[author : Jonathan Erickson] #Edito
[author : Jon Bentley and Robert Sedgewick]
When you have to store a set of strings, what data structure do you use? Jon and Robert suggest one place you can start is with ternary search trees, which combine the time efficiency of digital tries with the space efficiency of binary search trees.
[author : David Vandevoorde]
The stepwise derivation of the algorithm David presents here illustrates a number of principles that are widely applicable in algorithm design.
[author : Doug Stinson]
Threshold schemes have found many applications in various types of cryptographic protocols, including secure multiparty computations, key escrow/key recovery schemes, threshold cryptography, and electronic cash.
[author : Kari Granö, Jukka Paakki, Jukka Viljamaa, Antti Viljamaa]
Because of the complexity of communication systems, protocol engineering has evolved into a discipline that requires its own languages and tools. Kannel is an object-oriented programming language designed for protocol engineering.
[author : Jason Shankel]
The C++ Standard Template Library (STL) introduces the associative containers set, multiset, map, and multimap, which are based on red-black trees. Jason examines red-black trees and the specifics of the implementations used by the Hewlett-Packard and Silicon Graphics versions of the STL.
[author : Bruce Radtke]
Bruce examines Windows CE and its development environment, focusing on the differences between Version 1.0 and 2.0.
[author : Dale Roberts]
DIORQ, the program Dale presents here, analyzes NT's interrupt system, illuminating its problems, limitations, and potential.
[author : Pamela J. Taylor]
NetRexx is a programming language designed to make programming the Java Virtual Machine easier than with Java. Although NetRexx syntax is derived from Rexx, NetRexx is strongly typed, making it first-rate for programming the JVM and allowing access primitive (binary) datatypes.
[author : Philip Rousselle]
Phil examines dynamic distributed Java programming techniques by presenting "Sojourner," a load-balancing system that uses Voyager distributed computing infrastructure from Objectspace.
[author : Bryan Morgan]
Bryan examines the concepts behind CORBA-based development, using Borland's JBuilder and Visigenic's VisiBroker for Java.
[author : Michael Swaine]
Michael catches up on breaking news about the 400-year old Ylbvi-Nlliv algorithm, then turns his eye to Steve Jobs efforts to pull Apple back to the top.
[author : Al Stevens]
AntiPatterns and release 2 of his Persistent Template Library are the topics of Al's column this month.
[author : Cliff Berg]
How do you interface Java to your PalmPilot? Cliff shows you how, using IBM's new "PilotBean" Java interface.
[author : Gary D. Knott]
Delta modulation is a data-encoding technique that's particularly useful for transmitting fewer bits and archival storage. Gary examines the basic algorithm, then reviews variations that implement "adaptive" delta modulation.
[author : George Shepherd and Scot Wingo]
George and Scot continue their examination of the undocumented aspects of the Active Template Library, this month focusing on how ATL implements property pages for ActiveX Controls.
[author : Dennis E. Shasha]
In his inaugural column, Dr. Ecco faces a challenging problem when he's asked to determine where spacecraft will land on a distant planet.
[author : Robert Bernecky]
John Hennessy and David Patterson's Computer Architecture: A Quantitative Approach, Second Edition is a landmark computer-science book.
[author : you]
[author : the DDJ staff]
[author : Eugene Eric Kim]
[author : Michael Swaine]