Design a randomized algorithm

Assignment Help Data Structure & Algorithms
Reference no: EM131232232

Problem 1:

Let [n] = {1, 2, . . . , n} and g : [n] |→ {-1, 1} be a function and let ∈ < 0.1. We say that g is ∈-good for S ⊆ [n] if | ∑i∈S g(i)| ≤ n1-∈.

Give a randomized algorithm that finds g such that for a set S the probability that g is not s-good is at most 1/n1-2∈. Note that your algorithm does not know the sets S ahead of time (otherwise it is trivial).

Give a randomized algorithm that finds g such that for fixed sets S1, . . . , St with t = n g is s-good for all sets with probability 1 - o(1).

Note that your algorithm does not know the sets S, S1, . . . , St ahead of time.

Hint: use Chebyshev inequality and the union bound.

Problem 1

Let G be an undirected weighted graph with non-negative weights. In class we have learned the randomized algorithm for the MAX-CUT problem such that the expected value of the resulting cut is at least 0.5OP T where OPT is the value of a maximum cut in G. Design a randomized algorithm that runs in polynomial time and finds, with probability at least 0.99, a cut in tt of size X such that X ≥ 0.49OPT.

Hint: Use the Markov inequality.

Problem 2

Explain why ZPP ⊇ RP ∩ coRP. An informal (but correct) argument will be sufficient.

Problem 3

In class we have learned the randomized algorithm for the MIN-CUT problem that finds a minimum cut with probability at least 2/n(n-1) where n is the number of nodes in the graph, n = |V|. The algorithm can be implemented in time O(n2).

Using the aforementioned algorithm design another (simple) algorithm that finds a minimum cut with probability at least 1 - 1/n10. What is the running time of your algorithm?

Problem 4

Let H be a class of all functions from M to N. Is it true that H is a 2-universal family? Prove your answer. Is it a good idea to use H for applications? Please explain your answer.

Problem 5

In class we have learned how to build a family H of 2-universal hash functions h : M |→ N where |M| = m, |N| = n. Let n > 1010 be a sufficiently large parameter. Can you construct a family of 2-universal hash functions H such that |H| ≤ 10? Give an example of such family and prove its 2-universality. Otherwise prove that no such family exists.

Problem 7:

Design a randomized algorithm that finds, in polynomial time, all min-cuts with probability at least 0.99. Can you derive an upper bound on the number of different min-cuts?

Reference no: EM131232232

Questions Cloud

Discuss importance of developing skills in detecting deceit : Discuss the importance of developing skills in detecting deceit: Explain how behavioral interviewing and interrogation techniques can help identify deception.
Write a paper a on what is a good computer professional : Thesis on computer professionals. Write a paper a on What is a Good computer professional? Write a paper on What is a computer professional?
Analyze and discuss the critical role of reputation : For this final part of the project you will address the following questions in your paper: Analyze and discuss the critical role of reputation, trust, and fairness as it pertains to this situation
What is the range of va that produces this output : The 3-bit flash A/D converter in Figure has a reference voltage of VREF = 3.3 V. The 3-bit output is 101. What is the range of vA that produces this output?
Design a randomized algorithm : Randomized and Big Data Algorithms - Design a randomized algorithm that finds, in polynomial time, all min-cuts with probability at least 0.99. Can you derive an upper bound on the number of different min-cuts?
Identify and define two types of immunity : The fifth amendment privilege against self incrimination may be overcome with a grant of immunity from the government. There are three types of immunity. Identify and define two types of immunity. This should be done in APA formatting, 3 - 5 par..
What is the change in the output voltage : What are currents I1, I2, I3, I4, I5, and I6? -  The input changes by 1 LSB. What is the change in the output voltage?
Briefly introduce and summarize the article : Choose an article within either the ABI/Inform Complete database or the Business Source Complete database on the topic of the ethics of drug testing in the employment setting. Briefly introduce and summarize the article. Do the author's arguments s..
Classify the given attributes by number of values : Classify the following attributes by number of values (binary, discrete or continuous) and applicable operations (nominal, ordinal, interval, ratio). Explain your choice.

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Selection sort algorithm

Given the algorithm below for SelectionSort, trace the function by specifying the state of the input sequence after each call to swap()

  Data structures class

data structures class this project will give you an introduction. There are two important data structures that you will learn and use. The first is a stack, it is a LIFO (Last In First Out) structure. You can think of it like a a stack of plates in y..

  Plot six training points in a two-dimensional space

how many examples do we need to exhaustively enumerate every possible combination of inputs -  what is the conditional probability that An item classified as Reject is actually good?

  Calculate the cost of installing fiber optic cable

Write a program that will calculate the cost of installing fiber optic cable at a cost of $0.87 per foot for a company. Your program should display the company name and the total cost

  Sharing a large computer file

Assume you are sitting at desk at office and using your laptop computer. The boss calls an emergency meeting for you and many colleagues, and asks everyone to bring his or her laptop computer.

  Discuss how concurrency control mechanism interacts

Describe, with examples, the types of problem that can occur in a multi-user environment when concurrent access to the database is allowed. Give full details of a mechanism for concurrency control that can be used to ensure that the types of probl..

  Find the checksum field in a single parity bit scheme

Assume that the information content of a packet is the bit pattern 1111000010100101 and an even parity is being used

  Creating java programming scripts

Discuss how does a programmer typically get access to a Graphics object when coding an applet?

  Work out the matching determined by the coda

There are six students, A, B, C, D, E, and F, and three colleges, X, Y, and Z, each with room for two students. The student preferences are given in Table 1 and the college preferences are given in Table 2. Work out the matching generated by SODA. ..

  Highlighting features that boost performances

highlighting features that boost performances

  Mc cabe''s cyclamate number

Identify the proper scale for each of the following measures: LOC McCabe's cyclamate number Average depth of nesting Maximum depth of nesting

  System analystis you are required to analyse the

you are required to analyse the effectiveness of the qantas online air ticketing system. to do this you are required to

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd