Princeton University

Algorithms, Part I

Kevin Wayne
Robert Sedgewick

Instructors: Kevin Wayne

1,427,205 already enrolled

Gain insight into a topic and learn the fundamentals.
4.9

(11,915 reviews)

Intermediate level
Some related experience required
Flexible schedule
5 weeks at 10 hours a week
Learn at your own pace
97%
Most learners liked this course

Gain insight into a topic and learn the fundamentals.
4.9

(11,915 reviews)

Intermediate level
Some related experience required
Flexible schedule
5 weeks at 10 hours a week
Learn at your own pace
97%
Most learners liked this course

Details to know

Assessments

10 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 13 modules in this course

Welcome to Algorithms, Part I.

What's included

1 video2 readings1 programming assignment

1 videoTotal 9 minutes
  • Course Introduction9 minutes
2 readingsTotal 1 minute
  • Welcome to Algorithms, Part I1 minute
  • Lecture Slides0 minutes
1 programming assignmentTotal 60 minutes
  • Hello, World60 minutes

We illustrate our basic approach to developing and analyzing algorithms by considering the dynamic connectivity problem. We introduce the union−find data type and consider several implementations (quick find, quick union, weighted quick union, and weighted quick union with path compression). Finally, we apply the union−find data type to the percolation problem from physical chemistry.

What's included

5 videos2 readings1 assignment1 programming assignment

5 videosTotal 50 minutes
  • Dynamic Connectivity10 minutes
  • Quick Find10 minutes
  • Quick Union7 minutes
  • Quick-Union Improvements13 minutes
  • Union−Find Applications9 minutes
2 readingsTotal 1 minute
  • Overview1 minute
  • Lecture Slides0 minutes
1 assignment
  • Interview Questions: Union–Find (ungraded)0 minutes
1 programming assignmentTotal 480 minutes
  • Percolation480 minutes

The basis of our approach for analyzing the performance of algorithms is the scientific method. We begin by performing computational experiments to measure the running times of our programs. We use these measurements to develop hypotheses about performance. Next, we create mathematical models to explain their behavior. Finally, we consider analyzing the memory usage of our Java programs.

What's included

6 videos1 reading1 assignment

6 videosTotal 65 minutes
  • Analysis of Algorithms Introduction8 minutes
  • Observations10 minutes
  • Mathematical Models12 minutes
  • Order-of-Growth Classifications14 minutes
  • Theory of Algorithms11 minutes
  • Memory8 minutes
1 reading
  • Lecture Slides0 minutes
1 assignment
  • Interview Questions: Analysis of Algorithms (ungraded)0 minutes

We consider two fundamental data types for storing collections of objects: the stack and the queue. We implement each using either a singly-linked list or a resizing array. We introduce two advanced Java features—generics and iterators—that simplify client code. Finally, we consider various applications of stacks and queues ranging from parsing arithmetic expressions to simulating queueing systems.

What's included

6 videos2 readings1 assignment1 programming assignment

6 videosTotal 60 minutes
  • Stacks16 minutes
  • Resizing Arrays9 minutes
  • Queues4 minutes
  • Generics9 minutes
  • Iterators7 minutes
  • Stack and Queue Applications (optional)13 minutes
2 readingsTotal 1 minute
  • Overview1 minute
  • Lecture Slides0 minutes
1 assignment
  • Interview Questions: Stacks and Queues (ungraded)0 minutes
1 programming assignmentTotal 480 minutes
  • Deques and Randomized Queues480 minutes

We introduce the sorting problem and Java's Comparable interface. We study two elementary sorting methods (selection sort and insertion sort) and a variation of one of them (shellsort). We also consider two algorithms for uniformly shuffling an array. We conclude with an application of sorting to computing the convex hull via the Graham scan algorithm.

What's included

6 videos1 reading1 assignment

6 videosTotal 63 minutes
  • Sorting Introduction14 minutes
  • Selection Sort6 minutes
  • Insertion Sort9 minutes
  • Shellsort10 minutes
  • Shuffling7 minutes
  • Convex Hull13 minutes
1 reading
  • Lecture Slides0 minutes
1 assignment
  • Interview Questions: Elementary Sorts (ungraded)0 minutes

We study the mergesort algorithm and show that it guarantees to sort any array of n items with at most n lg n compares. We also consider a nonrecursive, bottom-up version. We prove that any compare-based sorting algorithm must make at least n lg n compares in the worst case. We discuss using different orderings for the objects that we are sorting and the related concept of stability.

What's included

5 videos2 readings1 assignment1 programming assignment

5 videosTotal 48 minutes
  • Mergesort23 minutes
  • Bottom-up Mergesort3 minutes
  • Sorting Complexity9 minutes
  • Comparators6 minutes
  • Stability5 minutes
2 readings
  • Overview0 minutes
  • Lecture Slides0 minutes
1 assignment
  • Interview Questions: Mergesort (ungraded)0 minutes
1 programming assignmentTotal 480 minutes
  • Collinear Points480 minutes

We introduce and implement the randomized quicksort algorithm and analyze its performance. We also consider randomized quickselect, a quicksort variant which finds the kth smallest item in linear time. Finally, we consider 3-way quicksort, a variant of quicksort that works especially well in the presence of duplicate keys.

What's included

4 videos1 reading1 assignment

4 videosTotal 49 minutes
  • Quicksort19 minutes
  • Selection7 minutes
  • Duplicate Keys11 minutes
  • System Sorts11 minutes
1 reading
  • Lecture Slides0 minutes
1 assignment
  • Interview Questions: Quicksort (ungraded)0 minutes

We introduce the priority queue data type and an efficient implementation using the binary heap data structure. This implementation also leads to an efficient sorting algorithm known as heapsort. We conclude with an applications of priority queues where we simulate the motion of n particles subject to the laws of elastic collision.

What's included

4 videos2 readings1 assignment1 programming assignment

4 videosTotal 73 minutes
  • APIs and Elementary Implementations12 minutes
  • Binary Heaps23 minutes
  • Heapsort14 minutes
  • Event-Driven Simulation (optional)22 minutes
2 readingsTotal 10 minutes
  • Overview10 minutes
  • Lecture Slides0 minutes
1 assignment
  • Interview Questions: Priority Queues (ungraded)0 minutes
1 programming assignmentTotal 480 minutes
  • 8 Puzzle480 minutes

We define an API for symbol tables (also known as associative arrays, maps, or dictionaries) and describe two elementary implementations using a sorted array (binary search) and an unordered list (sequential search). When the keys are Comparable, we define an extended API that includes the additional methods min, max floor, ceiling, rank, and select. To develop an efficient implementation of this API, we study the binary search tree data structure and analyze its performance.

What's included

6 videos1 reading1 assignment

6 videosTotal 77 minutes
  • Symbol Table API21 minutes
  • Elementary Implementations9 minutes
  • Ordered Operations6 minutes
  • Binary Search Trees19 minutes
  • Ordered Operations in BSTs10 minutes
  • Deletion in BSTs9 minutes
1 reading
  • Lecture Slides0 minutes
1 assignmentTotal 30 minutes
  • Interview Questions: Elementary Symbol Tables (ungraded)30 minutes

In this lecture, our goal is to develop a symbol table with guaranteed logarithmic performance for search and insert (and many other operations). We begin with 2−3 trees, which are easy to analyze but hard to implement. Next, we consider red−black binary search trees, which we view as a novel way to implement 2−3 trees as binary search trees. Finally, we introduce B-trees, a generalization of 2−3 trees that are widely used to implement file systems.

What's included

3 videos2 readings1 assignment

3 videosTotal 63 minutes
  • 2−3 Search Trees16 minutes
  • Red-Black BSTs35 minutes
  • B-Trees (optional)10 minutes
2 readingsTotal 10 minutes
  • Overview10 minutes
  • Lecture Slides0 minutes
1 assignmentTotal 30 minutes
  • Interview Questions: Balanced Search Trees (ungraded)30 minutes

We start with 1d and 2d range searching, where the goal is to find all points in a given 1d or 2d interval. To accomplish this, we consider kd-trees, a natural generalization of BSTs when the keys are points in the plane (or higher dimensions). We also consider intersection problems, where the goal is to find all intersections among a set of line segments or rectangles.

What's included

5 videos1 reading1 programming assignment

5 videosTotal 65 minutes
  • 1d Range Search8 minutes
  • Line Segment Intersection5 minutes
  • Kd-Trees29 minutes
  • Interval Search Trees13 minutes
  • Rectangle Intersection8 minutes
1 reading
  • Lecture Slides0 minutes
1 programming assignmentTotal 480 minutes
  • Kd-Trees480 minutes

We begin by describing the desirable properties of hash function and how to implement them in Java, including a fundamental tenet known as the uniform hashing assumption that underlies the potential success of a hashing application. Then, we consider two strategies for implementing hash tables—separate chaining and linear probing. Both strategies yield constant-time performance for search and insert under the uniform hashing assumption.

What's included

4 videos2 readings1 assignment

4 videosTotal 50 minutes
  • Hash Tables18 minutes
  • Separate Chaining7 minutes
  • Linear Probing14 minutes
  • Hash Table Context10 minutes
2 readingsTotal 10 minutes
  • Overview10 minutes
  • Lecture Slides0 minutes
1 assignment
  • Interview Questions: Hash Tables (ungraded)0 minutes

We consider various applications of symbol tables including sets, dictionary clients, indexing clients, and sparse vectors.

What's included

4 videos1 reading

4 videosTotal 26 minutes
  • Symbol Table Applications: Sets (optional)5 minutes
  • Symbol Table Applications: Dictionary Clients (optional)5 minutes
  • Symbol Table Applications: Indexing Clients (optional)7 minutes
  • Symbol Table Applications: Sparse Vectors (optional)7 minutes
1 reading
  • Lecture Slides0 minutes

Instructors

Instructor ratings
4.8 (1,959 ratings)
Kevin Wayne
Princeton University
5 Courses1,952,829 learners
Robert Sedgewick
Princeton University
7 Courses2,001,558 learners

Offered by

Explore more from Algorithms

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Learner reviews

4.9

11,915 reviews

  • 5 stars

    89.19%

  • 4 stars

    8.87%

  • 3 stars

    1.10%

  • 2 stars

    0.23%

  • 1 star

    0.58%

Showing 3 of 11915

Z
ZZ
5

Reviewed on Jul 6, 2025

V
VP
5

Reviewed on Oct 8, 2021

P
PK
5

Reviewed on May 20, 2017

Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions

Once you enroll, you’ll have access to all videos and programming assignments.

No. All features of this course are available for free.

No. As per Princeton University policy, no certificates, credentials, or reports are awarded in connection with this course.

Our central thesis is that algorithms are best understood by implementing and testing them. Our use of Java is essentially expository, and we shy away from exotic language features, so we expect you would be able to adapt our code to your favorite language. However, we require that you submit the programming assignments in Java.

Part I focuses on elementary data structures, sorting, and searching. Topics include union-find, binary search, stacks, queues, bags, insertion sort, selection sort, shellsort, quicksort, 3-way quicksort, mergesort, heapsort, binary heaps, binary search trees, red−black trees, separate-chaining and linear-probing hash tables, Graham scan, and kd-trees.

Part II focuses on graph and string-processing algorithms. Topics include depth-first search, breadth-first search, topological sort, Kosaraju−Sharir, Kruskal, Prim, Dijkistra, Bellman−Ford, Ford−Fulkerson, LSD radix sort, MSD radix sort, 3-way radix quicksort, multiway tries, ternary search tries, Knuth−Morris−Pratt, Boyer−Moore, Rabin−Karp, regular expression matching, run-length coding, Huffman coding, LZW compression, and the Burrows−Wheeler transform.

Weekly exercises, weekly programming assignments, weekly interview questions, and a final exam.

The exercises are primarily composed of short drill questions (such as tracing the execution of an algorithm or data structure), designed to help you master the material.

The programming assignments involve either implementing algorithms and data structures (deques, randomized queues, and kd-trees) or applying algorithms and data structures to an interesting domain (computational chemistry, computational geometry, and mathematical recreation). The assignments are evaluated using a sophisticated autograder that provides detailed feedback about style, correctness, and efficiency.

The interview questions are similar to those that you might find at a technical job interview. They are optional and not graded.

This course is for anyone using a computer to address large problems (and therefore needing efficient algorithms). At Princeton, over 25% of all students take the course, including people majoring in engineering, biology, physics, chemistry, economics, and many other fields, not just computer science.

The two courses are complementary. This one is essentially a programming course that concentrates on developing code; that one is essentially a math course that concentrates on understanding proofs. This course is about learning algorithms in the context of implementing and testing them in practical applications; that one is about learning algorithms in the context of developing mathematical models that help explain why they are efficient. In typical computer science curriculums, a course like this one is taken by first- and second-year students and a course like that one is taken by juniors and seniors.

Morty Proxy This is a proxified and sanitized view of the page, visit original site.