Nine Algorithms That Changed the Future
-
John MacCormick
and John MacCormick
About this book
Nine revolutionary algorithms that power our computers and smartphones
Every day, we use our computers to perform remarkable feats. A simple web search picks out a handful of relevant needles from the world's biggest haystack. Uploading a photo to Facebook transmits millions of pieces of information over numerous error-prone network links, yet somehow a perfect copy of the photo arrives intact. Without even knowing it, we use public-key cryptography to transmit secret information like credit card numbers, and we use digital signatures to verify the identity of the websites we visit. How do our computers perform these tasks with such ease? John MacCormick answers this question in language anyone can understand, using vivid examples to explain the fundamental tricks behind nine computer algorithms that power our PCs, tablets, and smartphones.
Author / Editor information
Reviews
"Excellent. . . . This is an unusually well-written text suitable for anyone with an interest in how today's information systems really work."—John Gilbey, Times Higher Education
"MacCormick leaves the reader with a sense of the engine that powers the networked world."—Kevin Slavin, New Scientist
"There's likely no better account of the software that underpins everything from Amazon to Facebook."—Brett Szmajda, Cosmos
Topics
-
Download PDFPublicly Available
Frontmatter
i -
Download PDFPublicly Available
CONTENTS
vii -
Download PDFPublicly Available
Foreword
ix -
Requires Authentication UnlicensedLicensed
1. Introduction: What Are the Extraordinary Ideas Computers Use Every Day?
1 -
Requires Authentication UnlicensedLicensed
2. Search Engine Indexing: Finding Needles in the World’s Biggest Haystack
10 -
Requires Authentication UnlicensedLicensed
3. PageRank: The Technology That Launched Google
24 -
Requires Authentication UnlicensedLicensed
4. Public Key Cryptography: Sending Secrets on a Postcard
38 -
Requires Authentication UnlicensedLicensed
5. Error-Correcting Codes: Mistakes That Fix Themselves
60 -
Requires Authentication UnlicensedLicensed
6. Pattern Recognition: Learning from Experience
80 -
Requires Authentication UnlicensedLicensed
7. Data Compression: Something for Nothing
105 -
Requires Authentication UnlicensedLicensed
8. Databases: The Quest for Consistency
122 -
Requires Authentication UnlicensedLicensed
9. Digital Signatures: Who Really Wrote This Software?
149 -
Requires Authentication UnlicensedLicensed
10. What Is Computable?
174 -
Requires Authentication UnlicensedLicensed
11. Conclusion: More Genius at Your Fingertips?
199 -
Requires Authentication UnlicensedLicensed
Acknowledgments
205 -
Requires Authentication UnlicensedLicensed
Sources and Further Reading
207 -
Requires Authentication UnlicensedLicensed
Index
211