Creating a new instance of the problem

Assignment Help Computer Engineering
Reference no: EM132764024

Question 1.

Suppose we are given an instance of the Minimum Spanning Tree Problem on a graph G, with edge costs that are all positive and distinct. Let T be a minimum spanning tree for this instance. Now suppose we replace each edge cost ce by its square, q, thereby creating a new instance of the problem with the same graph but different costs.
True or false? T must still be a minimum spanning tree for this new instance.

Question 2.
Some of your friends have gotten into the burgeoning field of time-series data mining, in which one looks for patterns in sequences of events that occur over time. Purchases at stock exchanges-what's being bought-are one source of data with a natural ordering in time. Given a long sequence S of such events, your friends want an efficient way to detect certain "patterns" in them-for example, they may want to know if the four events buy Yahoo, buy eBay, buy Yahoo, buy Oracle occur in this sequence S, in order but not necessarily consecutively.

They begin with a collection of possible events (e.g., the possible transactions) and a sequence S of n of these events. A given event may occur multiple times in S (e.g., Yahoo stock may be bought many times in a single sequence S). We will say that a sequence 5' is a subsequence of S if there is a way to delete certain of the events from S so that the remaining events, in order, are equal to the sequence 5'. So, for example, the sequence of four events above is a subsequence of the sequence buy Amazon, buy Yahoo, buy eBay, buy Yahoo, buy Yahoo, buy Oracle

Their goal is to be able to dream up short sequences and quickly detect whether they are subsequences of S. So this is the problem they pose to you: Give an algorithm that takes two sequences of events-S' of length m and S of length n, each possibly containing an event more than once-and decides in time 0(m + whether S' is a subsequence of S.

Reference no: EM132764024

Questions Cloud

What is reported interest expense for the second year : A bond has a par value of $2000000, If the effective interest rate method is used, what is reported interest expense for the SECOND year of bond's life?
Drilling for data 2020 : "A company should determine its goals and values before performing an industry analysis."
Calculate the times interest earned ratio for latonya : Calculate the times interest earned ratio for LaTonya's Flop Shops, Inc. Sales are $1.47 million, cost of goods sold is $585,000, depreciation expense
Comprehensive strategic plan : Upon completion of each of the individual assignments, students may combine all together for a comprehensive strategic plan.
Creating a new instance of the problem : Creating a new instance of the problem with the same graph but different costs - Oracle occur in this sequence S, in order but not necessarily consecutively
Solve the average amount of time that an order for zerodirt : Solve the average amount of time that an order for ZeroDirt will wait in line before it is processed (i.e., waiting time). Show your calculations.
Describe hopes of justifying treatment programs for blacks : In 1932, the Public Health Service, working with the Tuskegee Institute, began a study to record the natural history of syphilis in hopes of justifying.
What is the weighted average cost of capital : If they plan to use 22% debt financing, 3% preferred financing and 75% common stock financing, what is the weighted average cost of capital
Find what net present value of the investment for x company : The cost of the advertising campaign would be $43,000. Assuming a discount rate of 5%, what is the net present value of this investment?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write down a 3-5 page penetration testing proposal by using

write a 3-5 page penetration testing proposal using specific pen-testing tools and based on a dos scenario. guidelines

  What are the security and privacy risks and vulnerabilities

What are the security and privacy risks and vulnerabilities in using the Internet? List some specific common attack strategies and describe how they work and their effects/consequences on the security and privacy.

  Write a function called countlines that takes a string

Write a function called countLines() that takes a string representing the name of a file as a parameter, & a string representing a word as the second parameter.

  Does the site follow an opt-in or opt-out policy or is the

use your favorite web search engine to obtain a list of web pages that include the words privacy statement. visit the

  Define cryptographic hash function

Every developer is focused on transmitting data securely. Hashing and hash functions are essential for securing business information and data.

  What would qualify someone to be a cyber professional

What would qualify someone to be a Cyber Professional? Include any special skills necessary for someone interested.

  Was the leadership team afraid of change

Select an organization or industry that is facing significant change - Why were the leaders of your chosen company or industry unable to adapt to the changing

  Conducting the forensic investigation

Describe the purpose of several initial reviews being conducted by forensics investigator (e.g., time lines, technical skills, procedures).

  Implement a cycle-by-cycle simulator for simple five-stage

This part of the project requires you to implement a cycle-by-cycle simulator for the simple 5-stage APEX pipeline. Assume that the code to be simulated is stored in a text file with one ascii string representing an instruction.

  Program program that converts eight (8) bit binary numbers

Write down a C++ program that converts eight (8) bit binary numbers to their decimal equivalents. The program should retrieve the binary numbers (one at a time) from a data file (use a long int for the variable that represents the binary number).

  Why performing rotation in an n-node binary tree represented

Explain why performing a rotation in an n-node binary tree represented using an array list takes ?(n) time.

  Generate an erd diagram for the given scenario

Location with attributes Location ID, Address (Street, City, State, Zip Code), and Type (values of Business or Residential)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd