Bits F232
Bits F232
In addition to part-I (General Handout for all courses appended to the time table) this portion gives further
specific details regarding the course.
Reference books
R1. Micheal T Goodrich and Roberto Tamassia. Algorithm Design: Foundations, Analysis and
Internet examples. (John Wiley &Sons, Inc., 2002).
R2. Jon Kleinberg and Eva Tardos. Algorithm Design. Pearson Education. (2007).
R3. Sanjoy Das Gupta, Christos Papadimitriou, Umesh Vazirani, Algorithms. Tata McGraw-
Hill Publishers.
Course Plan:
Chapter in
Lecture No. Learning objectives Topics to be covered the Text
Book
Tounderstand the role of T1-1
DS and
1-2 Course Introduction & Motivation.
Algorithms in
Computing.
Growth of Functions & Asymptotic T1-2,3,4
To understand analysis Notation , R1-1
3-6
of algorithms Simple Case Studies: Binary search &
Bubble Sort
7-8 To understand Divide Using arrays , Divide & Conquer, Merge T1-7
and Conquer Sort & Quick Sort (Analysing lower R2 – 5
Algorithmic Technique bounds)
9-10 Linear time Sorting Algorithms – Radix T1 – 2, 6, 8
To understand Linear
Sort and Bucket Sort (Analysing lower R1- 4
time sorting algorithms
bounds)
11 – 16 Insertion and removal from a T1-10
Linked R1-2
To understand basic
list, generic single linked list,
datastructures, their
doubly linked lists,
implementations,
circular linked lists,
Complexity, Efficiency
Stack ADT, Queue ADT, Double
& Applications
ended Queue , Vectors, Lists &
Sequences
17-18 To understand Tree Tree ADT, Binary Tree, Types of R1 - 2
Data Structure Binary tree,
19 - 22 To understand Priority Queue ADT, Heaps,
Advanced data Applications of heap: Insertion
structures like Sort, Selection Sort & Heap Sort
23 - 24 Priority queues, MAP ADT, Dictionories and Hash T1 – 11
Heaps, Hash Tables, Separate Chaining vs. Open R1- 2
tables, Maps, Skip Addressing, Probing, Rehashing.
25 - 30 Binary Search Tree, Balanced T1 – 12, 13
Binary SearchTrees - Red-Black R1- 3
lists, Dictionaries, Trees, Skip list (Implementation,
Search Trees. Complexity & Efficiency)
31 - 36 To understand String Trie Data Structure, Pattern Matching T1 – 4,15,
Manipulation and Algorithms, LCS using Dynamic 32
Dynamic Programming Programming R1- 9
Algorithmic Technique
37 - 38 Graphs ADT& Graph Algorithms: T1 – 22,
To understand Graph Representation schemes, Traversals:DFS R1 - 6
Data Structure and and BFS
39 - 42 Greedy Algorithmic Greedy Algorithms: Shortest path and T1- 23, 24
technique MST (Dijkstra, Kruskal, and Prim-Jarnik R3 – 4,5
algorithms.)
Evaluation Scheme:
Weightage Nature of
Component Duration Date & Time
(%) Component
Mid Test 90 minutes 25% 15/03 - 4.00 - Closed Book
5.30PM
Lecture-Continous 10 Minutes 10 % Closed Book
One per week
Evaluation
Lab–Continuous Every 10% Open Book
Evaluation assignment will
TBA
(Assignments) be evaluated.
Notices:All notices pertaining to this course will be displayed on the CSIS Notice Board/CMS.
Make-up Policy: Prior Permission is mustand Make-up shall be granted only in genuine cases based on
individual’s need, circumstances. The recommendation from chief warden is necessary to request for a make-
up.
Academic Honesty and Integrity Policy: Academic honesty and integrity are to be maintained by all the
students throughout the semester and no type of academic dishonesty is acceptable.
INSTRUCTOR-IN-CHARGE