What is the running time of your algorithm

Assignment Help Computer Engineering
Reference no: EM132141257

Suppose you are a manager in the IT department for the government of a corrupt dictator, who has a collection of computers that need to be connected together to create a communication network for his spies.

You are given a weighted graph, G, such that each vertex in G is one of these computers and each edge in G is a pair of computers that could be connected with a communication line.

It is your job to decide how to connect the computers. Suppose now that the CIA has approached you and is willing to pay you various amounts of money for you to choose some of these edges to belong to this network (presumably so that they can spy on the dictator).

Thus, for you, the weight of each edge in G is the amount of money, in U.S. dollars, that the CIA will pay you for using that edge in the communication network. Implement an efficient algorithm, therefore, for finding a maximum spanning tree in G, which would maximize the money you can get from the CIA for connecting the dictator's computers in a spanning tree.

What is the running time of your algorithm? Your program will take as input a file with edge information.

Each line in the file contains from, to and weight. You may assume the vertices arc numbered from 0 to N. The weights are unique and non-negative.

It will construct the Graph and print the edges in the maximum spanning tree. Write java program that reads in from text file and creates maximum spanning tree graph.

Reference no: EM132141257

Questions Cloud

What is the mirr : A) If the firm's WACC is 12.1%, and the project costs $850,000, what is the NPV? B) What is the MIRR?
Implement an efficient algorithm : Your program will take as input a file with edge information. Each line in the file contains from, to and weight. You may assume the vertices are numbered .
Compare the time for a query and response : Compare the time for a query and response for a complete DNS query and response (to all required nameservers) if M=1, M=2, and M=3.
How many 2 gb hard disks do you need if the hard disk : How many 2 GB hard disks do you need if the hard disk should store up to 70% of their capacity using RAID 0, RAID 1, RAID 3, or RAID 5.
What is the running time of your algorithm : What is the running time of your algorithm? Your program will take as input a file with edge information.
Write a program in c that shows the coach : Write a program in C that shows the coach, the total number of different pairs he can choose in the team.
How will you choose so that the modified algorithm : How will you choose so that the modified algorithm will have O(n log n) running time? Show your work.
How can we quickly test if k is even : We say that k is even if and only if |k| mod 2 = 0. How can we quickly test if k is even without using arithmetic operations, and without using mod?
Describe the ways in which this is an example of attacks : Suppose you are doing some online banking using your bank's website. An attacker has set up an active wiretap between your computer and your bank's server.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Devise wild-card patterns to match all filenames

Devise wild-card patterns to match all filenames comprising at least three character. Where the first character is numeric and last character is not alphabetic.

  Create a web page that will pop up an alert message

Create a Web page that will pop up an alert message welcoming the user to the Web page. Use a script block in the area for this task.

  What is the difference between an algorithm and a program

What is the difference between an algorithm and a program? How can computers represent pictures as numbers? How can computers represent text as numbers?

  What is the exception with the highest priority

Why does the location of the 68000s reset vectors cause the system designer so many problems? Why are the 68010, 68020, and 68030 much better in this respect?

  Question regarding the white rabbit

A magician has a hat that holds two rabbits. One rabbit is black and the other is white. In his last 16 performances he has randomly pulled the black rabbit from the hat 16 times. The probability that he will pull the white rabbit from the hat in ..

  How to validate a new forensics software package

Establish a procedure for your organization on how to validate a new forensics software package. Write 3 to 4 pages outlining the procedure you plan.

  Create an order form that allows bags to be purchased

Create an order form that allows bags to be purchased. There are six different types: full decorative, beaded, pirate design, fringed, leather, and plain.

  Give the formula for finding the probability

Suppose there are 150 users sharing a communication link. Suppose each user transmits data only 12% of the time.

  Why you would favor one topology over another

bus, ring and star topologies. List the pros/cons of each and expand on why you would favor one topology over another

  Routers concept

Suppose a BGPv4 router receives an update for the prefix P which indicates AS1 as the next hop (and router has never seen P before).

  Discuss a good communication network

Select a business that you believe has a good communication network. Examine its network design and explain why you think the network is effective and efficient

  How do you include a loop structure programming in python

Explain when we would use each. How do you include a ‘loop' structure programming in Python? How do you control a loop? What you found that was new and exciting that you plan to use personally.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd