⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 http:^^www.cs.hmc.edu^~keller^cs60s96.html

📁 This data set contains WWW-pages collected from computer science departments of various universities
💻 HTML
📖 第 1 页 / 共 2 页
字号:
Although much of the course entails programming, we  consider exposureto computer science ideas to be the important part.  The intent of theprogramming assignments is to drive home these key ideas.  I amwilling to devote as much of each class period as is needed (nominally15 minutes) to more detailed examples of programming techniques andfor specific programming questions and answers.  If this does notappear useful on a given day, the time will be used for otherpurposes.   <p><b><h4><a name = "honor_code">Honor Code Standard</a></h4></b><em>Read this carefully:</em>Although <em>discussion</em> of problems with others is encouraged,programming in CS60 emphasizes individual learning rather than groupprojects.  We observe the following Standard:  "You may <em>discuss</em> theassignment with other students.  You may notshare (= give or receive)written work of any kind, inside or outside the course".Elaboration:  In the case of programming assignments, we consideremail, computer files, fragments of files, and printed output to be "writtenwork".  In developing code for a programming assignment, you candiscuss ideas with others, but discussion of ideasmust not involve wholesale examination or transcription of the actual working code ofothers, with the exception that you may use any code explicitlyprovided by the instructor. <strong>Definitelyforbidden</strong> is a form of collaboration wherein two or more studentssplit up an assignment, then transcribe each others' contributions,sometimes changing names of variables, comments, formatting, etc.  If this occurs, a failing grade is issued automatically.If the help you get from another is significant, you should acknowledgeit on your submission.  You do not lose credit for this.<em>If you have any doubts about whether a form ofinteraction constitutes a violation of this standard, please consultwith me prior to continuing.</em><P><b><h4><a name = "grading_weights">Grading Weights</a></h4></b>The programming assignments will constitute 50% of the grade.  Themid-term examination will count 15% and the final 25%.  Classattendance, participation, random quizzes, etc. will account for theremaining 10%.  Various "practice problems" will be indicated.  Inparticular, you should be able to work most ** ("two dot") problem inthe notes relating to material covered in lecture.  These do not needto be submitted, but the exams will consist largely of problems of asimilar level, along with some perhaps a little easier or harder.Exams are open book and emphasize conceptual understanding, ratherthan memorization of fine details.  <P><b><h4><a name = "late">Late Assignment Policy</a></h4></b>Submissions are done by emailing source code to the grader,cs60grad@muddcs, which also establishes the time of submission.The due dates on assignments should be noted carefully.The work of an assignment should be conducted in the week or weeksbefore, not on the last day when there is no space for the necessarythinking.  There is an automatic, fixed, one-day grace period on all assignments.  In other words, if the due datestates day N, then the assignment must be turned in before midnight onday N+1 to receive any credit.  After midnight on day N+1 work youspend on the problem is for you own edification only (which is not to say that it isn't worth doing or required; you just don't getpoints for it then).  It is best to plan to get the assignments inon the stated due date.<P><b><h4><a name = "outline">CS 60 Topic Outline</a></h4></b>The lectures will roughly follow this outline.  The progression is atthe rate of about two of the numbered topics below per week.  I shouldsay that this is what I would <em>like</em> to do.  Depending on background,some of the topics expand to longer than allocated, with the resultthat other topics get jettisoned or fall off the end.  Please keep upon the reading without it being explicitly assigned.  The notesgenerally expand on the lectures and discussions.  But the lecturesmay also expand on the notes or introduce new material.  More oftenthan not, several threads will be interwoven in the lectures over aperiod of time, in part to emphasize the commonality of concepts fromdifferent vantage points.  Brackets below indicate where chapters inthe notes start with respect to the concepts that follow.  The outlinedoes not mention every topic.  The actual lectures determine points ofemphasis.<P><ol><li>[<em>Computing by the Rules</em>]  Computation problems and models ofcomputation. States and transitions.  List notation.   Functionalspecifications.  Computation by rewriting.<p><li>Heterogeneous lists and trees.  Mutual recursion.  Anonymousfunctions.     <p><li>Assignment-based programs.  McCarthy's transformation.  Turingmachines.<P><li>[<em>Computing on Demand</em>]  C++ review, the Polya library(translating rex to C++)<p><li>RAM model, linear addressing principle,arrays, pointers, L-values and R-values.<P><li>[<em>Computing Grammatically</em>]  Inductive definitions, grammars,syntax.<P><li>Parsing.   Evaluation.  S expressions.<P><li>[<em>Structural Computing</em>] Data structuring.  Dynamic storageallocation.  Open- vs. Closed-list models<P><li>[<em>Computing Objectively</em>]  Object-orientation and data abstraction.C++ objects.  Inheritance.<P><li>[<em>Computing Logically</em>]  Proposition logic and applications.  Gaterealizations.  Minterm expansion.  Boole/Shannon expansion.<P><li>Logic simplification.  Hypercubes. Karnaugh maps.  "Don't care"situations. <P><li>Predicate logic.   Programming in logic.  Backtracking. <P><li>Program specification, correctness, and verification.<P><li><a name = "midterm">Mid-term examination</a>.  (<b>Date of Midterm: Wed. Mar. 6, during class period</b>).<P><li>[<em>Complexity of computing</em>]  Runtime measures. Profiling.Growth-rate comparisons.  Upper bounds.  "O" notation.   Examples fromsorting: Heapsort, merge sort, radix sort.<P><li>Complexity (continued).  Empirical measurements.  Set abstraction examples.  Bit-vectors,tries.<P><li>[<em>Computing graphically</em>]  Directed graphs.  Graph representations,depth- and breadth-first search.<P><li>Weighted graphs.  Shortest paths.  Traveling salesman problem.<P><li>[<em>Finite-State Computing</em>]  Finite-state machines.  Sequentiallogic design.<P><li>Regular expressions and finite-state machines.<P><li>Computer components.  Registers, buses, multiplexors, etc.<P><li>[<em>Computing with the Store</em>]  Stored-program computer structure.  <P><li>Assembly language.<P><li>[<em>Computing physically</em>]  Physical bases for computation.<P><li>[<em>Computing in Parallel</em>]  Parallel computation.<P><li>[<em>Limitations of Computing</em>] Finite-state limitations.  Lowerbounds.  Incomputability.  Intractability and NP-completeness.   Theglitch phenomenon.<P><li><a name = "final">Comprehensive final exam</a> (<b>Date of Final: Fri. May 10, 2-5 p.m.</b>).</ol><b><h4><a name = "mailing_assignments">How to email assignments:</a></h4></b><b>Use the following scheme only:</b><listing>    elm -saN cs60grad@muddcs.cs.hmc.edu < your-code</listing>where N is the assignment number and your-code is a file containing yourcode.  <b>Do not, under any circumstances, mailusing PINE.  This MIME encodes the file and we can't use it easily.  </b></html>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -