background preloader

Free CS books

Free CS books

Forecasting: principles and practice Welcome to our online textbook on forecasting. This textbook is intended to provide a comprehensive introduction to forecasting methods and to present enough information about each method for readers to be able to use them sensibly. We don’t attempt to give a thorough discussion of the theoretical details behind each method, although the references at the end of each chapter will fill in many of those details. For most sections, we only assume that readers are familiar with algebra, and high school mathematics should be sufficient background. At the end of each chapter we provide a list of “further reading”. We use R throughout the book and we intend students to learn how to forecast with R. It is free and online, making it accessible to a wide audience.It uses R, which is free, open-source, and extremely powerful software.It is continuously updated. Use the table of contents on the right to browse the book. Happy forecasting!

PC Architecture. A book by Michael B. Karbo - a book by Michael Karbo. This book is protected by copyright. It has been published in many European countries but never in English language. Therefore I desided to upload it to the Internet. It is free to use as it is for personal, non-commercial use. All rights belong to Michael Karbo. These web pages have been produced from a Microsoft Word file. PC Architecture.

historic documents in computer science Fortran Fortran Automated Coding System For the IBM 704 the very first Fortran manual, by John Backus, et al., Oct. 1956 Al Kossow has in his manual collection also an IBM 704 manual, if you want to have a look at the machine that this original Fortran language was made for. Also the next IBM manuals are from the collection at his web site, where you can find a number of Fortran manuals, for many machines of various manufacturers. The FORTRAN II General Information Manual and IBM 7090/7094 Programming Systems: FORTRAN II Programming are two IBM manuals of 1963 describing the FORTRAN II language. IBM 7090/7094 Programming Systems: FORTRAN IV Language, 1963, and IBM System 360 and System 370 FORTRAN IV Language, 1974. ANSI Fortran66 and Fortran77 standards, obsoleted by the Fortran90 and Fortran95 standards, but still handy for reading legacy code. Algol60 I think, this is the original Peter Naur edition of the Algol 60 report.

Introduction to Algorithms - Download free content from MIT Debunking Handbook, The Posted on 27 November 2011 by John Cook The Debunking Handbook, a guide to debunking misinformation, is now freely available to download. Although there is a great deal of psychological research on misinformation, there's no summary of the literature that offers practical guidelines on the most effective ways of reducing the influence of myths. The Debunking Handbook boils the research down into a short, simple summary, intended as a guide for communicators in all areas (not just climate) who encounter misinformation. The Handbook explores the surprising fact that debunking myths can sometimes reinforce the myth in peoples' minds. Communicators need to be aware of the various backfire effects and how to avoid them, such as: It also looks at a key element to successful debunking: providing an alternative explanation. The Authors: John Cook is the Climate Change Communication Fellow for the Global Change Institute at the University of Queensland. Update: Translations

Malicious Linux Commands - From (This article was originally published in Ubuntu Forums but was removed there. Ubuntuguide feels that knowledge about these risks is more important than any misguided attempts to "protect the public" by hiding their potential dangers or protect the (K)Ubuntu/Linux image. The original article has therefore been re-created (and subsequently edited) here.) ATTENTION: It is worthwhile to have some basic awareness about malicious commands in Linux. It is also worthwhile to always enable a Kubuntu screensaver or Ubuntu screensaver with a password so that a casual passerby is not able to maliciously execute one of these commands from your keyboard while you are away from your computer. When in doubt as to the safety of a recommended procedure or command, it is best to verify the command's function from several sources, such as from readily available documentation on Linux commands (e.g. manpages). Here are some common examples of dangerous commands that should raise a red flag. rm -r In Perl

Introduction to Information Retrieval This is the companion website for the following book. Christopher D. Manning, Prabhakar Raghavan and Hinrich Schütze, Introduction to Information Retrieval, Cambridge University Press. 2008. You can order this book at CUP, at your local bookstore or on the internet. The book aims to provide a modern approach to information retrieval from a computer science perspective. We'd be pleased to get feedback about how this book works out as a textbook, what is missing, or covered in too much detail, or what is simply wrong. Online resources Apart from small differences (mainly concerning copy editing and figures), the online editions should have the same content as the print edition. The following materials are available online. Information retrieval resources A list of information retrieval resources is also available. Introduction to Information Retrieval: Table of Contents

MR01001101 :: cryptography steganography resources and challenges Classics in Psychology An internet resource developed byChristopher D. Green , ISSN 1492-3173 (Return to Classics index) Last updated . 19th- & 20th-Century Psychology Can't find what you want? Ancient Thought Plato. Aristotle. Aristotle. For additional works by the Presocratics, Plato, Aristotle, Hippocrates, Euclid, Lucretius, Epictetus, Galen, Plotinus, and Augustine, see the Links to Documents at Other Sites page. Medieval & Renaissance Thought For works by Aquinas, Roger Bacon, Pico, and Machiavelli see the Links to Documents at Other Sites page. Modern Philosophical Thought Berkeley, George. (1732). Bowen, Francis. (1860). McCosh, James. (1874). Herbart, J. Fiske, John. (1902). Royce, Josiah. (1902). Stumpf, Carl. (1930). Titchener, E. Creighton, J. For additional works by Descartes, Hobbes, Pascal, Locke, Leibniz, Spinoza, , Voltaire, Hume, Smith, Malthus, Kant, Hegel, Marx, Mill, Brentano, Mach, Peirce, James, Dewey, Husserl, Russell, Mead, and Merleau-Ponty see the Links to Documents at Other Sites page.

Dictionary of Algorithms and Data Structures This web site is hosted by the Software and Systems Division, Information Technology Laboratory, NIST. Development of this dictionary started in 1998 under the editorship of Paul E. Black. After 20 years, DADS needs to move. This is a dictionary of algorithms, algorithmic techniques, data structures, archetypal problems, and related definitions. Don't use this site to cheat. Currently we do not include algorithms particular to business data processing, communications, operating systems or distributed algorithms, programming languages, AI, graphics, or numerical analysis: it is tough enough covering "general" algorithms and data structures. Some terms with a leading variable, such as n-way, m-dimensional, or p-branching, are under k-. To look up words or phrases, enter them in the box, then click the button. We thank those who contributed definitions as well as many others who offered suggestions and corrections. Here are some references on algorithms and data structures. Bibliography

Book Reviews Introduction to Social Network Methods: Table of Contents Robert A. Hanneman and Mark Riddle Introduction to social network methods Table of contents About this book This on-line textbook introduces many of the basics of formal approaches to the analysis of social networks. You are invited to use and redistribute this text freely -- but please acknowledge the source. Hanneman, Robert A. and Mark Riddle. 2005. Table of contents: Preface1.

jj's useful and ugly FXT page Here you find the FXT library the fxtbook: "Matters Computational" (was: "Algorithms for Programmers") the amorphous FFT bucket moved to the fftpage The FXT library Download the latest FXT version: fxt-2014.04.07.tgz (approx. 1700kB), distributed under the GPL. FXT is a library of low-level algorithms. Its main focus is on bit-manipulations, combinatorial generation, and fast transforms. The library is accompanied by the fxtbook. The complete list of demos contains about 500 programs, listed by topic. Here is a short description, the Linux Software Map (LSM) file fxt.lsm The fxtbook: "Matters Computational" This is the book "Matters Computational" (formerly titled "Algorithms for Programmers"), published with Springer. The table of contents as text file (generated from dvi): fxtbook-toc.txt. The list of errata: fxtbook-errata.txt. The index as text file (generated from dvi): fxtbook-idx.txt.

Antique Computers - Ed Thelen Stanford has made this May 7, 2014 lecture by Professor Donald Knuth available on-line "Let's Not Dumb Down the History of Computer Science" - Professor Emeritus Donald Knuth, Stanford University "For many years the history of computer science was presented in a way that was useful to computer scientists. But nowadays almost all technical content is excised; historians are concentrating rather on issues like how computer scientists have been able to get funding for their projects, and/or how much their work has influenced Wall Street. We no longer are told what ideas were actually discovered, nor how they were discovered, nor why they are great ideas. "In this talk, Professor Donald Knuth explains why he is grateful for the continued excellence of papers on mathematical history, and he makes a plea for historians of computer science to get back on track." Paul McJones writes:

Related: