05177 PIE INDEX renumjoan/intro/pieindex.pdf · Assignment statement, 219, 283 Association (UML),...
Transcript of 05177 PIE INDEX renumjoan/intro/pieindex.pdf · Assignment statement, 219, 283 Association (UML),...
in
de
x
+ (concatenation), 284:= (assignment operator), 283:- (Prolog if symbol), 318/* (comment), 287// (comment), 287= (assignment operator), 283.NET Framework, 173, 344, 553
AAbacus, 20Abstract data type, 394Abstraction, 26, 369, 384, 386Abstract tools, 27, 40, 220, 337, 369, 386, 390Access (Microsoft database system), 414Access time, 48Activation (of a procedure), 246Active Server Pages (ASP), 189Actors, 348Actual parameter, 291Ada, 277, 283, 312, 551Adaptive dictionary encoding, 78Adaptor pattern, 351Address (of memory cell), 44Address polynomial, 374Adleman, Leonard, 200, 529Administrator, 155Adobe Systems, 58Agent, 452Aiken, Howard, 22Alexander, Christopher, 352Algebraic coding theory, 86Algorithm, 18, 213, 215
discovery of, 223complexity/efficiency of, 249representation of, 215verification of, 253
Algorithm analysis, 250
ALVINN. See Autonomous Land Vehicle in a NeuralNet
Ambiguous grammar, 300AMD, 96American Institute of Electrical Engineers, 330America Online, 441American National Standards Institute (ANSI), 53,
55, 271American Standard Code for Information
Interchange (ASCII), 54, 543Analog (vs. digital), 65Analytical Engine, 21, 22AND, 36, 113Anonymous FTP, 178Anticybersquatting Protection Act, 204Antivirus software, 199APL, 283Apple Computer, Inc. ,25, 57, 99, 136, 179Applet, 189Application layer (Internet), 191Application Programmer Interface (API), 343Application software, 140Argument (of a predicate), 317Aristotle, 30Arithmetic/logic unit, 96Arithmetic shift, 115Array
heterogeneous, 281, 366, 374homogeneous, 312, 366, 371
Artificial intelligence, 451, 456Artificial neural network, 124, 480ASCII. See American Standard Code for Information
InterchangeAsimo, 490ASP. See Active Server PagesAssembler, 269Assembly language, 269
601
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 601
Index602
Assertion, 256Assignment statement, 219, 283Association (UML), 349Association analysis, 440Association for Computing Machinery (ACM), 329,
330Associative memory, 486Atanasoff-Berry machine, 23Atanasoff, John, 23AT&T, 257Athlon (cpu), 96Attribute, 413Auditing Software, 155, 199Authentication, 202, 436Autonomous Land Vehicle in a Neural Net
(ALVINN), 478, 485Average-case analysis, 250Axiom, 255Axon, 480
BBabbage, Charles, 21, 22, 551Backtracking, 403Balanced tree, 383Bandwidth, 123Bare Bones language, 509, 559
Universality of, 513Base (of stack), 366Base case (recursion), 246Base Two. See Binary system Basic Input/Output System, 146Basis path testing, 353Batch processing, 136Beethoven’s Fifth Symphony, 187Behavior-based intelligence, 473Bell Laboratories, 22, 551, 552Benchmark, 112Beta testing, 353Beta version, 353Berners-Lee, Tim, 181Berry, Clifford, 23Best-case analysis, 250Big O notation, 521Big theta notation, 253Binary file (FTP), 178
Binary notation. See Binary system Binary search algorithm, 246, 249, 386
complexity of, 249, 521Binary system, 55, 60Binary tree, 368, 381Bioinformatics, 440BIOS. See Basic Input/Output SystemBit, 36Bit map, 56, 114Bits per second (bps), 82, 122Black-box testing, 353Body (of a loop), 232Boole, George, 36Boolean data type, 279Boolean operations, 36Booting, 145Bootstrap, 145Bourne shell, 142Bottom (of stack), 366Bottom-up methodology, 227Boundary value analysis, 354Bps. See Bits per secondBranch (tree), 368Breadth-first search, 470Bridge, 168Broadband, 123Browser, 181Bubble sort algorithm, 239, 241Bucket (hashing), 435Buffer, 53Bus, 96Bus network topology, 164Byron, Augusta Ada, 22Byte, 43Bytecode, 298
CC, 276, 277, 278, 279, 280, 286, 291, 372, 551C++, 276, 277, 278, 279, 281, 282, 286, 287, 306, 308,
309C#, 276, 277, 278, 279, 281, 282, 286, 287, 306, 308,
309, 343Cache memory, 98Call (procedure), 289Camel casing, 222
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 602
603Index
Carnegie-Mellon University, 203, 478Carnivore, 204Carriage return, 178Carrier Sense, Multiple Access with Collision
Detection (CSMA/CD), 167Cascading rollback, 428CASE. See Computer-aided software engineeringCase control structure, 285CASE tools, 330CD. See Compact diskCD-DA. See Compact disk-digital audioCell (memory), 43Celeron (cpu), 96Central processing unit (CPU), 96CERN, 183CERT. See Computer Emergency Response TeamCertificate, 202Certificate authority, 202CGI. See Common gateway interfaceCharacter-based ethics, 30Character data type, 279Check byte, 84Check sum, 84Children (in a tree), 368Chip, 41Chrominance, 57Church, Alonzo, 507Church–Turing thesis, 507, 559Circular queue, 380Circular shift, 115CISC. See Complex instruction set computerClass, 276, 395Class description, 439Class diagram, 349Class discrimination, 439Class library (.NET Framework), 343Class-responsibility-collaboration (CRC) cards, 351Clause form, 315Client, 170Client/Server model, 270Client-side, 188Clock, 42, 110Closed network, 164Closed-world assumption, 477Cloud (Internet), 174
Clowes, M. B., 592Cluster analysis, 440Clustering (hashing), 437COBOL, 270Code generator, 297Code generation, 303Code optimization, 303Coercion, 302Cohesion (intramodule), 342Collaboration diagram, 340Collision (hashing), 438Colossus, 23Column major order, 373Comments, 277, 287Commit point, 428Commit/Rollback protocol, 428Commodore, 25Common gateway interface (CGI), 189Communication Assistance for Law Enforcement Act
(CALEA), 204Compact disk (CD), 49Compact disk-digital audio (CD-DA), 50, 86Compiler, 270Complement (of a bit), 67Complex instruction set computer (CISC), 99, 102Complexity/Efficiency, 520
of binary search, 249, 521of insertion sort, 250, 522of merge sort, 522of sequential search, 249, 521
Component (of an array), 366Component (of software), 304, 343Component architecture, 304, 343Component assembler, 304, 344CompuServe, 79Computable function, 504Computer-aided design (CAD), 58Computer-aided software engineering (CASE), 330Computer Emergency Response Team (CERT), 203Computer Fraud Abuse Act, 203Computer Science (definition), 18, 25Computer Society, 330Concatenation, 284Concurrent processing, 312Conditional jump, 100
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 603
Index604
Connectionless protocol, 195Consequence-based ethics, 30Constant, 282Constructor, 308Context switch, 148Contextual analysis, 461Contiguous list. See ListContract-based ethics, 30Control coupling, 341Controller, 118Control of repetitive structures
iteration (looping), 232recursion, 246
Control statements, 284Control unit, 96Cookies, 209Copyright law, 356Core, 129Core wars, 129Country-code TLD, 176Coupling (intermodule), 340CPU. See Central processing unitCRC cards. See Class-responsibility-collaboration
cardsCritical region, 152Cross-platform software, 271C shell, 142CSMA/CD. See Carrier Sense, Multiple Access with
Collision DetectionCybersquatting, 204Cyclic redundancy checks, 84Cylinder, 47
DDartmouth College, 456Darwin, Charles, 492Database, 408Database management system (DBMS), 410Database model, 412Data compression, 77Data coupling, 341Data cubes, 441Data dictionary, 347Dataflow diagram, 345Data independence, 411
Data mining, 439Data structure, 280
Dynamic vs. static, 369Data type, 278
Boolean, 279Character, 279Float, 278Integer, 278Real, 278
Data warehouse, 439Deadlock, 152Deadlock avoidance, 153Deadlock detection/correction, 152Debugging, 268Declarative knowledge, 453Declarative paradigm, 273Declarative statements, 277Decorator pattern, 351Decryption keys, 529Defect testing, 335Defense Advanced Research Projects Agency
(DARPA), 173, 203Degenerative case (recursion), 246Dendrite, 480Denial of service, 197Depth (of a tree), 368Depth-first search, 470Design pattern, 383Device driver, 144Dewey, John, 538Dictionary encoding, 78Difference engine, 21, 22, 24Differential encoding, 78Digital (vs. analog), 65Digital camera, 57Digital signature, 202Digital subscriber line (DSL), 122Digital versatile disk (DVD), 51Digital zoom, 57Dijkstra, E. W., 160Dining philosophers, 160Direct addressing, 399Directed graph, 154, 464Direct memory access (DMA), 120Directory, 143
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 604
605Index
Directory path, 144Disclaimer, 358Discrete cosine transform, 80Diskette, 48Disk storage (magnetic), 47Dispatcher, 145Distributed database, 410, 411Distributed system, 172DMA. See Direct memory accessDNS. See Domain name systemDOCTOR (ELIZA) program, 456Documentation, 354
by comment statements, 287Domain, 173Domain name, 176Domain name system, 177Dotted decimal notation, 59, 176DRAM. See Dynamic memoryDual-core cpu, 124Duty-based ethics, 30DVD. See Digital versatile diskDynamic memory, 44
EEckert, J. Presper, 23, 105Edge enhancement, 458Edison, Thomas, 105, 330Editor, 54, 304Effective, 213Effective input (of a processing unit), 481Eight-puzzle, 454Electronic Communication Privacy Act
(ECPA), 203Email, 178Encapsulation, 311Encryption keys, 429End-of-file (EOF), 432ENIAC, 23Enterprise JavaBeans, 172Entity-relationship diagram, 346ELIZA program, 456EOF. See End-of-file Error-correcting code, 84Ethernet, 165, 170Ethics, 30
Euclid, 18Euclidean algorithm, 223Euclidean geometry, 255Even parity, 84Event-driven software, 296Evolutionary programming, 479Evolutionary prototyping, 336Evolutionary robotics, 491Exception, 551Excess notation, 69Exclusive lock, 429Exclusive or (XOR), 37, 113, 115Expert system, 467Explicit coupling, 341Exponent field, 73Exponential time, 525Extensible Markup Language (XML), 187Extreme programming, 336
FFactorial, 262Fibonacci sequence, 260Field (in a record), 52FIFO. See First in, first outFile, 51File descriptor, 144File manager, 143File server, 171File transfer protocol (FTP), 178, 194Firewall, 198FireWire, 118, 121First-generation language, 269First in, first out (FIFO), 136, 367First-order predicate logic, 315Fixed-format language, 297Flash, 189Flash drive, 51Flash memory, 51Flat file, 408Flip-flop, 39Floating-point notation, 56, 72
normalized form, 74Floppy disk, 48Flowchart, 218, 234Flowers, Tommy, 23
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 605
Index606
Folder, 143Forking, 152Formal language, 270Formal logic, 274Formal parameter, 291Formatting (a disk), 48For statement, 286FORTRAN, 270, 277, 280, 281, 286, 556Frame problem, 477Framework (.Net), 173, 352, 553Free-format language, 297Frequency-dependent encoding, 77Frequency masking, 81FTP. See File Transfer ProtocolFTPS, 200FTP server, 178FTP site, 178Full tree, 383Function
abstract, 274, 502computation of, 502program unit, 220, 274, 295
Functional cohesion, 342Functional paradigm, 274
GG5 (cpu), 99Gandhi, Mahatma, 492Garbage collection, 389Gate, 37Gateway, 174GB. See GigabyteGbps. See Giga-bpsGeneral Motors, 133General-purpose register, 96Generations (of programming languages), 269Genetic algorithms, 478Gibi, 45GIF, 79Giga-bps (Gbps), 82, 122Gigabyte, 45Gigahertz, 110Glass-box testing, 353Global data, 341Global variable, 289
Goal directed behavior, 452Gödel, Kurt, 20, 25, 508Gödel’s incompleteness theorem, 20, 25Goto statement, 284Grammar, 298Graph, 464Graphical user interface (GUI), 142Graph theory, 353Greatest common divisor, 18GUI. See Graphical user interface
HHalting problem, 515Hamming, R. W., 84Hamming distance, 84Handshaking, 120Hard disk, 48Hardware, 18Harvard University, 22, 255Hash function, 435Hash file, 435Hash table, 435Hashing, 434Head (of a list), 366Head crash, 48Head pointer, 376, 379Heap sort algorithm, 241Heathkit, 25Help packages, 354Hertz (Hz), 110Heterogeneous array, 281, 366, 374Heuristic, 470Hexadecimal notation, 41High-order end, 43Hill climbing, 593Hollerith, Herman, 22Home page, 182Homogeneous array, 280, 366, 371Honda, 490Hop count, 196Hopfield networks, 486Hopper, Grace, 270, 460Host, 172Host address, 176Hot spot, 175
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 606
607Index
HTML. See Hypertext Markup LanguageHTTP. See Hypertext Transfer ProtocolHTTPS, 200Hub, 165Huffman code, 77Huffman, David A., 77, 592Hyperlink, 180Hypermedia, 180Hypertext, 180Hypertext Transfer Protocol (HTTP), 181, 194Hypertext Markup Language (HTML), 183
IIBM, 22, 25, 99, 136, 166, 357ICANN. See Internet Corporation for Assigned
Names and NumbersIEEE Computer Society, 330IEEE 802, 170Identifiers, 269If statement, 219, 285I-frame, 81Image analysis, 458Image processing, 458IMAP. See Internet Mail Access ProtocolImitation (learning by), 478Immediate addressing, 399Imperative paradigm, 273, 337, 344Imperative statements, 277Implicit coupling, 341Inconsistent (statements), 315Incorrect summary problem, 429Incremental model, 336Incubation period (problem solving), 226Indexed file, 433Indices, 280Indirect addressing, 399Inference rule, 314, 466Information extraction, 461Information retrieval, 461Inheritance, 309, 350Input/output (I/O), 100Input/output instructions (machine level), 100, 120IRobot Roomba vacuum cleaner, 490Insertion sort algorithm, 238
complexity of, 250, 522
Instance (of a class), 276, 307Instance (of a data type), 393Instance variable, 307Institute of Electrical and Electronics Engineers
(IEEE), 330, 333Institute of Radio Engineers, 330Instruction pointer, 370Instruction register, 106Integer data type, 278Intel, 96Interactive processing, 138International Court of Justice, 202International Organization for Standardization (ISO),
54, 57, 194, 271Internet, 169Internet (the), 169, 173Internet, 18, 174Internet Corporation for Assigned Names and
Numbers (ICANN), 173Internet mail access protocol, 179Internet Protocol (IP), 194Internet service provider, 174Interpreter, 270Interprocess communication, 170Interrupt, 148Interrupt disable instruction, 151Interrupt enable instruction, 151Interrupt handler, 149Intractable problem, 526I/O. See Input/outputI/O bound, 159Iowa State College (University), 23IP. See Internet ProtocolIP address, 176IPv4, 196IPv6, 196IQ test, 492ISO. See International Organization for
StandardizationISP. See Internet service providerIterative structures, 229, 559Iverson, Kenneth E., 283
JJacquard, Joseph, 22
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 607
Index608
Jacquard loom, 22Java, 189, 276, 277, 278, 279, 281, 282, 284, 286, 287,
298, 306, 308, 309, 312, 345, 372, 395, 396, 558JavaBeans, 344JavaScript, 189JavaServer Pages (JSP), 189JCL (job control language), 139Job, 136Job queue, 136Jobs, Steve, 23JOIN (database operation), 418Joint Photographic Experts Group, 80JPEG, 80JSP. See JavaServer Pages
KKB. See KilobyteKbps. See Kilo-bpsKernel, 143Key (cryptography), 201Key field, 52, 432, 433, 435Key words, 298Kibi, 45Kibibyte, 45Kill (a process), 153Kilo-bps (Kbps), 82, 122Kilobyte, 45Knapsack problem, 537Korn shell, 142
LLAN. See Local area networkLanguage extensions, 271Last in, first out (LIFO), 367Latency time, 48Leaf node, 368Least significant bit, 43Left child pointer, 381Lempel, Abraham, 78Lempel–Ziv-Welsh encoding, 78Leonardo da Vinci, 105Lexical analysis, 297Lexical analyzer, 297Lg (logarithm base two), 250, 524Liebniz, Gottfried Wilhelm, 21
LIFO. See Last in, first outLinear algebra, 86Line feed, 178Linguistics, 455Link layer (Internet), 191Linux, 136, 142LISP, 274List, 366
contiguous, 376linked, 376
Literal, 282Load balancing, 139Load factor (hash file), 438Local area network (LAN), 164Local variables, 289Locking protocol, 429Logarithm (base2), 250Logical cohesion, 342Logical deduction, 466Logical record, 52Logical shift, 115Logic programming, 274, 317, 479Login, 155Long division algorithm, 18, 214Lookahead carry adder, 547Look and feel, 357Loop, 232Loop invariant, 256Loop structures. See Iterative structureLord of the Rings, 453Lossless compression, 77Lossless decomposition, 417Lossy compression, 77Lost update problem, 429Lotus Development Corporation, 357Lotus 1-2-3, 357Loveless, Ada, 22Low-order end, 43Luminance, 57
MMachine cycle, 106Machine independence, 269Machine instructions, 99, 549
ADD, 103, 116
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 608
609Index
AND, 100BRANCH, 100HALT, 102Interrupt disable, 151Interrupt enable, 151I/O, 100, 120JUMP, 100, 107, 284LOAD, 100, 103, 119OR, 100ROTATE, 100SHIFT, 100STORE, 100, 102, 119Test-and-set, 152XOR (exclusive or), 100
Machine language, 99, 397, 549Mac OS, 136Macromedia, 189Magnetic disk, 47Magnetic tape, 49Mail server, 178Main memory, 43Malware, 196MAN. See Metropolitan area networkManchester encoding, 170Mantissa field, 73Many-to-many relationship, 346Mark I, 22, 255Markup language, 187Mask, 114Masking, 114Mass storage, 46Master file, 432Matrix theory, 86Mauchly, John, 23MB. See MegabyteMbps. See Mega-bpsMcCarthy, John, 456MD5, 436Mebi, 45Mebibyte, 45Mega-bps (Mbps), 82, 122Megabyte, 45Megahertz, 45Member function, 307Memory leak, 389
Memory manager, 144Memory mapped I/O, 119Merge algorithm, 433Merge sort algorithm, 241, 522
Complexity of, 522Meta-reasoning, 477Method, 275, 307Metric, 328Metropolitan area network (MAN), 164Microsecond, 129Microsoft Corporation, 25, 57, 136, 137, 173, 179,
189, 290, 344, 352, 414, 553MIDI. See Musical Instrument Digital InterfaceMiller, George A., 218Millisecond, 49MIMD, 125Modem, 122Mod, 530Modular notation, 530Modularity, 337Module, 220, 337Mondrian, Piet, 242Monitor, 313Moore School of Engineering, 23, 105Mosaic Software, 357Most significant bit, 43Motherboard, 96Motion Picture Experts Group (MPEG), 81Motorola, 99Mouse, 142MP3, 81MPEG. See Motion Picture Experts Group MS-DOS, 142Multiplexing, 122Multitasking, 139Musical Instruments Digital Interface (MIDI), 58Mutual exclusion, 152MySQL, 422
NName server, 177NAND, 43Nanosecond, 48NASA Mars rover, 490Natual language, 270
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 609
Index610
Natural language processing, 455, 460NET (.NET Framework), 173, 352Netscape Communications, Inc., 189Network, 164Network topologies, 164Network identifier, 176Network layer (Internet), 191Network Virtual Terminal (NVT), 180Neuron, 125, 480Neural network (biological), 125, 480Newton, Isaac, 329NIL pointer, 376Node, 368, 464Nondeterministic algorithm, 213, 527Nondeterministic polynomial (NP) problems, 528Nondisclosure agreement, 358Nonloss decomposition, 417Nonterminal, 299NOR, 42Normalized form, 74NOT, 37Novell, Inc., 164NP problems. See Nondeterministic polynomial prob-
lemsNP-complete problem, 528NULL pointer, 376Numerical analysis, 75
OObject, 275, 305Object-oriented database, 424Object-oriented paradigm, 275, 337, 343, 344, 348Object-oriented programming, 275Object program, 297Odd parity, 83Off-line, 46One-to-many relationship, 346One-to-one relationship, 346On-line, 46OOP. See Object-oriented programmingOp-code, 101Open network, 164Open-source development, 336Open (file operation), 144Open System Interconnect (OSI), 195
Operand, 101Operating system, 136Operator precedence, 283Optical zoom, 57OR, 36, 113, 114Orwell, George (Eric Blair), 32OSI. See Open System InterconnectOSI reference model, 195Outlier analysis, 440Overflow error, 69Overloading, 284
PP. See Polynomial problems P2P. See Peer-to-peer modelPacket, 193Page (memory), 145Paging, 145Parallel algorithm, 213Parallel communication, 121Parallel processing, 124, 312Parameter, 221, 291
passed by reference, 292passed by value, 292passed by value-result, 322
Parent node, 368Pareto principle, 352Pareto, Vilfredo, 352Parity bit, 83Parser, 297Parse tree, 300Parsing, 297Pascal, Blaise, 21Pascal casing, 222Password, 156Patent law, 357PC. See Personal computerPeer-to-peer model, 171Pentium (cpu), 96, 99, 255Performance oriented research, 455Persisent (object), 425Personal computer (PC), 25Personal digital assistant (PDA), 25, 51PGP. See Pretty good privacyPhishing, 197
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 610
611Index
PHP Hypertext Processor, 189Physical record, 52Pipelining, 124Pixel, 56Planned obsolescence, 133Plato, 30Poincare, H., 226Pointer, 369, 379Polya, G., 224Polymorphism, 311Polynomial problems, 525Pop (stack operation), 367POP3. See Post Office Protocol-version Port (I/O), 118Port number, 194Post, Emil, 508Post Office Protocol-version 3 (POP3), 179PostScript, 57Posttest loop, 235PowerPC, 99Precedence (of operators), 283Preconditions (proof of correctness), 255Predicate, 317Pretest loop, 235Pretty good privacy, 200Prime number, 437Primitive, 217Primitive data type, 279Print server, 170Privacy Act of, 442Private key, 201, 530Privileged instructions, 157Privilege levels, 157Problem solving, 223Procedural knowledge, 453Procedural paradigm, 273Procedure, 220, 289Procedure call, 289Procedure’s header, 289Process, 147, 215Processing unit (neural net), 480Process state, 147Process switch, 148Process table, 148Production system, 464
control system, 464goal state, 464production, 464start state, 464state graph, 464
Program, 18, 215Programmer, 304, 334Program counter, 106Programming language, 217Programming paradigms, 272PROJECT (database operation), 418Prolog, 317Proof by contradiction, 517Proof of correctness, 254Proprietary network, 164Protocol, 166Prototype, 336proxy server, 199Pseudocode, 218Public key, 201, 530Public-key encryption, 200, 530Push (stack operation), 367
QQueue, 136, 367, 379Quick sort algorithm, 241
RRadio Shack, 25Radix point, 63RAM. See Random access memoryRandom access memory (RAM), 44Rapid prototyping, 336Ravel, Maurice, 181Reactive robot, 490Read-only memory (ROM), 145Read operation, 44, 96Ready (process), 148Real data type, 278Real-time processing, 138Real-world knowledge, 452, 476Recursion, 240, 246Recursive function theory, 502Recursive structures, 240, 559Reduced instruction set computer (RISC), 99, 102
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 611
Index612
Reference, 379Reflex action, 452Refresh circuit, 44Region finding, 458Register, 96Registrar, 173Reinforcement (learning by), 478Relation (database), 413Relational database model, 413Relative addressing, 566Relative encoding, 78Reliable protocol, 195Repeat control structure, 234Repeater, 168Requirements (of software), 333Reserved words, 298Resolution, 314Resolvent, 315Responsible technology, 538Right-child pointer, 381Ring network topology, 164, 166Ripple adder, 547RISC. See Reduced instruction set computerRisks forum, 345Ritchie, Dennis, 551Rivest, Ron, 200, 529RMI. See Remote method invocationRobocup, 490Robotics, 489Rogerian thesis, 456Roll back, 428ROM. See Read-only memoryRoot node, 368Root pointer, 381Rotation, 115Rotation delay, 48Round-off error, 74Router, 169Row major order, 373RSA algorithm, 200, 529, 531Run-length encoding, 77
SScalable fonts, 57Scaling, 139
Scheduler, 145Schema, 408Scope (of a variable), 289SDRAM. See Synchronous DRAMSearch engine, 182Search tree, 467Second-generation language, 269Sector, 47Secure shell (SSH), 180Secure sockets layer (SSL), 200Security, 155, 196Seek time, 48SELECT (database operation), 417Selection sort algorithm, 239, 241Selective Service, 442Self-reference, 515Self-terminating program, 516Semantic analysis, 460Semantic net, 462Semantics, 217Semantic Web, 188, 461Semaphore, 152Sempron (cpu), 96Sentinel, 432Sequential file, 430Sequential pattern analysis, 440Sequential search algorithm, 231, 249
complexity of, 249, 521Serial communication, 121Server, 170Server-side, 188Servlet, 189Set theory, 255SGML. See Standard Generalized Markup LanguageShamir, Adi, 200, 529Shared lock, 429Shell, 142Siblings (in a tree), 368Sign bit, 67, 72SIMD, 124Simulation oriented research, 455SISD, 124Sloan, Alfred, 133Smoothing, 459Sniffing software, 156, 197
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 612
613Index
Social Security Administration, 443Software, 18Software analyst, 334Software engineering, 328Software life cycle, 331Software requirements document, 333Software verification, 253Source (version of web page), 183Source program, 296Space complexity, 524Spam, 198Spam filters, 199Special-purpose register, 96Specifications (of software), 333Spoofing, 198Spooling, 153Spreadsheet systems, 76, 478Spyware, 197SQL. See Structured Query LanguageSSH. See Secure shellSSL. See Secure sockets layerStack, 366, 378Stack pointer, 378Standard Generalized Markup Language (SGML), 187Standard Template Library (STL), 343, 396Star network topology, 164Starvation, 160State
of process, 147of production system, 464of Turing machine, 505
State graph, 464Status word, 120Stepwise refinement, 227Stibitz, George, 22Stored program concept, 98Stream, 41Strong AI, 459Strongly typed, 302Stroustrup, Bjarne, 552Structure chart, 338Structured programming, 285Structured Query Language (SQL), 422Structured walkthrough, 351Subprogram, 220
Subroutine, 220Subschema, 409Substantial similarity, 356Subtree, 368Successor function, 507, 513Sun Microsystems, 172, 189, 298, 344, 352, 558Super user, 155Supervised training, 478Switch, 168Symbol table, 302Synapse, 481Synchronous DRAM, 45Syntactic analysis, 460Syntax, 217Syntax diagram, 298System documentation, 354System requirements, 333System software, 140System specifications, 333System/360 (IBM), 357
TTag (in markup language), 183Tail (of a list), 366Tail pointer, 379Task, 312TCP. See Transmission Control ProtocolTCP/IP protocols, 194Technical documentation, 355Telnet, 179Temporal masking, 81Terminal (in a syntax diagram), 299Terminal node, 368Termination condition, 233Test-and-set instruction, 152Testing (software), 257Text editor, 54Text file, 54, 431Text file (FTP), 178Therac-25, 345Third-generation language, 269Thoreau, Henry David, 162Thread, 312Threshold, 481Throughput, 124
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 613
Index614
Throwaway prototyping, 336TIFF, 81Time complexity, 521Time-sharing, 139, 148Time slice, 148TLD. See Top-level domainToken (in a network), 167Token (in a translator), 297Token ring protocol, 166Top-down methodology, 227Top-level domain (TLD), 176Top of stack, 366Topology (of a network), 164Torvalds, Linus, 142Towers of Hanoi, 262Track, 47Trade secret law, 357Training set, 478Transaction file, 432Transcendental functions, 595Transfer rate, 48Translation, 296Translator, 270Transmission Control Protocol (TCP), 194Transport layer (Internet), 191Traveling salesman problem, 526Tree, 367Trigonometric functions, 503Trojan horse, 197TrueType, 57Truncation error, 74Tuple (in a relation), 413Turing, Alan M., 455, 456, 504, 507, 508Turing computable, 507Turing machine, 504, 508Turing test, 455Turn key system, 147Two’s complement notation, 56, 66Type. See Data type
UUDP. See User Datagram ProtocolUML. See Unified Modeling LanguageUnconditional jump, 100Unicode, 54
Unification, 317Unified Modeling Language (UML), 348Uniform resource locator (URL), 181Universal programming language, 509Universal serial bus (USB), 118, 121University of Helsinki, 142University of Pennsylvania, 23, 105UNIX, 136, 179Unmanned Aerial Vehicle (UAV), 490Unsolvable problem, 519URL. See Uniform resource locatorUSA PATRIOT Act, 204USB. See Universal serial busU.S. Department of Defense, 333, 551Use case, 348Use case diagram, 348User Datagram Protocol (UDP), 195User-defined data type, 392User documentation, 354Utilitarianism, 30Utility software, 141
VValidation testing, 335Variable, 278Variable-length codes, 77Vector (image representation), 56Verification (of software), 253Virtual memory, 145Virus, 197, 456Visual Basic, 290Voice over Internet, 177Voice over IP. See Voice over InternetVOIP. Voice over Internetvon Helmholtz, H., 226von Neumann architecture, 120, 124von Neumann bottleneck, 120von Neumann, John, 98, 105
WW3. See World Wide WebW3C. See World Wide Web ConsortiumWAN. See Wide area networkWaiting (process), 148Waltz, D., 592
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 614
615Index
Waterfall model, 89Weak AI, 459Web, 181Web page, 181Web server, 181Website, 181Weight (in a processing unit), 482Weighted sum, 481Weizenbaum, Joseph, 456, 493Welsh, Terry, 78While control structure, 220, 234, 285, 432Wide area network (WAN), 164Window manager, 143Window (in GUI), 143Windows (operating system), 136, 290Word processor, 54, 478World War II, 23, 270World Wide Web, 181
World Wide Web Consortium (W3C), 183Worm, 197Worst-case analysis, 250Wound-wait protocol, 430Wozniak, Stephen, 23Wright brothers, 105Write operation, 44, 96WWW. See World Wide Web
XXHTML, 187XML. See Extensible Markup LanguageXOR. See Exclusive orXP. See Extreme programming
ZZiv, Jacob, 78Zoned-bit recording, 47
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 615
Notes
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 616
Notes
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 617
Notes
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 618
Notes
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 619
Notes
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 620
Notes
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 621
Notes
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 622
Notes
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 623
Notes
05177_PIE_INDEX_renum 8/24/06 4:13 PM Page 624