing Queues: With Links |
|
|
227 | (5) |
|
|
228 | (2) |
|
|
230 | (1) |
|
|
231 | (1) |
|
Implementing Queues: with Arrays |
|
|
232 | (3) |
|
|
232 | (1) |
|
|
233 | (2) |
|
|
235 | (1) |
|
Implementing Queues: With Circular Arrays |
|
|
235 | (4) |
|
Analysis of Queue Implementations |
|
|
239 | (10) |
|
|
240 | (1) |
|
|
241 | (8) |
|
|
249 | (40) |
|
|
250 | (7) |
|
Using Ordered Lists: Tournament Maker |
|
|
257 | (6) |
|
Using Index Lists: The Josephus Problem |
|
|
263 | (4) |
|
Implementing Lists: With Arrays |
|
|
267 | (6) |
|
|
267 | (3) |
|
|
270 | (1) |
|
The add Operation for an Ordered List |
|
|
270 | (1) |
|
Operations Particular to Unordered Lists |
|
|
271 | (1) |
|
Operations Particular to Indexed Lists |
|
|
272 | (1) |
|
Implementing Lists: With Links |
|
|
273 | (5) |
|
|
273 | (1) |
|
|
274 | (4) |
|
Analysis of List Implementations |
|
|
278 | (11) |
|
Analysis of Ordered List Implementations |
|
|
280 | (1) |
|
Analysis of Unordered List Implementations |
|
|
280 | (3) |
|
Analysis of Indexed List Implementations |
|
|
283 | (6) |
|
|
289 | (22) |
|
|
290 | (1) |
|
|
290 | (4) |
|
Implementing a Calculator |
|
|
294 | (17) |
|
|
294 | (6) |
|
The listPostfixEvaluator Class |
|
|
300 | (3) |
|
|
303 | (5) |
|
|
308 | (3) |
|
|
311 | (24) |
|
|
312 | (2) |
|
|
313 | (1) |
|
|
313 | (1) |
|
|
314 | (4) |
|
|
317 | (1) |
|
Direct vs. Indirect Recursion |
|
|
317 | (1) |
|
|
318 | (10) |
|
|
318 | (5) |
|
|
323 | (5) |
|
Analyzing Recursive Algorithms |
|
|
328 | (7) |
|
|
335 | (26) |
|
|
336 | (5) |
|
|
336 | (2) |
|
|
338 | (2) |
|
Comparing Search Algorithms |
|
|
340 | (1) |
|
|
341 | (20) |
|
|
345 | (2) |
|
|
347 | (1) |
|
|
348 | (3) |
|
|
351 | (3) |
|
|
354 | (7) |
|
|
361 | (34) |
|
|
362 | (3) |
|
|
363 | (2) |
|
Strategies for Implementing Trees |
|
|
365 | (3) |
|
Computational Strategy for Array Implementation of Trees |
|
|
365 | (1) |
|
Simulated Link Strategy for Array Implementation of Trees |
|
|
365 | (2) |
|
|
367 | (1) |
|
|
368 | (3) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
Implementing Binary Trees |
|
|
371 | (9) |
|
The removeLeftSubtree Method |
|
|
377 | (1) |
|
|
378 | (1) |
|
The iteratorInOrder Method |
|
|
379 | (1) |
|
Using Binary Trees: Expression Trees |
|
|
380 | (15) |
|
|
395 | (38) |
|
|
396 | (2) |
|
Implementing Binary Search Trees: With Links |
|
|
398 | (8) |
|
|
398 | (3) |
|
The removeElement Operation |
|
|
401 | (3) |
|
The removeAllOccurrences Operation |
|
|
404 | (1) |
|
|
405 | (1) |
|
Using Binary Search Trees: Implementing Ordered Lists |
|
|
406 | (4) |
|
Analysis of the BinarySearchTreeList Implementation |
|
|
409 | (1) |
|
Balanced Binary Search Trees |
|
|
410 | (4) |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
413 | (1) |
|
Implementing Binary Search Trees: Avl Trees |
|
|
414 | (3) |
|
Right Rotation in an AVL Tree |
|
|
414 | (1) |
|
Left Rotation in an AVL Tree |
|
|
414 | (1) |
|
Rightleft Rotation in an AVL Tree |
|
|
415 | (2) |
|
Leftright Rotation in an AVL Tree |
|
|
417 | (1) |
|
Implementing Binary Search Trees: Red/Black Trees |
|
|
417 | (6) |
|
Insertion into a Red/Black Tree |
|
|
418 | (3) |
|
Element Removal from a Red/Black Tree |
|
|
421 | (2) |
|
Implementing Binary Search Trees: The Java Collections API |
|
|
423 | (10) |
|
|
433 | (38) |
|
|
434 | (1) |
|
|
434 | (5) |
|
Implementing An Ancestor Tree |
|
|
439 | (32) |
|
|
439 | (1) |
|
The AncestorTreeNode Class |
|
|
439 | (1) |
|
|
439 | (12) |
|
|
451 | (16) |
|
|
467 | (4) |
|
|
471 | (26) |
|
|
472 | (4) |
|
|
472 | (3) |
|
|
475 | (1) |
|
|
476 | (1) |
|
|
476 | (1) |
|
Using Heaps: Priority Queues |
|
|
477 | (4) |
|
Implementing Heaps: With Links |
|
|
481 | (6) |
|
|
481 | (3) |
|
|
484 | (3) |
|
|
487 | (1) |
|
Implementing Heaps: With Arrays |
|
|
487 | (3) |
|
|
487 | (1) |
|
|
488 | (2) |
|
|
490 | (1) |
|
Analysis of Heap Implementations |
|
|
490 | (7) |
|
|
490 | (1) |
|
|
491 | (1) |
|
|
491 | (1) |
|
|
491 | (6) |
|
|
497 | (18) |
|
|
498 | (1) |
|
|
498 | (7) |
|
Inserting Elements into a 2-3 Tree |
|
|
499 | (2) |
|
Removing Elements from a 2-3 Tree |
|
|
501 | (4) |
|
|
505 | (1) |
|
|
506 | (1) |
|
|
507 | (2) |
|
|
507 | (1) |
|
|
508 | (1) |
|
|
508 | (1) |
|
Implementation Strategies For B-Trees |
|
|
509 | (6) |
|
|
515 | (30) |
|
|
516 | (2) |
|
|
518 | (3) |
|
|
519 | (1) |
|
|
519 | (1) |
|
|
520 | (1) |
|
The Radix Transformation Method |
|
|
520 | (1) |
|
The Digit Analysis Method |
|
|
520 | (1) |
|
The Length-Dependent Method |
|
|
521 | (1) |
|
Hashing Functions in the Java Language |
|
|
521 | (1) |
|
|
521 | (7) |
|
|
522 | (2) |
|
|
524 | (4) |
|
Deleting Elements From A Hash Table |
|
|
528 | (3) |
|
Deleting from a Chained Implementation |
|
|
529 | (1) |
|
Deleting from an Open Addressing Implementation |
|
|
529 | (2) |
|
Hash Tables in the Java Collections API |
|
|
531 | (14) |
|
|
531 | (2) |
|
|
533 | (1) |
|
|
533 | (1) |
|
The IdentityHashMap Class |
|
|
534 | (3) |
|
|
537 | (1) |
|
LinkedHashSet and LinkedHashMap |
|
|
538 | (7) |
|
|
545 | (24) |
|
|
546 | (2) |
|
|
548 | (1) |
|
|
549 | (2) |
|
|
551 | (9) |
|
|
551 | (4) |
|
|
555 | (1) |
|
|
556 | (3) |
|
Determining the Shortest Path |
|
|
559 | (1) |
|
Strategies for Implementing Graphs |
|
|
560 | (9) |
|
|
560 | (1) |
|
|
561 | (8) |
|
|
569 | (18) |
|
|
570 | (1) |
|
|
570 | (3) |
|
Implementing a Web Crawler |
|
|
573 | (14) |
|
|
573 | (7) |
|
|
580 | (4) |
|
|
584 | (3) |
Index |
|
587 | |