Name the metrics for selecting top algorithm, Database Management System

Assignment Help:

Name the metrics for selecting top algorithm

There are a number of metrics for selecting top algorithm:

i) Computational complexity: Computational complexity refers to efficiency. The processor time increases as a function of size of data structure. But small factors of inefficiency are unimportant if they improve clarity.

ii) Ease of use: a simple algorithm, which is easy to use and understand, could be used for less important operations.

iii)  Flexibility: The fully optimized algorithm is normally less readable and very hard to implement. The solution for this is to provide two implementations of the crucial operations: 

  • A complicated but very proficient algorithm.
  • A simple but unproductive algorithm.

 


Related Discussions:- Name the metrics for selecting top algorithm

Data, Explain three main attributes of data.

Explain three main attributes of data.

Wait-die scheme -deadlock prevention, Wait-die" scheme : The idea is based ...

Wait-die" scheme : The idea is based on non-preventive method. It is based on a simple rule:                                 If Ti requests a database resource that is held by T

Remove partial dependancy, , write the relational schema, and draw the new ...

, write the relational schema, and draw the new dependency diagrams. Identify the normal forms for each table structure you created

What are segments in oracle, What are segments in oracle? Segments - Ea...

What are segments in oracle? Segments - Each table has single field of disk space, known as segment, set aside for it in the tablespace. Segments consist of contiguous sections

Sequences-data control, Sequences Sequences: Automatically produ...

Sequences Sequences: Automatically produce unique numbers Are sharable Are typically used to make a primary key value Replace application code Speed up t

Explain how the law ensures data protection and security, Question 1: (...

Question 1: (a) Explain the legal meaning of :- (i) Computer Service Person (ii) Data holding (b) Explain how the law ensures Data protection and Security. Qu

Hashing, how to implement mid square hashing?

how to implement mid square hashing?

Describe about use case and external case in dfd, Describe about Use Case a...

Describe about Use Case and external case in DFD The processes are transformed those into the Use Case and external case in DFD has same characteristics which of an actor in O

Aims of the design project, The aims of the project are: 1. To enable th...

The aims of the project are: 1. To enable the students to undertake the detailed design of a specific plant or process 2. The design projects includes: process selection; und

Explain the data access protocol, (a) Explain the three types of potentia...

(a) Explain the three types of potential mistake which could occur if concurrency control is not properly enforced in the database system. Support your answer with appropriate ex

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd