CSE 531 Homework 1 Solution. Jiayi Xian
|
|
- Erica Fowler
- 5 years ago
- Views:
Transcription
1 CSE 53 Homework Solution Jiayi Xian Fall 08
2 . (a) True. Since f(n) O(f(n)), clearly we have O(f(n)) O(O(f(n))). For the opposite, suppose g(n) O(O(f(n))), that is c > 0, h(n) O(f(n)), s.t g(n) c h(n) as n. Since h(n) O(f(n)), we have some c > 0, s.t h(n) c f(n) as n, thus g(n) c c f(n) as n, i.e g(n) O(f(n)). (b) True. Since f(n) Θ(f(n)), clearly we have O(f(n)) O(Θ(f(n))). For the opposite, suppose g(n) O(Θ(f(n))), according to definition, h(n) Θ(f(n)), c, c, c 3 > 0, s.t g(n) c h(n), c f(n) h(n) c 3 f(n) as n. It gives g(n) c c 3 f(n) as n, i.e. g(n) O(f(n)). (c) False. The relation should be Θ(O(f(n)) Θ(f(n)). Let f(n) = n, g(n) = O(f(n)). clearly Θ() Θ(O(f(n))) but / Θ(n) = Θ(f(n)) (since there doesn t exist c > 0 s.t > c n as n ). (d) True. g(n), let h(n) = max{g(n), f(n)}, l(n) = min{g(n), f(n)}. We know g(n) max{g(n), f(n)} Ω(f(n)), so g(n) O(Ω(f(n))). g(n) min{g(n), f(n)} Ω(O(f(n))), so g(n) Ω(O(f(n)). So Ω(O(f(n))) = O(Ω(f(n))) = {all the functions : N + R + } (e) True. By definition, c > 0 s.t. c(g(n) + h(n)) f(n), since both g(n) and h(n) are positive, we have c g(n) f(n), c h(n) f(n) respectively. Therefore f(n) = Ω(g(n)),f(n) = Ω(h(n)). (f) False. Take f(n) = + n, g(n) =. f(n) = Θ() but log f(n) = Θ( n ) (g) True. Since both f(n) and g(n) are positive, clearly we have max (f(n), g(n)) f(n) + g(n). For the other direction, WLOG we assume f(n) g(n), then f(n) + g(n) f(n) = max (f(n), g(n)). (a) When n =, it s trivially true. Now suppose when the statement holds for n = k: then for n = k +, we have:! + 3! + + k (k + )! = (k + )!! + 3! + + k (k + )! + k + (k + )! = (k + )! + k + (k + )! = k + (k + )! + k + (k + )! = (k + )! It completes our proof.
3 (b) Proof. First we use mathematical induction to prove the maximum number of regions generated by the intersections of n unit circles on a plane is O(n ): Given arbitrary n circles, let r(k) be the number of regions generated by the first k circles. Then it s sufficient to show r(k) r(k )+Θ(k) for all k n. Consider the intersection of the k-th circle (denoted as R k ) and the first k circles. Since any two circle intersects at at most points, there are at most (k ) intersection points on R k, which divides R k into at most (k ) many arcs. Any newly generated region must include at least one arc of R k as its boundary, otherwise it s an old region. But for any arc of R k, there are at most two regions include it as their boundary. Therefore, the newly generated region is upper-bounded by 4(k ). Namely, r(k) r(k ) + 4(k ), implies r(n) = O(n ). Second, to show the maximum number of regions generated by the intersections of n unit circles on a plane is Ω(n ), we just need to provide a certain arrangement. For convenience let s consider n unit circles under Cartesian coordinate system. The coordinates of the center of a circle solely determines its position. Place the first n circles so that the i-th circle centered at ( + i/n, 0). Place the rest of n circles so that the n + i-th circle centered at (0, + i/n ). For sufficient large n, there are Θ(n ) many regions inside the rectangle bounded by (0, 0) and (/n, /n). 3. (a) Stirling formula: n! πn( n e )n = O(n n ) (b) n x log xdx = n x log x n xdx = n log n + o(n log n) = Θ(n log n) (c) = log k + log k log + log 0 i=0 = log( k k... ) = log( k+(k ) ) = log( k(k+) ) = k + k = (log n + log n) = Θ(log n)
4 (d) Wrong. By limit test, n n lim n n = lim n log n n n = lim n n(log n ) = 4. n lg n, lg (lg(n)), (lg(n)), (lg n) lg(lg n), lg n, n 5, [lg(lg n)] lg n, n0.00, n!, n n lg n = ( lg n ) lg n = Denote k = lg lg n, f(k) = lg n, f(k ) = lg lg(n), f(k ) = lg lg lg(n).... Then we have f(i ) = lg(f(i)), f(i) = f(i ), for i (,..., k). First, it s easy to see by induction k f(k): (a) k =, f() = x. (b) Suppose k = n >, n f(n). (c) For k = n +, f(n + ) = f(n) > n > n +. Second, according to the definition of lg lg n, we have 0 < f(0) < and lg n = f(k ). So k < (k )/ < f(k )/ = lg n for n. The above proves n lg n lg (lg(n)) (lg(n)). Let x = lg(n) (lg(n)) = x / / lg x = (lg n) lg(lg n) = (lg(lg n)) lg(lg n) = (lg(x)) lg n = x n 5 = 5 lg n = 5x [lg(lg n)] lg n = [lg(lg(lg n))] lg n [lg(lg x)] x = [lg(lg n)] lg n = [lg(lg(lg n))] lg n n0.00 Remember lg x x ε for ε > 0, we can get (lg(n)) (lg n) lg(lg n) lg n n 5 [lg(lg n)] lg n n0.00 By Stirling s formula, n! πn( n e )n. lg n0.00 = n
5 lg n! = lg(πn) + n lg(n e ) lg n = n Since n 0.00 n lg( n e ), lg(πn) + n lg( n e ) n when n, we have n0.00 n! n. 5. (a) T (n) = T (n ) + 3 n T (n) = T (n ) + 3 n = T (n ) + 3 n + 3 n = T () + = + 3n+ 3 = 3n+ (b) Assume n = 3 k, from T (n) = 4T (n/3) + n.5 we have: T (n) = T (3 k ) = 4T (3 k ) + 3 k = 4(4T (3 k ) + 3.5(k ) ) + 3.5k = 4 T (3 k ) (k ) + 3.5k = 4 k T () + = 4 k ( + ( k i 3.5i ( ) k+ = 4 k = Θ(3.5k ) = Θ(n.5 ) or using master theorem. ) i ) n i= 3 i 4
6 (c) Assume n = 8 k, from T (n) = 5T (n/8) + n we have: T (n) = T (8 k ) = 5T (8 k ) + 8 k = 5(5T (8 k ) + 8 k ) + 8 k = 5 T (8 k ) k + 8 k = 5 k T () + = 5 k ( + 5 k i 8 i (8) i) 5 ( 8 ) k+ = 5 k = Θ(8 k ) = Θ(n) or using master theorem. (d) Assume n = a k, then log n = k log a T (n) = T ( n) + log n = T (n 4 ) + log n + log n = T (n k ) + log n k + log n k + + log n + log n = T (a) + log n ( k i=0 ( )k )i = T (a) + log n = T (a) + log n log a = T (a) + ( ( )k ) log n (e) T (n) T (n ) = T (n ), so T (n) = 3T (n ) = 3 T (n ) = = 3 n T () = 3 n. 5
7 (f) Assume n = k, from T (n) = 3T (n/) + n log n we have: T ( k ) = 3T ( k ) + k k = 3(3T ( k ) + k (k ) + k k = 3 T ( k ) + 3 k (k ) + k k = 3 k T () + = 3 k + 3 k 3 k i i i = 3 k ( + o(3 k )) = Θ(3 k ) = Θ(n log 3 ) () i i 3 or using master theorem. (g) Assume n = k, from T (n) = T (n/) + n log log n we have: T ( k ) = T ( k ) + k log k = (T ( k k ) + log (k ) ) + k log k = T ( k ) + = k T () + = k + k k log (k ) + k log k k log i log i Using integral method, k ln xdx which is called the Logarithmic integral function, or li(x). It s asymptotic behavior is li(x) = Θ(x/ ln x). T (n) = Θ(n log n/ log log n). log i is bounded by ln k Therefore k log i = Θ(k/ ln k). 6
8 (h) Assume n = k, from T (n) = nt ( n) + n we have: T ( k ) = k T ( k ) + k + k = k ( k T ( k ) + k ) + k + k = k + k T ( k ) + k + k + k + k = k k T ( k ) + k + k + k + k = k k ( k 3 T ( k 3 ) + k ) + k + k + k + k = k k 3 T ( k 3 ) + k + k + k + k + k + k = k T () + k + i = k / T () + k = n/ T () + n Θ(n) = Θ(n ) i 6. The characteristic equation is x = 8x 5. The roots are x = 3 and x = 5. So a n = A 3 n + B 5 n. Plug in a 0 = 3 and a = 5, we have A + B = 3 3A + 5B = 5 So A = 5, B =. So a n = 5 3 n 5 n. 7
CS Non-recursive and Recursive Algorithm Analysis
CS483-04 Non-recursive and Recursive Algorithm Analysis Instructor: Fei Li Room 443 ST II Office hours: Tue. & Thur. 4:30pm - 5:30pm or by appointments lifei@cs.gmu.edu with subject: CS483 http://www.cs.gmu.edu/
More informationCS473 - Algorithms I
CS473 - Algorithms I Lecture 2 Asymptotic Notation 1 O-notation: Asymptotic upper bound f(n) = O(g(n)) if positive constants c, n 0 such that 0 f(n) cg(n), n n 0 f(n) = O(g(n)) cg(n) f(n) Asymptotic running
More informationCS 4407 Algorithms Lecture 2: Growth Functions
CS 4407 Algorithms Lecture 2: Growth Functions Prof. Gregory Provan Department of Computer Science University College Cork 1 Lecture Outline Growth Functions Mathematical specification of growth functions
More informationIntroduction to Algorithms
Introduction to Algorithms (2 nd edition) by Cormen, Leiserson, Rivest & Stein Chapter 3: Growth of Functions (slides enhanced by N. Adlai A. DePano) Overview Order of growth of functions provides a simple
More informationCompare the growth rate of functions
Compare the growth rate of functions We have two algorithms A 1 and A 2 for solving the same problem, with runtime functions T 1 (n) and T 2 (n), respectively. Which algorithm is more efficient? We compare
More informationIntroduction to Algorithms: Asymptotic Notation
Introduction to Algorithms: Asymptotic Notation Why Should We Care? (Order of growth) CS 421 - Analysis of Algorithms 2 Asymptotic Notation O-notation (upper bounds): that 0 f(n) cg(n) for all n n. 0 CS
More informationAgenda. We ve discussed
Agenda We ve discussed Now Next C++ basics Some built-in data structures and their applications: stack, map, vector, array The Fibonacci example showing the importance of good algorithms and asymptotic
More informationGrade 11/12 Math Circles Fall Nov. 5 Recurrences, Part 2
1 Faculty of Mathematics Waterloo, Ontario Centre for Education in Mathematics and Computing Grade 11/12 Math Circles Fall 2014 - Nov. 5 Recurrences, Part 2 Running time of algorithms In computer science,
More informationAsymptotic Analysis. Thomas A. Anastasio. January 7, 2004
Asymptotic Analysis Thomas A. Anastasio January 7, 004 1 Introduction As a programmer, you often have a choice of data structures and algorithms. Choosing the best one for a particular job involves, among
More informationAsymptotic Analysis and Recurrences
Appendix A Asymptotic Analysis and Recurrences A.1 Overview We discuss the notion of asymptotic analysis and introduce O, Ω, Θ, and o notation. We then turn to the topic of recurrences, discussing several
More informationCIS 121 Data Structures and Algorithms with Java Spring Big-Oh Notation Monday, January 22/Tuesday, January 23
CIS 11 Data Structures and Algorithms with Java Spring 018 Big-Oh Notation Monday, January /Tuesday, January 3 Learning Goals Review Big-Oh and learn big/small omega/theta notations Discuss running time
More information/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Asymptotic Analysis, recurrences Date: 9/7/17
601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Asymptotic Analysis, recurrences Date: 9/7/17 2.1 Notes Homework 1 will be released today, and is due a week from today by the beginning
More informationTaking Stock. IE170: Algorithms in Systems Engineering: Lecture 3. Θ Notation. Comparing Algorithms
Taking Stock IE170: Algorithms in Systems Engineering: Lecture 3 Jeff Linderoth Department of Industrial and Systems Engineering Lehigh University January 19, 2007 Last Time Lots of funky math Playing
More informationThe Growth of Functions and Big-O Notation
The Growth of Functions and Big-O Notation Big-O Notation Big-O notation allows us to describe the aymptotic growth of a function without concern for i) constant multiplicative factors, and ii) lower-order
More informationCS 4407 Algorithms Lecture 2: Iterative and Divide and Conquer Algorithms
CS 4407 Algorithms Lecture 2: Iterative and Divide and Conquer Algorithms Prof. Gregory Provan Department of Computer Science University College Cork 1 Lecture Outline CS 4407, Algorithms Growth Functions
More informationDesign and Analysis of Algorithms Recurrence. Prof. Chuhua Xian School of Computer Science and Engineering
Design and Analysis of Algorithms Recurrence Prof. Chuhua Xian Email: chhxian@scut.edu.cn School of Computer Science and Engineering Course Information Instructor: Chuhua Xian ( 冼楚华 ) Email: chhxian@scut.edu.cn
More informationEECS 477: Introduction to algorithms. Lecture 5
EECS 477: Introduction to algorithms. Lecture 5 Prof. Igor Guskov guskov@eecs.umich.edu September 19, 2002 1 Lecture outline Asymptotic notation: applies to worst, best, average case performance, amortized
More informationDesign and Analysis of Algorithms
Design and Analysis of Algorithms Instructor: Sharma Thankachan Lecture 2: Growth of Function Slides modified from Dr. Hon, with permission 1 About this lecture Introduce Asymptotic Notation Q( ), O( ),
More informationSolving recurrences. Frequently showing up when analysing divide&conquer algorithms or, more generally, recursive algorithms.
Solving recurrences Frequently showing up when analysing divide&conquer algorithms or, more generally, recursive algorithms Example: Merge-Sort(A, p, r) 1: if p < r then 2: q (p + r)/2 3: Merge-Sort(A,
More informationAlgorithm efficiency can be measured in terms of: Time Space Other resources such as processors, network packets, etc.
Algorithms Analysis Algorithm efficiency can be measured in terms of: Time Space Other resources such as processors, network packets, etc. Algorithms analysis tends to focus on time: Techniques for measuring
More informationAlgorithms and Theory of Computation. Lecture 2: Big-O Notation Graph Algorithms
Algorithms and Theory of Computation Lecture 2: Big-O Notation Graph Algorithms Xiaohui Bei MAS 714 August 14, 2018 Nanyang Technological University MAS 714 August 14, 2018 1 / 20 O, Ω, and Θ Nanyang Technological
More informationData structures Exercise 1 solution. Question 1. Let s start by writing all the functions in big O notation:
Data structures Exercise 1 solution Question 1 Let s start by writing all the functions in big O notation: f 1 (n) = 2017 = O(1), f 2 (n) = 2 log 2 n = O(n 2 ), f 3 (n) = 2 n = O(2 n ), f 4 (n) = 1 = O
More informationWhen we use asymptotic notation within an expression, the asymptotic notation is shorthand for an unspecified function satisfying the relation:
CS 124 Section #1 Big-Oh, the Master Theorem, and MergeSort 1/29/2018 1 Big-Oh Notation 1.1 Definition Big-Oh notation is a way to describe the rate of growth of functions. In CS, we use it to describe
More informationCpt S 223. School of EECS, WSU
Algorithm Analysis 1 Purpose Why bother analyzing code; isn t getting it to work enough? Estimate time and memory in the average case and worst case Identify bottlenecks, i.e., where to reduce time Compare
More informationMethods for solving recurrences
Methods for solving recurrences Analyzing the complexity of mergesort The merge function Consider the following implementation: 1 int merge ( int v1, int n1, int v, int n ) { 3 int r = malloc ( ( n1+n
More informationComparison of functions. Comparison of functions. Proof for reflexivity. Proof for transitivity. Reflexivity:
Comparison of functions Comparison of functions Reading: Cormen et al, Section 3. (for slide 7 and later slides) Transitivity f (n) = (g(n)) and g(n) = (h(n)) imply f (n) = (h(n)) Reflexivity: f (n) =
More informationCSC Design and Analysis of Algorithms. Lecture 1
CSC 8301- Design and Analysis of Algorithms Lecture 1 Introduction Analysis framework and asymptotic notations What is an algorithm? An algorithm is a finite sequence of unambiguous instructions for solving
More information282 Math Preview. Chris Brown. September 8, Why This? 2. 2 Logarithms Basic Identities Basic Consequences...
282 Math Preview Chris Brown September 8, 2005 Contents Why This? 2 2 Logarithms 2 2. Basic Identities.................................... 2 2.2 Basic Consequences.................................. 3 3
More informationWhen we use asymptotic notation within an expression, the asymptotic notation is shorthand for an unspecified function satisfying the relation:
CS 124 Section #1 Big-Oh, the Master Theorem, and MergeSort 1/29/2018 1 Big-Oh Notation 1.1 Definition Big-Oh notation is a way to describe the rate of growth of functions. In CS, we use it to describe
More information1 Substitution method
Recurrence Relations we have discussed asymptotic analysis of algorithms and various properties associated with asymptotic notation. As many algorithms are recursive in nature, it is natural to analyze
More informationAsymptotic Analysis 1
Asymptotic Analysis 1 Last week, we discussed how to present algorithms using pseudocode. For example, we looked at an algorithm for singing the annoying song 99 Bottles of Beer on the Wall for arbitrary
More informationMA008/MIIZ01 Design and Analysis of Algorithms Lecture Notes 2
MA008 p.1/36 MA008/MIIZ01 Design and Analysis of Algorithms Lecture Notes 2 Dr. Markus Hagenbuchner markus@uow.edu.au. MA008 p.2/36 Content of lecture 2 Examples Review data structures Data types vs. data
More informationCOMPUTER ALGORITHMS. Athasit Surarerks.
COMPUTER ALGORITHMS Athasit Surarerks. Introduction EUCLID s GAME Two players move in turn. On each move, a player has to write on the board a positive integer equal to the different from two numbers already
More informationData selection. Lower complexity bound for sorting
Data selection. Lower complexity bound for sorting Lecturer: Georgy Gimel farb COMPSCI 220 Algorithms and Data Structures 1 / 12 1 Data selection: Quickselect 2 Lower complexity bound for sorting 3 The
More informationWritten Homework #1: Analysis of Algorithms
Written Homework #1: Analysis of Algorithms CIS 121 Fall 2016 cis121-16fa-staff@googlegroups.com Due: Thursday, September 15th, 2015 before 10:30am (You must submit your homework online via Canvas. A paper
More information2.2 Asymptotic Order of Growth. definitions and notation (2.2) examples (2.4) properties (2.2)
2.2 Asymptotic Order of Growth definitions and notation (2.2) examples (2.4) properties (2.2) Asymptotic Order of Growth Upper bounds. T(n) is O(f(n)) if there exist constants c > 0 and n 0 0 such that
More informationHomework 1 Submission
Homework Submission Sample Solution; Due Date: Thursday, May 4, :59 pm Directions: Your solutions should be typed and submitted as a single pdf on Gradescope by the due date. L A TEX is preferred but not
More informationData Structures and Algorithms Running time and growth functions January 18, 2018
Data Structures and Algorithms Running time and growth functions January 18, 2018 Measuring Running Time of Algorithms One way to measure the running time of an algorithm is to implement it and then study
More informationCS F-01 Algorithm Analysis 1
CS673-016F-01 Algorithm Analysis 1 01-0: Syllabus Office Hours Course Text Prerequisites Test Dates & Testing Policies Try to combine tests Grading Policies 01-1: How to Succeed Come to class. Pay attention.
More informationCSE332: Data Abstrac0ons Sec%on 2. HyeIn Kim Spring 2014
CSE332: Data Abstrac0ons Sec%on 2 HyeIn Kim Spring 2014 Sec0on Agenda Recurrence Relations Asymptotic Analysis HW1, Project 1 Q&A Project 2 - Introduction - Working in a team - Testing strategies Recurrence
More informationwith the size of the input in the limit, as the size of the misused.
Chapter 3. Growth of Functions Outline Study the asymptotic efficiency of algorithms Give several standard methods for simplifying the asymptotic analysis of algorithms Present several notational conventions
More informationModule 1: Analyzing the Efficiency of Algorithms
Module 1: Analyzing the Efficiency of Algorithms Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Based
More informationCOMP 9024, Class notes, 11s2, Class 1
COMP 90, Class notes, 11s, Class 1 John Plaice Sun Jul 31 1::5 EST 011 In this course, you will need to know a bit of mathematics. We cover in today s lecture the basics. Some of this material is covered
More informationIn-Class Soln 1. CS 361, Lecture 4. Today s Outline. In-Class Soln 2
In-Class Soln 1 Let f(n) be an always positive function and let g(n) = f(n) log n. Show that f(n) = o(g(n)) CS 361, Lecture 4 Jared Saia University of New Mexico For any positive constant c, we want to
More informationAnalysis of Algorithms
October 1, 2015 Analysis of Algorithms CS 141, Fall 2015 1 Analysis of Algorithms: Issues Correctness/Optimality Running time ( time complexity ) Memory requirements ( space complexity ) Power I/O utilization
More informationAnalysis of Algorithms I: Asymptotic Notation, Induction, and MergeSort
Analysis of Algorithms I: Asymptotic Notation, Induction, and MergeSort Xi Chen Columbia University We continue with two more asymptotic notation: o( ) and ω( ). Let f (n) and g(n) are functions that map
More informationAdvanced Analysis of Algorithms - Homework I (Solutions)
Advanced Analysis of Algorithms - Homework I (Solutions) K. Subramani LCSEE, West Virginia University, Morgantown, WV {ksmani@csee.wvu.edu} 1 Problems 1. Given an array A of n integer elements, how would
More informationAlgorithms: Background
Algorithms: Background Amotz Bar-Noy CUNY Amotz Bar-Noy (CUNY) Algorithms: Background 1 / 66 What is a Proof? Definition I: The cogency of evidence that compels acceptance by the mind of a truth or a fact.
More informationReview Asympto&c Bounds
Objec&ves Review: Asympto&c running &mes Classes of running &mes Implemen&ng Gale-Shapley algorithm Office hours: Today, 2:35-2:55, 5-5:50 p.m. Thursday: 1 5 p.m. Faculty Candidate Talk - Today at 4 p.m.
More informationDesign Patterns for Data Structures. Chapter 3. Recursive Algorithms
Chapter 3 Recursive Algorithms Writing recurrences + Writing recurrences To determine the statement execution count is a two-step problem. Write down the recurrence from the recursive code for the algorithm.
More informationChapter 4 Divide-and-Conquer
Chapter 4 Divide-and-Conquer 1 About this lecture (1) Recall the divide-and-conquer paradigm, which we used for merge sort: Divide the problem into a number of subproblems that are smaller instances of
More informationMidterm Exam. CS 3110: Design and Analysis of Algorithms. June 20, Group 1 Group 2 Group 3
Banner ID: Name: Midterm Exam CS 3110: Design and Analysis of Algorithms June 20, 2006 Group 1 Group 2 Group 3 Question 1.1 Question 2.1 Question 3.1 Question 1.2 Question 2.2 Question 3.2 Question 3.3
More informationChapter 2. Recurrence Relations. Divide and Conquer. Divide and Conquer Strategy. Another Example: Merge Sort. Merge Sort Example. Merge Sort Example
Recurrence Relations Chapter 2 Divide and Conquer Equation or an inequality that describes a function by its values on smaller inputs. Recurrence relations arise when we analyze the running time of iterative
More informationThis chapter covers asymptotic analysis of function growth and big-o notation.
Chapter 14 Big-O This chapter covers asymptotic analysis of function growth and big-o notation. 14.1 Running times of programs An important aspect of designing a computer programs is figuring out how well
More informationCOMP 555 Bioalgorithms. Fall Lecture 3: Algorithms and Complexity
COMP 555 Bioalgorithms Fall 2014 Lecture 3: Algorithms and Complexity Study Chapter 2.1-2.8 Topics Algorithms Correctness Complexity Some algorithm design strategies Exhaustive Greedy Recursion Asymptotic
More information3.1 Asymptotic notation
3.1 Asymptotic notation The notations we use to describe the asymptotic running time of an algorithm are defined in terms of functions whose domains are the set of natural numbers N = {0, 1, 2,... Such
More informationMore Asymptotic Analysis Spring 2018 Discussion 8: March 6, 2018
CS 61B More Asymptotic Analysis Spring 2018 Discussion 8: March 6, 2018 Here is a review of some formulas that you will find useful when doing asymptotic analysis. ˆ N i=1 i = 1 + 2 + 3 + 4 + + N = N(N+1)
More informationData Structures and Algorithms
Data Structures and Algorithms CS245-2017S-03 Recursive Function Analysis David Galles Department of Computer Science University of San Francisco 03-0: Algorithm Analysis for (i=1; i
More informationLecture II RECURRENCES
Lecture II Page Lecture II RECURRENCES Recurrences arise naturally in analyzing the complexity of recursive algorithms and in probabilistic analysis. We introduce some basic techniques for solving recurrences.
More informationAlgorithms Design & Analysis. Analysis of Algorithm
Algorithms Design & Analysis Analysis of Algorithm Review Internship Stable Matching Algorithm 2 Outline Time complexity Computation model Asymptotic notions Recurrence Master theorem 3 The problem of
More informationCS/SE 2C03. Sample solutions to the assignment 1.
CS/SE 2C03. Sample solutions to the assignment 1. Total of this assignment is 131pts, but 100% = 111pts. There are 21 bonus points. Each assignment is worth 7%. If you think your solution has been marked
More informationPlease give details of your answer. A direct answer without explanation is not counted.
Please give details of your answer. A direct answer without explanation is not counted. Your answers must be in English. Please carefully read problem statements. During the exam you are not allowed to
More informationCS 341: Algorithms. Douglas R. Stinson. David R. Cheriton School of Computer Science University of Waterloo. January 16, 2019
CS 341: Algorithms Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo January 16, 2019 D.R. Stinson (SCS) CS 341 January 16, 2019 1 / 294 1 Course Information 2 Introduction
More informationLecture 3. Big-O notation, more recurrences!!
Lecture 3 Big-O notation, more recurrences!! Announcements! HW1 is posted! (Due Friday) See Piazza for a list of HW clarifications First recitation section was this morning, there s another tomorrow (same
More informationGrowth of Functions (CLRS 2.3,3)
Growth of Functions (CLRS 2.3,3) 1 Review Last time we discussed running time of algorithms and introduced the RAM model of computation. Best-case running time: the shortest running time for any input
More informationAnalysis of Algorithms - Using Asymptotic Bounds -
Analysis of Algorithms - Using Asymptotic Bounds - Andreas Ermedahl MRTC (Mälardalens Real-Time Research Center) andreas.ermedahl@mdh.se Autumn 004 Rehersal: Asymptotic bounds Gives running time bounds
More informationThe Time Complexity of an Algorithm
CSE 3101Z Design and Analysis of Algorithms The Time Complexity of an Algorithm Specifies how the running time depends on the size of the input. Purpose To estimate how long a program will run. To estimate
More informationReview 1. Andreas Klappenecker
Review 1 Andreas Klappenecker Summary Propositional Logic, Chapter 1 Predicate Logic, Chapter 1 Proofs, Chapter 1 Sets, Chapter 2 Functions, Chapter 2 Sequences and Sums, Chapter 2 Asymptotic Notations,
More informationCIS 121. Analysis of Algorithms & Computational Complexity. Slides based on materials provided by Mary Wootters (Stanford University)
CIS 121 Analysis of Algorithms & Computational Complexity Slides based on materials provided by Mary Wootters (Stanford University) Today Sorting: InsertionSort vs MergeSort Analyzing the correctness of
More informationMassachusetts Institute of Technology Handout J/18.062J: Mathematics for Computer Science May 3, 2000 Professors David Karger and Nancy Lynch
Massachusetts Institute of Technology Handout 48 6.042J/18.062J: Mathematics for Computer Science May 3, 2000 Professors David Karger and Nancy Lynch Quiz 2 Solutions Problem 1 [10 points] Consider n >
More informationSection 11.1 Sequences
Math 152 c Lynch 1 of 8 Section 11.1 Sequences A sequence is a list of numbers written in a definite order: a 1, a 2, a 3,..., a n,... Notation. The sequence {a 1, a 2, a 3,...} can also be written {a
More informationAsymptotic Notation. such that t(n) cf(n) for all n n 0. for some positive real constant c and integer threshold n 0
Asymptotic Notation Asymptotic notation deals with the behaviour of a function in the limit, that is, for sufficiently large values of its parameter. Often, when analysing the run time of an algorithm,
More informationCOMP 382: Reasoning about algorithms
Fall 2014 Unit 4: Basics of complexity analysis Correctness and efficiency So far, we have talked about correctness and termination of algorithms What about efficiency? Running time of an algorithm For
More informationProblem Set 1 Solutions
Introduction to Algorithms September 24, 2004 Massachusetts Institute of Technology 6.046J/18.410J Professors Piotr Indyk and Charles E. Leiserson Handout 7 Problem Set 1 Solutions Exercise 1-1. Do Exercise
More informationThe Time Complexity of an Algorithm
Analysis of Algorithms The Time Complexity of an Algorithm Specifies how the running time depends on the size of the input. Purpose To estimate how long a program will run. To estimate the largest input
More informationData Structures and Algorithms CMPSC 465
Data Structures and Algorithms CMPSC 465 LECTURE 9 Solving recurrences Substitution method Adam Smith S. Raskhodnikova and A. Smith; based on slides by E. Demaine and C. Leiserson Review question Draw
More informationFoundations II: Data Structures and Algorithms
Foundations II: Data Structures and Algorithms Instructor : Yusu Wang Topic 1 : Introduction and Asymptotic notation Course Information Course webpage http://www.cse.ohio-state.edu/~yusu/courses/2331 Office
More informationData Structures and Algorithms CSE 465
Data Structures and Algorithms CSE 465 LECTURE 3 Asymptotic Notation O-, Ω-, Θ-, o-, ω-notation Divide and Conquer Merge Sort Binary Search Sofya Raskhodnikova and Adam Smith /5/0 Review Questions If input
More informationBig O 2/14/13. Administrative. Does it terminate? David Kauchak cs302 Spring 2013
/4/3 Administrative Big O David Kauchak cs3 Spring 3 l Assignment : how d it go? l Assignment : out soon l CLRS code? l Videos Insertion-sort Insertion-sort Does it terminate? /4/3 Insertion-sort Loop
More informationPractical Session #3 - Recursions
Practical Session #3 - Recursions Substitution method Guess the form of the solution and prove it by induction Iteration Method Convert the recurrence into a summation and solve it Tightly bound a recurrence
More informationLecture 2. Fundamentals of the Analysis of Algorithm Efficiency
Lecture 2 Fundamentals of the Analysis of Algorithm Efficiency 1 Lecture Contents 1. Analysis Framework 2. Asymptotic Notations and Basic Efficiency Classes 3. Mathematical Analysis of Nonrecursive Algorithms
More informationHomework 3. (33-40) The graph of an exponential function is given. Match each graph to one of the following functions.
Homework Section 4. (-40) The graph of an exponential function is given. Match each graph to one of the following functions. (a)y = x (b)y = x (c)y = x (d)y = x (e)y = x (f)y = x (g)y = x (h)y = x (46,
More informationComputational Complexity - Pseudocode and Recursions
Computational Complexity - Pseudocode and Recursions Nicholas Mainardi 1 Dipartimento di Elettronica e Informazione Politecnico di Milano nicholas.mainardi@polimi.it June 6, 2018 1 Partly Based on Alessandro
More informationAnalysis of Algorithms
September 29, 2017 Analysis of Algorithms CS 141, Fall 2017 1 Analysis of Algorithms: Issues Correctness/Optimality Running time ( time complexity ) Memory requirements ( space complexity ) Power I/O utilization
More informationState-dependent Limited Processor Sharing - Approximations and Optimal Control
State-dependent Limited Processor Sharing - Approximations and Optimal Control Varun Gupta University of Chicago Joint work with: Jiheng Zhang (HKUST) State-dependent Limited Processor Sharing Processor
More informationMath 210 Exam 2 - Practice Problems. 1. For each of the following, determine whether the statement is True or False.
Math 20 Exam 2 - Practice Problems. For each of the following, determine whether the statement is True or False. (a) {a,b,c,d} TRE (b) {a,b,c,d} FLSE (c) {a,b, } TRE (d) {a,b, } TRE (e) {a,b} {a,b} FLSE
More informationPropositional Logic, Predicates, and Equivalence
Chapter 1 Propositional Logic, Predicates, and Equivalence A statement or a proposition is a sentence that is true (T) or false (F) but not both. The symbol denotes not, denotes and, and denotes or. If
More informationCOMP Analysis of Algorithms & Data Structures
COMP 3170 - Analysis of Algorithms & Data Structures Shahin Kamali Lecture 4 - Jan. 10, 2018 CLRS 1.1, 1.2, 2.2, 3.1, 4.3, 4.5 University of Manitoba Picture is from the cover of the textbook CLRS. 1 /
More informationCS 577 Introduction to Algorithms: Strassen s Algorithm and the Master Theorem
CS 577 Introduction to Algorithms: Jin-Yi Cai University of Wisconsin Madison In the last class, we described InsertionSort and showed that its worst-case running time is Θ(n 2 ). Check Figure 2.2 for
More informationCh01. Analysis of Algorithms
Ch01. Analysis of Algorithms Input Algorithm Output Acknowledgement: Parts of slides in this presentation come from the materials accompanying the textbook Algorithm Design and Applications, by M. T. Goodrich
More informationOrder Notation and the Mathematics for Analysis of Algorithms
Elementary Data Structures and Algorithms Order Notation and the Mathematics for Analysis of Algorithms Name: Email: Code: 19704 Always choose the best or most general answer, unless otherwise instructed.
More informationData Structures and Algorithms Chapter 3
Data Structures and Algorithms Chapter 3 1. Divide and conquer 2. Merge sort, repeated substitutions 3. Tiling 4. Recurrences Recurrences Running times of algorithms with recursive calls can be described
More informationChapter 4. Recurrences
Chapter 4. Recurrences Outline Offers three methods for solving recurrences, that is for obtaining asymptotic bounds on the solution In the substitution method, we guess a bound and then use mathematical
More informationDivide and Conquer. Andreas Klappenecker
Divide and Conquer Andreas Klappenecker The Divide and Conquer Paradigm The divide and conquer paradigm is important general technique for designing algorithms. In general, it follows the steps: - divide
More informationTTIC / CMSC Algorithms. Lectures 1 and 2 + background material
TTIC 31010 / CMSC 37000 - Algorithms Lectures 1 and 2 + background material Avrim Blum Toyota Technological Institute at Chicago January 7, 2019 ii Contents 1 Introduction to Algorithms, and the Divide
More informationDivide-and-Conquer. Reading: CLRS Sections 2.3, 4.1, 4.2, 4.3, 28.2, CSE 6331 Algorithms Steve Lai
Divide-and-Conquer Reading: CLRS Sections 2.3, 4.1, 4.2, 4.3, 28.2, 33.4. CSE 6331 Algorithms Steve Lai Divide and Conquer Given an instance x of a prolem, the method works as follows: divide-and-conquer
More informationMath 3012 Applied Combinatorics Lecture 5
September 1, 2015 Math 3012 Applied Combinatorics Lecture 5 William T. Trotter trotter@math.gatech.edu Test 1 and Homework Due Date Reminder Test 1, Thursday September 17, 2015. Taken here in MRDC 2404.
More informationCS 350 Midterm Algorithms and Complexity
It is recommended that you read through the exam before you begin. Answer all questions in the space provided. Name: Answer whether the following statements are true or false and briefly explain your answer
More informationCOMP Analysis of Algorithms & Data Structures
COMP 3170 - Analysis of Algorithms & Data Structures Shahin Kamali Lecture 4 - Jan. 14, 2019 CLRS 1.1, 1.2, 2.2, 3.1, 4.3, 4.5 University of Manitoba Picture is from the cover of the textbook CLRS. COMP
More informationRunning Time Evaluation
Running Time Evaluation Quadratic Vs. Linear Time Lecturer: Georgy Gimel farb COMPSCI 220 Algorithms and Data Structures 1 / 19 1 Running time 2 Examples 3 Big-Oh, Big-Omega, and Big-Theta Tools 4 Time
More information