Hon.Algorithms (CSCI-GA 3520), Professor Yap Fall 2012 MIDTERM EXAM. Oct 11, 2012 SOLUTION
|
|
- Tobias Underwood
- 5 years ago
- Views:
Transcription
1 Hon.Algorithms (CSCI-GA 352), Professor Yap Fall 22 MIDTERM EXAM Oct, 22 SOLUTIONS Problem. ( Points) Consider the recurrence T(n) = 4T(n/2)+ n2 lgn. Reduce this to standard form and solve it to Θ-order. SOLUTION: (a) Let k = lgn and t(k) = T(2 k ). Then the recurrence becomes Let s(k) = t(k)/4 k. Then t(k) = 4t(k )+ 22k k. s(k) = s(k )+ k. Invoking DIC, this has the exact solution s(k) = H k usingthe Harmonic numbers with boundary condition s(k) = for k <. Plugging back, we get the exact solution T(n) = 4 lgn H lgn, which gives T(n) = Θ(n 2 (lnlgn)). Comments: Most students get perfect score for this. Problem 2. ( Points) (a) Draw the full binary tree corresponding to its compressed bit representations:,,,. (b) Is the currency system D = [,2,4,6,36] canonical? Explain. FIGURE: SOLUTION SOLUTION: (a) The tree is seen in Figure. It has 8 external nodes, so the bit string is 5 as expected. (b) NO, it is non-canonical. We know that D = [,2,4] is canonical. But D = [,2,4,6,36] is a Type B extension of D with parameters (q,q,r) = (4,2,). Thus it does not satisfy the inequalities r < q < r +q required by our theorem for canonical Type B extension. The proof of the theorem tells us how to find a counter example. A counter example is x = 48. The optimal solution is s = (,,,3,) but the greedy solution is s = (,,3,,). Comments: Many students get (b) wrong by invoking the following argument: in a currency system D = [d,...,d m ], if 2d i d i+ then the greedy algorithm is optimal. I am not sure where this idea comes from.
2 ,,,. Figure : Binary tree with compressed bit representation,,,. Problem 3. (6 Points) Recall the problem of computing the maxima of a unimodal function. In what sense can we say the stateless algorithm AL is only one step away from optimal. HINT: F k φ k / 5 = (φ ) k / 5, which monotonically decrease to very fast. SOLUTION: After k probes, AL gives a width of AL (k) = but the φ k optimal algorithm AL k gives Opt(k) = F k+ = 5. Thus Opt(k)/AL (k) = φ k+ 5/φ 2 = 5/( + φ) <. But if AL is given one extra probe, we get Opt(k)/AL (k+) = 5/φ >, i.e., AL withk+probeswouldbeatopt(k). Comments: This holds for k large enough. Actually, k does not have to be very large k at all. But we do not expect this analysis for the midterm. Now, many people repeated a mistake in my homework solution (I think). I believe I said 5/φ 2.7. Actually, it is φ 2 / 5.7. A simple reality check (like solution above) would have caught the error, since and φ 2 = +φ Sorry about that, but I did not take off points for this. Problem 4. (6 Points) Let p be a fixed odd number. Let S p denote the Standard Scheme for k-th selection problem where we divide the input set of n elements into n/p groups, each of size p, and then find the median of each group, etc. Let T p (n) denote the complexity of scheme S p. As usual, T p (n) only counts the number of comparisons. We want to understand the limit of T p (n) as p. (a) Let M(n) be the worst case number of comparisons for finding the median of n elements in the comparison tree model. Write the recurrence for T p (n) using M(n). HINT: assume p and n are so large that so that we may ignore ceiling and floors, etc. 2
3 SOLUTION: We may assume p divides n in the following. There are n/p groups, and to compute their median, we need (n/p)m(p) comparisons. We have n/p medians, so we need T p (n/p) comparisons in the recursive call. Next we to want to make sure that every element is related to the median of medians. How many unrelated elements are there? There are n/p groups, each with p/2 elements. So the number of such elements is n/2. So we need to compare each of these elements to the median. Finally, we can eliminate at least p/2 elements in n/2p groups, i.e., n/4 elements. and so recursively, we need to solve T(3n/4). The final recurrence is T(n) = M(p)(n/p)+T(n/p)+n/2+T(3n/4). () Comments: Many students ignored my HINT to assume p and n large so that you can do simple expressions like the above derivation. Otherwise, you easily get lost the details, and say some horribly wrong things. A common error is to forget the n/2 comparisons in the above recurrence. This is very instructive: if you do not make about n/2 extra comparisons, you cannot eliminate a single element for the recurrence. Figure out this remark. (b) Suppose you could (magically) prove that M(n) 2n, but you cannot exhibit any median algorithm that uses 2n comparisons. (Such a phenomenon is known to occur.) Can you exploit this information to implement the scheme S p for any given p? SOLUTION: Yes. In S p, we only need to find the median for p elements for a fixed p. Although we do not know any median algorithm that achieves 2n comparisons on n elements, for any fixed p, we can exhaustively search to find the optimal comparison tree program to find the median of p elements. This tree program uses most 2p comparisons (since we know that M(p) 2p). We can incorporate this tree program in our Scheme S p. Comments: No student understand this question. I will try to explain this in class. (c) Using the fantasy result of part (b), please solve for T p (n). In particular, find the optimal constant K p such that T p (n) K p n. What is K p as p? It is known that M(n) 2n O() and M(n) (3 ǫ)n. 3
4 SOLUTION: Our recurrence, using the fact that M(p) 2p, becomes Inductively, we have T(n) = 2n+T(n/p)+n/2+T(3n/4). (2) T(n) 5n/2+K p (n/p)+k p (3n/4) ( 5 K p n + 2K p p + 3 ) 4 K p n provided K p p/(p 4). Asymptotically, K p as p. Comments: If you forgot the +n/2 term in the recurrence in part (a), then you will get K p 8. Some student get K p, which is clearly impossible. In fact, we already said that median has a 2n O() lower bound, so K p 2. You should have used this as a clue that something is wrong. Problem 5. ( Points) We consider ratio balanced trees where < ρ < is fixed. (a) Show that there are AVL trees not in RB[ρ] if ρ < 2. This means you must show that there are AVL trees whose ratio is arbitrarily small. (b) Show there are infinitely many trees in RB[ρ] that are not AVL. SOLUTION: (a) Consider the AVL tree T n where the right subtree is the complete binary tree of height h (and so has esize of 2 h+ ), and the left subtree is the minimal size AVL tree of height n (and so has esize +µ(h) 2φ h ). The ratio of T n is at most 2φ h /2 h+ and this goes to as h. (b) Let H(n) denote the maximum height of a RB[ρ] tree of size n. It is easy to see by induction that H(n) log +ρ (n+). (3) The result we want will following from: OBSERVATION: There are RB[ρ] trees with ratios arbitrarily close to lg( + ρ). Such trees cannot be AVL. Proof of observation: suppose esize(u.right) = s. Then the height of u.right is at most H(s ) log +ρ s as derived above. Also esize(u.left) > sρ. Hence the height of u.left is at least lg(sρ ). The ratio of these heights is at least lg(sρ ) log +ρ s which approaches lg(+ρ) for large s. For example, with ρ = /3, the maximum ratio is lg(+ρ) = (2 lg3).45. Comments: Most people got part (a), using basically the example shown above. Most did not get part (b) or solved it partially. A simple way to solve part(b) is to just construct infinitely many RB[ρ] trees wherethe root has height difference greater than. But our proof here gives much more information. Problem 6. (6 Points) We had looked at an algorithm for biconnected components for bigraphs. (a) Please discuss its extension to digraphs. What would the reduced digraph would look like? HINT: the structure is actually quite complex, and there seems to be no standard way to describe them. Hypergraphs seems useful here. 4
5 (b) Outline an algorithm for counting the number of biconnected components in a digraph. SOLUTION FIGURE: a 2 3 b c (i) (ii) (iii) (iv) Figure 2: Biconnectedness in digraphs SOLUTION: This was a somewhat open-ended question for you to think on your feet. You would be going down the wrong paths if you thought this was a routine question. (a) Let G = (V,E) be a digraph. We call a subset C V a biconnected set if every pair to distinct vertices u v in C are contained in a simple cycle passing through vertices in C only. We can C a biconnected component if C is a maximal set with respect to being a biconnected set. Having defined this concept, we now see that they do not lead to any simple notion of a reduced digraph. Consider Figure 2(i): C := {a,b,c} and C 2 := {,2,3} {a,b}arebiconnected components. But weseethat C C 2 = 2. But it easy to generalize this example so that C C 2 is arbitrarily large (see Figure 2(ii)-(iv)). So how do we represent these biconnected components? By a hypergraph! But these are not be arbitrary hypergraphs (what are the constraints)? Moreover, there could be exponentially many biconnected components (exercise). (b) We might try to run our biconnectivity algorithm and see what we get. But it is not clear to me how to even verify a single biconnectivity component. Comments: Basically, biconnectivity for digraphs do not seem to lead to any simplification or reduced graph. A more promising direction is to look at Eulerian graphs: these are digraphs where the indegree equals the outdegree at each node. We can think of them as a generalization of bigraphs. 5
MIDTERM Fundamental Algorithms, Spring 2008, Professor Yap March 10, 2008
INSTRUCTIONS: MIDTERM Fundamental Algorithms, Spring 2008, Professor Yap March 10, 2008 0. This is a closed book exam, with one 8 x11 (2-sided) cheat sheet. 1. Please answer ALL questions (there is ONE
More informationLecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018
CS17 Integrated Introduction to Computer Science Klein Contents Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 1 Tree definitions 1 2 Analysis of mergesort using a binary tree 1 3 Analysis of
More informationMidterm Exam. CS 3110: Design and Analysis of Algorithms. June 20, Group 1 Group 2 Group 3
Banner ID: Name: Midterm Exam CS 3110: Design and Analysis of Algorithms June 20, 2006 Group 1 Group 2 Group 3 Question 1.1 Question 2.1 Question 3.1 Question 1.2 Question 2.2 Question 3.2 Question 3.3
More informationCSCE 750 Final Exam Answer Key Wednesday December 7, 2005
CSCE 750 Final Exam Answer Key Wednesday December 7, 2005 Do all problems. Put your answers on blank paper or in a test booklet. There are 00 points total in the exam. You have 80 minutes. Please note
More informationCS1800: Mathematical Induction. Professor Kevin Gold
CS1800: Mathematical Induction Professor Kevin Gold Induction: Used to Prove Patterns Just Keep Going For an algorithm, we may want to prove that it just keeps working, no matter how big the input size
More informationCS1800: Strong Induction. Professor Kevin Gold
CS1800: Strong Induction Professor Kevin Gold Mini-Primer/Refresher on Unrelated Topic: Limits This is meant to be a problem about reasoning about quantifiers, with a little practice of other skills, too
More informationLecture 1 : Data Compression and Entropy
CPS290: Algorithmic Foundations of Data Science January 8, 207 Lecture : Data Compression and Entropy Lecturer: Kamesh Munagala Scribe: Kamesh Munagala In this lecture, we will study a simple model for
More informationCSCI3390-Second Test with Solutions
CSCI3390-Second Test with Solutions April 26, 2016 Each of the 15 parts of the problems below is worth 10 points, except for the more involved 4(d), which is worth 20. A perfect score is 100: if your score
More informationCMPSCI 311: Introduction to Algorithms Second Midterm Exam
CMPSCI 311: Introduction to Algorithms Second Midterm Exam April 11, 2018. Name: ID: Instructions: Answer the questions directly on the exam pages. Show all your work for each question. Providing more
More informationChapter 1 Review of Equations and Inequalities
Chapter 1 Review of Equations and Inequalities Part I Review of Basic Equations Recall that an equation is an expression with an equal sign in the middle. Also recall that, if a question asks you to solve
More informationAnalysis of Algorithms I: Asymptotic Notation, Induction, and MergeSort
Analysis of Algorithms I: Asymptotic Notation, Induction, and MergeSort Xi Chen Columbia University We continue with two more asymptotic notation: o( ) and ω( ). Let f (n) and g(n) are functions that map
More information1 Introduction (January 21)
CS 97: Concrete Models of Computation Spring Introduction (January ). Deterministic Complexity Consider a monotonically nondecreasing function f : {,,..., n} {, }, where f() = and f(n) =. We call f a step
More informationPreparing for the CS 173 (A) Fall 2018 Midterm 1
Preparing for the CS 173 (A) Fall 2018 Midterm 1 1 Basic information Midterm 1 is scheduled from 7:15-8:30 PM. We recommend you arrive early so that you can start exactly at 7:15. Exams will be collected
More informationSolution to Proof Questions from September 1st
Solution to Proof Questions from September 1st Olena Bormashenko September 4, 2011 What is a proof? A proof is an airtight logical argument that proves a certain statement in general. In a sense, it s
More information5 + 9(10) + 3(100) + 0(1000) + 2(10000) =
Chapter 5 Analyzing Algorithms So far we have been proving statements about databases, mathematics and arithmetic, or sequences of numbers. Though these types of statements are common in computer science,
More informationCS261: Problem Set #3
CS261: Problem Set #3 Due by 11:59 PM on Tuesday, February 23, 2016 Instructions: (1) Form a group of 1-3 students. You should turn in only one write-up for your entire group. (2) Submission instructions:
More information/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Dynamic Programming II Date: 10/12/17
601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Dynamic Programming II Date: 10/12/17 12.1 Introduction Today we re going to do a couple more examples of dynamic programming. While
More informationChapter 4. Recurrences
Chapter 4. Recurrences Outline Offers three methods for solving recurrences, that is for obtaining asymptotic bounds on the solution In the substitution method, we guess a bound and then use mathematical
More informationTutorial on Mathematical Induction
Tutorial on Mathematical Induction Roy Overbeek VU University Amsterdam Department of Computer Science r.overbeek@student.vu.nl April 22, 2014 1 Dominoes: from case-by-case to induction Suppose that you
More informationCS 577 Introduction to Algorithms: Strassen s Algorithm and the Master Theorem
CS 577 Introduction to Algorithms: Jin-Yi Cai University of Wisconsin Madison In the last class, we described InsertionSort and showed that its worst-case running time is Θ(n 2 ). Check Figure 2.2 for
More informationMath 391: Midterm 1.0 Spring 2016
Math 391: Midterm 1.0 Spring 2016 James Skon skonjp@kenyon.edu Test date: October 5 Submission Instructions: Give all your assumptions. Show all your work. Be as complete as possible. Grading Problem 1
More information/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Asymptotic Analysis, recurrences Date: 9/7/17
601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Asymptotic Analysis, recurrences Date: 9/7/17 2.1 Notes Homework 1 will be released today, and is due a week from today by the beginning
More informationMathematical induction
Mathematical induction Notes and Examples These notes contain subsections on Proof Proof by induction Types of proof by induction Proof You have probably already met the idea of proof in your study of
More informationProof Techniques (Review of Math 271)
Chapter 2 Proof Techniques (Review of Math 271) 2.1 Overview This chapter reviews proof techniques that were probably introduced in Math 271 and that may also have been used in a different way in Phil
More informationLecture 4: Constructing the Integers, Rationals and Reals
Math/CS 20: Intro. to Math Professor: Padraic Bartlett Lecture 4: Constructing the Integers, Rationals and Reals Week 5 UCSB 204 The Integers Normally, using the natural numbers, you can easily define
More informationChapter 2. Recurrence Relations. Divide and Conquer. Divide and Conquer Strategy. Another Example: Merge Sort. Merge Sort Example. Merge Sort Example
Recurrence Relations Chapter 2 Divide and Conquer Equation or an inequality that describes a function by its values on smaller inputs. Recurrence relations arise when we analyze the running time of iterative
More informationTaking Stock. IE170: Algorithms in Systems Engineering: Lecture 3. Θ Notation. Comparing Algorithms
Taking Stock IE170: Algorithms in Systems Engineering: Lecture 3 Jeff Linderoth Department of Industrial and Systems Engineering Lehigh University January 19, 2007 Last Time Lots of funky math Playing
More informationMath 354 Summer 2004 Solutions to review problems for Midterm #1
Solutions to review problems for Midterm #1 First: Midterm #1 covers Chapter 1 and 2. In particular, this means that it does not explicitly cover linear algebra. Also, I promise there will not be any proofs.
More informationCS Data Structures and Algorithm Analysis
CS 483 - Data Structures and Algorithm Analysis Lecture VII: Chapter 6, part 2 R. Paul Wiegand George Mason University, Department of Computer Science March 22, 2006 Outline 1 Balanced Trees 2 Heaps &
More information6.854 Advanced Algorithms
6.854 Advanced Algorithms Homework Solutions Hashing Bashing. Solution:. O(log U ) for the first level and for each of the O(n) second level functions, giving a total of O(n log U ) 2. Suppose we are using
More informationFirst In-Class Exam Solutions Math 410, Professor David Levermore Monday, 1 October 2018
First In-Class Exam Solutions Math 40, Professor David Levermore Monday, October 208. [0] Let {b k } k N be a sequence in R and let A be a subset of R. Write the negations of the following assertions.
More informationCPSC 320 (Intermediate Algorithm Design and Analysis). Summer Instructor: Dr. Lior Malka Final Examination, July 24th, 2009
CPSC 320 (Intermediate Algorithm Design and Analysis). Summer 2009. Instructor: Dr. Lior Malka Final Examination, July 24th, 2009 Student ID: INSTRUCTIONS: There are 6 questions printed on pages 1 7. Exam
More informationWeek 5: Quicksort, Lower bound, Greedy
Week 5: Quicksort, Lower bound, Greedy Agenda: Quicksort: Average case Lower bound for sorting Greedy method 1 Week 5: Quicksort Recall Quicksort: The ideas: Pick one key Compare to others: partition into
More informationExam 2 Solutions. x 1 x. x 4 The generating function for the problem is the fourth power of this, (1 x). 4
Math 5366 Fall 015 Exam Solutions 1. (0 points) Find the appropriate generating function (in closed form) for each of the following problems. Do not find the coefficient of x n. (a) In how many ways can
More informationAlgorithms and Data Structures 2016 Week 5 solutions (Tues 9th - Fri 12th February)
Algorithms and Data Structures 016 Week 5 solutions (Tues 9th - Fri 1th February) 1. Draw the decision tree (under the assumption of all-distinct inputs) Quicksort for n = 3. answer: (of course you should
More information9.2 Multiplication Properties of Radicals
Section 9.2 Multiplication Properties of Radicals 885 9.2 Multiplication Properties of Radicals Recall that the equation x 2 = a, where a is a positive real number, has two solutions, as indicated in Figure
More informationWritten Homework #1: Analysis of Algorithms
Written Homework #1: Analysis of Algorithms CIS 121 Fall 2016 cis121-16fa-staff@googlegroups.com Due: Thursday, September 15th, 2015 before 10:30am (You must submit your homework online via Canvas. A paper
More information1 AC 0 and Håstad Switching Lemma
princeton university cos 522: computational complexity Lecture 19: Circuit complexity Lecturer: Sanjeev Arora Scribe:Tony Wirth Complexity theory s Waterloo As we saw in an earlier lecture, if PH Σ P 2
More informationMethods for solving recurrences
Methods for solving recurrences Analyzing the complexity of mergesort The merge function Consider the following implementation: 1 int merge ( int v1, int n1, int v, int n ) { 3 int r = malloc ( ( n1+n
More informationQuiz 1 Solutions. Problem 2. Asymptotics & Recurrences [20 points] (3 parts)
Introduction to Algorithms October 13, 2010 Massachusetts Institute of Technology 6.006 Fall 2010 Professors Konstantinos Daskalakis and Patrick Jaillet Quiz 1 Solutions Quiz 1 Solutions Problem 1. We
More informationDesign and Analysis of Algorithms
CSE 101, Winter 2018 Design and Analysis of Algorithms Lecture 5: Divide and Conquer (Part 2) Class URL: http://vlsicad.ucsd.edu/courses/cse101-w18/ A Lower Bound on Convex Hull Lecture 4 Task: sort the
More informationUniversity of New Mexico Department of Computer Science. Final Examination. CS 362 Data Structures and Algorithms Spring, 2007
University of New Mexico Department of Computer Science Final Examination CS 362 Data Structures and Algorithms Spring, 2007 Name: Email: Print your name and email, neatly in the space provided above;
More informationAditya Bhaskara CS 5968/6968, Lecture 1: Introduction and Review 12 January 2016
Lecture 1: Introduction and Review We begin with a short introduction to the course, and logistics. We then survey some basics about approximation algorithms and probability. We also introduce some of
More informationCompute the Fourier transform on the first register to get x {0,1} n x 0.
CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary
More informationCS 4407 Algorithms Lecture 2: Iterative and Divide and Conquer Algorithms
CS 4407 Algorithms Lecture 2: Iterative and Divide and Conquer Algorithms Prof. Gregory Provan Department of Computer Science University College Cork 1 Lecture Outline CS 4407, Algorithms Growth Functions
More informationPHY2048 Physics with Calculus I
PHY2048 Physics with Calculus I Section 584761 Prof. Douglas H. Laurence Exam 1 (Chapters 2 6) February 14, 2018 Name: Solutions 1 Instructions: This exam is composed of 10 multiple choice questions and
More informationHOW TO WRITE PROOFS. Dr. Min Ru, University of Houston
HOW TO WRITE PROOFS Dr. Min Ru, University of Houston One of the most difficult things you will attempt in this course is to write proofs. A proof is to give a legal (logical) argument or justification
More informationChapter 5 Simplifying Formulas and Solving Equations
Chapter 5 Simplifying Formulas and Solving Equations Look at the geometry formula for Perimeter of a rectangle P = L W L W. Can this formula be written in a simpler way? If it is true, that we can simplify
More informationNP-problems continued
NP-problems continued Page 1 Since SAT and INDEPENDENT SET can be reduced to each other we might think that there would be some similarities between the two problems. In fact, there is one such similarity.
More informationIowa State University. Instructor: Alex Roitershtein Summer Exam #1. Solutions. x u = 2 x v
Math 501 Iowa State University Introduction to Real Analysis Department of Mathematics Instructor: Alex Roitershtein Summer 015 Exam #1 Solutions This is a take-home examination. The exam includes 8 questions.
More informationCPSC 320 Sample Final Examination December 2013
CPSC 320 Sample Final Examination December 2013 [10] 1. Answer each of the following questions with true or false. Give a short justification for each of your answers. [5] a. 6 n O(5 n ) lim n + This is
More informationP, NP, NP-Complete. Ruth Anderson
P, NP, NP-Complete Ruth Anderson A Few Problems: Euler Circuits Hamiltonian Circuits Intractability: P and NP NP-Complete What now? Today s Agenda 2 Try it! Which of these can you draw (trace all edges)
More informationNP-Completeness Review
CS124 NP-Completeness Review Where We Are Headed Up to this point, we have generally assumed that if we were given a problem, we could find a way to solve it. Unfortunately, as most of you know, there
More informationCS1210 Lecture 23 March 8, 2019
CS1210 Lecture 23 March 8, 2019 HW5 due today In-discussion exams next week Optional homework assignment next week can be used to replace a score from among HW 1 3. Will be posted some time before Monday
More informationQuiz 3 Reminder and Midterm Results
Quiz 3 Reminder and Midterm Results Reminder: Quiz 3 will be in the first 15 minutes of Monday s class. You can use any resources you have during the quiz. It covers all four sections of Unit 3. It has
More informationCSE 421 Introduction to Algorithms Final Exam Winter 2005
NAME: CSE 421 Introduction to Algorithms Final Exam Winter 2005 P. Beame 14 March 2005 DIRECTIONS: Answer the problems on the exam paper. Open book. Open notes. If you need extra space use the back of
More informationComputer Science 385 Analysis of Algorithms Siena College Spring Topic Notes: Limitations of Algorithms
Computer Science 385 Analysis of Algorithms Siena College Spring 2011 Topic Notes: Limitations of Algorithms We conclude with a discussion of the limitations of the power of algorithms. That is, what kinds
More informationFormal definition of P
Since SAT and INDEPENDENT SET can be reduced to each other we might think that there would be some similarities between the two problems. In fact, there is one such similarity. In SAT we want to know if
More informationwith the size of the input in the limit, as the size of the misused.
Chapter 3. Growth of Functions Outline Study the asymptotic efficiency of algorithms Give several standard methods for simplifying the asymptotic analysis of algorithms Present several notational conventions
More informationCS 241 Analysis of Algorithms
CS 241 Analysis of Algorithms Professor Eric Aaron Lecture T Th 9:00am Lecture Meeting Location: OLB 205 Business Grading updates: HW5 back today HW7 due Dec. 10 Reading: Ch. 22.1-22.3, Ch. 25.1-2, Ch.
More informationMath 163 (23) - Midterm Test 1
Name: Id #: Math 63 (23) - Midterm Test Spring Quarter 208 Friday April 20, 09:30am - 0:20am Instructions: Prob. Points Score possible 26 2 4 3 0 TOTAL 50 Read each problem carefully. Write legibly. Show
More informationCS2223 Algorithms D Term 2009 Exam 3 Solutions
CS2223 Algorithms D Term 2009 Exam 3 Solutions May 4, 2009 By Prof. Carolina Ruiz Dept. of Computer Science WPI PROBLEM 1: Asymptoptic Growth Rates (10 points) Let A and B be two algorithms with runtimes
More informationCSC236 Week 3. Larry Zhang
CSC236 Week 3 Larry Zhang 1 Announcements Problem Set 1 due this Friday Make sure to read Submission Instructions on the course web page. Search for Teammates on Piazza Educational memes: http://www.cs.toronto.edu/~ylzhang/csc236/memes.html
More informationCS 170 Algorithms Fall 2014 David Wagner MT2
CS 170 Algorithms Fall 2014 David Wagner MT2 PRINT your name:, (last) SIGN your name: (first) Your Student ID number: Your Unix account login: cs170- The room you are sitting in right now: Name of the
More informationToday s Outline. CS 362, Lecture 4. Annihilator Method. Lookup Table. Annihilators for recurrences with non-homogeneous terms Transformations
Today s Outline CS 362, Lecture 4 Jared Saia University of New Mexico Annihilators for recurrences with non-homogeneous terms Transformations 1 Annihilator Method Lookup Table Write down the annihilator
More information1 Terminology and setup
15-451/651: Design & Analysis of Algorithms August 31, 2017 Lecture #2 last changed: August 29, 2017 In this lecture, we will examine some simple, concrete models of computation, each with a precise definition
More informationDiscrete Mathematics and Probability Theory Summer 2014 James Cook Midterm 1
CS 70 Discrete Mathematics and Probability Theory Summer 2014 James Cook Midterm 1 Thursday July 17, 2014, 12:40pm-2:00pm. Instructions: Do not turn over this page until the proctor tells you to. Don t
More informationEvolutionary Models. Evolutionary Models
Edit Operators In standard pairwise alignment, what are the allowed edit operators that transform one sequence into the other? Describe how each of these edit operations are represented on a sequence alignment
More information1 More finite deterministic automata
CS 125 Section #6 Finite automata October 18, 2016 1 More finite deterministic automata Exercise. Consider the following game with two players: Repeatedly flip a coin. On heads, player 1 gets a point.
More informationAsymptotic Analysis and Recurrences
Appendix A Asymptotic Analysis and Recurrences A.1 Overview We discuss the notion of asymptotic analysis and introduce O, Ω, Θ, and o notation. We then turn to the topic of recurrences, discussing several
More informationSolutions to Quiz 1. Problem 1 (20 points). Suppose S(n) is a predicate on natural numbers, n, and suppose. k N S(k) S(k + 2). (1)
Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr. Radhika Nagpal Solutions to Quiz 1 Problem 1 (20 points). Suppose S(n) is
More informationMITOCW watch?v=y6ma-zn4olk
MITOCW watch?v=y6ma-zn4olk PROFESSOR: We have to ask what happens here? This series for h of u doesn't seem to stop. You go a 0, a 2, a 4. Well, it could go on forever. And what would happen if it goes
More informationAlgorithms Design & Analysis. Analysis of Algorithm
Algorithms Design & Analysis Analysis of Algorithm Review Internship Stable Matching Algorithm 2 Outline Time complexity Computation model Asymptotic notions Recurrence Master theorem 3 The problem of
More informationHow many hours would you estimate that you spent on this assignment?
The first page of your homework submission must be a cover sheet answering the following questions. Do not leave it until the last minute; it s fine to fill out the cover sheet before you have completely
More informationAlignment Algorithms. Alignment Algorithms
Midterm Results Big improvement over scores from the previous two years. Since this class grade is based on the previous years curve, that means this class will get higher grades than the previous years.
More informationAn analogy from Calculus: limits
COMP 250 Fall 2018 35 - big O Nov. 30, 2018 We have seen several algorithms in the course, and we have loosely characterized their runtimes in terms of the size n of the input. We say that the algorithm
More informationMore Asymptotic Analysis Spring 2018 Discussion 8: March 6, 2018
CS 61B More Asymptotic Analysis Spring 2018 Discussion 8: March 6, 2018 Here is a review of some formulas that you will find useful when doing asymptotic analysis. ˆ N i=1 i = 1 + 2 + 3 + 4 + + N = N(N+1)
More informationQuestion Paper Code :
www.vidyarthiplus.com Reg. No. : B.E./B.Tech. DEGREE EXAMINATION, NOVEMBER/DECEMBER 2011. Time : Three hours Fourth Semester Computer Science and Engineering CS 2251 DESIGN AND ANALYSIS OF ALGORITHMS (Regulation
More informationSolutions to Second Midterm
Operations Management 33:623:386:04/05 Professor Eckstein, Spring 2002 Solutions to Second Midterm Q1 Q2 Q3 Total Max 35 33 30 94 Mean 25.9 26.4 27.6 79.8 Median 27.0 27.0 28.0 81.0 Min 8 15 20 50 Standard
More informationReading 10 : Asymptotic Analysis
CS/Math 240: Introduction to Discrete Mathematics Fall 201 Instructor: Beck Hasti and Gautam Prakriya Reading 10 : Asymptotic Analysis In the last reading, we analyzed the running times of various algorithms.
More informationMITOCW 6. Standing Waves Part I
MITOCW 6. Standing Waves Part I The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free.
More informationConcrete models and tight upper/lower bounds
Lecture 3 Concrete models and tight upper/lower bounds 3.1 Overview In this lecture, we will examine some simple, concrete models of computation, each with a precise definition of what counts as a step,
More informationMidterm 1 for CS 170
UC Berkeley CS 170 Midterm 1 Lecturer: Satish Rao October 2 Midterm 1 for CS 170 Print your name:, (last) (first) Sign your name: Write your section number (e.g., 101): Write your SID: One page of notes
More informationCalculus with Analytic Geometry I Exam 8 Take Home Part.
Calculus with Analytic Geometry I Exam 8 Take Home Part. INSTRUCTIONS: SHOW ALL WORK. Write clearly, using full sentences. Use equal signs appropriately; don t use them between quantities that are not
More informationCS 2110: INDUCTION DISCUSSION TOPICS
CS 110: INDUCTION DISCUSSION TOPICS The following ideas are suggestions for how to handle your discussion classes. You can do as much or as little of this as you want. You can either present at the board,
More informationA point p is said to be dominated by point q if p.x=q.x&p.y=q.y 2 true. In RAM computation model, RAM stands for Random Access Model.
In analysis the upper bound means the function grows asymptotically no faster than its largest term. 1 true A point p is said to be dominated by point q if p.x=q.x&p.y=q.y 2 true In RAM computation model,
More informationU.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan August 30, Notes for Lecture 1
U.C. Berkeley CS278: Computational Complexity Handout N1 Professor Luca Trevisan August 30, 2004 Notes for Lecture 1 This course assumes CS170, or equivalent, as a prerequisite. We will assume that the
More informationFINAL EXAM PRACTICE PROBLEMS CMSC 451 (Spring 2016)
FINAL EXAM PRACTICE PROBLEMS CMSC 451 (Spring 2016) The final exam will be on Thursday, May 12, from 8:00 10:00 am, at our regular class location (CSI 2117). It will be closed-book and closed-notes, except
More informationHi, I'm Jocelyn, and we're going to go over Fall 2009, Exam 1, problem number 2.
MIT OpenCourseWare http://ocw.mit.edu 3.091SC Introduction to Solid State Chemistry, Fall 2010 Transcript Exam 1 Problem 2 The following content is provided under a Creative Commons license. Your support
More informationCSC236 Week 4. Larry Zhang
CSC236 Week 4 Larry Zhang 1 Announcements PS2 due on Friday This week s tutorial: Exercises with big-oh PS1 feedback People generally did well Writing style need to be improved. This time the TAs are lenient,
More informationMathematical Background. e x2. log k. a+b a + b. Carlos Moreno uwaterloo.ca EIT e π i 1 = 0.
Mathematical Background Carlos Moreno cmoreno @ uwaterloo.ca EIT-4103 N k=0 log k 0 e x2 e π i 1 = 0 dx a+b a + b https://ece.uwaterloo.ca/~cmoreno/ece250 Mathematical Background Standard reminder to set
More informationGrowth of Functions (CLRS 2.3,3)
Growth of Functions (CLRS 2.3,3) 1 Review Last time we discussed running time of algorithms and introduced the RAM model of computation. Best-case running time: the shortest running time for any input
More information6.046 Recitation 2: Recurrences Bill Thies, Fall 2004 Outline
6.046 Recitation 2: Recurrences Bill Thies, Fall 2004 Outline Acknowledgement Parts of these notes are adapted from notes of George Savvides and Dimitris Mitsouras. My contact information: Bill Thies thies@mit.edu
More informationMid-term Exam Answers and Final Exam Study Guide CIS 675 Summer 2010
Mid-term Exam Answers and Final Exam Study Guide CIS 675 Summer 2010 Midterm Problem 1: Recall that for two functions g : N N + and h : N N +, h = Θ(g) iff for some positive integer N and positive real
More informationChapter 4 Divide-and-Conquer
Chapter 4 Divide-and-Conquer 1 About this lecture (1) Recall the divide-and-conquer paradigm, which we used for merge sort: Divide the problem into a number of subproblems that are smaller instances of
More informationTHE EGG GAME DR. WILLIAM GASARCH AND STUART FLETCHER
THE EGG GAME DR. WILLIAM GASARCH AND STUART FLETCHER Abstract. We present a game and proofs for an optimal solution. 1. The Game You are presented with a multistory building and some number of superstrong
More informationHW8. Due: November 1, 2018
CSCI 1010 Theory of Computation HW8 Due: November 1, 2018 Attach a fully filled-in cover sheet to the front of your printed homework Your name should not appear anywhere; the cover sheet and each individual
More informationAsymptotic Analysis. Slides by Carl Kingsford. Jan. 27, AD Chapter 2
Asymptotic Analysis Slides by Carl Kingsford Jan. 27, 2014 AD Chapter 2 Independent Set Definition (Independent Set). Given a graph G = (V, E) an independent set is a set S V if no two nodes in S are joined
More informationSTEP Support Programme. Hints and Partial Solutions for Assignment 1
STEP Support Programme Hints and Partial Solutions for Assignment 1 Warm-up 1 You can check many of your answers to this question by using Wolfram Alpha. Only use this as a check though and if your answer
More informationAsk. Don t Tell. Annotated Examples
Ask. Don t Tell. Annotated Examples Alfonso Gracia-Saz (alfonso@math.toronto.edu) The three principles: 1. Where is the student? 2. Help minimally. 3. Ask. Don t Tell. Ask. Don t Tell. 1 BRETT 1 Brett
More information