Effect of changes in preferences

Assignment Help Basic Computer Science
Reference no: EM131220610

The Problem

This problem is inspired by a question raised by Devashish in class. As Devashish's question pointed out, the stable marriage problem does not handles "divorces." This is because we assume everyone is interested in everyone else of the opposite gender and we assume that the preferences do not change.

In this problem, we will see the effect of changes in preferences in the outcome of the Gale-Shapley algorithm (for this problem you can assume the version of the Gale-Shapley algorithm that we did in class where the women do all the proposing).

Given an instance of the stable marriage problem (i.e. set of men MM and the set of women WW along with their preference lists: LmLm and LwLw for every m∈Mm∈M and w∈Ww∈Wrespectively), call a man m∈Mm∈M a home-wrecker if the following property holds. There exists an L′mLm′ such that if mm changes his preference list to L′mLm′ (from LmLm) then the Gale-Shapley algorithm matches everyone to someone else. In other words, let SorigSorig be the stable marriage output by the Gale-Shapley algorithm for the original input and SnewSnew be the stable marriage output by the Gale-Shapley algorithm for the new instance of the problem where mm's preference list is replaced by L′mLm′ (but everyone else has the same preference list as before). Then Sorig∩Snew=∅Sorig∩Snew=∅.

For every integer n≥2n≥2 prove the following: There exists an instance of the stable marriage problem with nn men and nn women such that there is a man who is a home-wrecker.

Reference no: EM131220610

Questions Cloud

Presents the perfect opportunity to apply loops : Include a copy of the code that either (A) exemplifies concise, generalized code or (B) presents the perfect opportunity to apply loops, arrays, and lists to reduce the length of the program using a more elegant solution. Do not undertake a length..
What is the molecular mass of sodium bicarbonate : You get curious as you are weighing out the 2.25 moles and wonder how many molecules are there in your 2.25 moles of Sodium Bicarbonate sample. What is the molecular Mass of Sodium Bicarbonate?
Ratings for the bonds evaluations : Suppose these rating companies went out of business. - What effect would this have on the bond market? - What effect would it have on banks?
Developing an operating budget-theory and practice : Important to consider several outputs, which depend on the perspectives of the individuals developing the budget. There are certain best practices to keep in mind when developing budgets - Internet, research the value of budgeting as well as method..
Effect of changes in preferences : In this problem, we will see the effect of changes in preferences in the outcome of the Gale-Shapley algorithm (for this problem you can assume the version of the Gale-Shapley algorithm that we did in class where the women do all the proposing).
Is the encoded language regular : Show that if a language is regular over one alphabet, then it is still regular when encoded in a different alphabet, by any substitution code.
Recursive method written by you or taken from web : What elements should be considered to be included in any recursive method? Discuss these elements using an example (code required) of a recursive method written by you or taken from Web. Try choosing one different from that of any posted thus far.
National credit bureaus collect information on peoples : Suppose that a new privacy law makes it illegal for credit bureaus to collect this information. - What effect would this have on the banking industry?
Description of the network technologies and components : Prepare a Word document that is approximately 3-5 pages in APA format. It should be professional in appearance and suitable for review by network novices. Present the information in laymen's terms.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Critical thinking what crime in the cyber realm

Kizza (2014) addressed network attacks and intrusions broadly as "cybercrime" and attributed them largely to moral and ethical deficiencies of the perpetrators. Lessig (2006) approached law in the network largely in terms of computer "code" that d..

  Action of violation of principle of least common mechanism

Discuss how this technique might prevent legitimate users from accessing the system. Why is this action a violation of the principle of least common mechanism?

  Write a program that creates a 4x3 array of integers

Write a program that creates a 4x3 array of integers. Populate the array with random numbers between 0 and 200. Sum up the values in each column and display the three sums to the screen.

  String formed from the letters of a string

A mirror has the following pattern: LmR where L is a (possibly empty) string formed from the letters of a string, and R is the reverse of the string L. m is an pivot string whose characters are not in L or R. For example, the following strings have t..

  How many different customers have ordered products

How many different customers have ordered products in each category? Two columns, categoryname and count of distinct customers. Make sure to include EVERY category.

  How the world could be recorded using three different

The student data files for this book include a ballerinas dancing Alice world, a Japanese fan dancer Alice world, and a toy soldiers marching Alice world. You will use these words for

  Discuss difference between microcontroler and microprocessor

Discuss the differences between microcontrollers and microprocessors.

  For the first one i used the substitution method

For the first one I used the substitution method which gave me n^2 but wasn't right and the second one I used Masters Theorem and got nlog^4(n) which also wasn't right. A thorough explanation would be helpful.

  The identity of the third party

the identity of the third party?

  The disadvantage of a black hole

The disadvantage of a "black hole" is that packets do not reach their destination and no error messages are sent back to inform the sender. Why would a network administrator deliberately disable ICMP messaging on their network? Discuss the security i..

  Describe the role of agrobacterium tumefaciens

Describe the role of Agrobacterium tumefaciens in transforming a plant cell.

  Write a c program to generate a sine waveform

Divide one period of the sine wave into 60 points and use these 60 points to represent the waveform. Every two adjacent points are separated by 3.0°.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd