Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Odds and Ends.

a. Recall that heaps are implemented using arrays. In particular, because heaps make use of complete binary trees, we can label the nodes in a "natural way" using the numbers 1, 2, . . . , n where n is the number of items stored in the heap. If T is the said array, then T[i] contains the item associated with the ith node.

For now, let us assume that T[i].key and T[i].element are respectively the key and element associated with T[i]. We also discussed how to build heaps in a bottom-up fashion.

Assume T[1 · · · n] contains the n items. Below is the pseudocode I presented in class. BuildHeap(v) if v is an external node return else BuildHeap(v.lef tchild) if v.rightchild exists BuildHeap(v.rightchild) endif if v.key < v.lef tchild.key or v.key < v.rightchild.key DownHeapBubble(v) endif endif If we run BuildHeap(T.root) then T[1 · · · n] should be a heap at the end of the algorithm.

a1. Rewrite the above pseudocode so that it takes into account that T is actually an array. That is, instead of v, v.lef tchild and v.rightchild, the pseudocode should refer to the appropriate indices in T. Furthermore, write a procedure for DownHeapBubblev that also takes into account that T is an array.

a2. Demonstrate how the pseudocode you wrote in part (a) for BuildHeap(T.root) runs on the array T[1 · · · 9] whose keys are [22, 15, 36, 44, 10, 3, 9, 13, 29]. That is, show what happens to the array as you make each call to BuildHeap. 1

b. We said that a binary search tree is a binary tree that stores (key, element) pairs at its nodes. It satisfies the property that for every node v, v.key is greater than or equal to every key stored at v's left subtree and v.key is greater than or equal to every key stored at v's right subtree. I noted that this property cannot be weakened to for every node v, v.key = v.lef tchild.key and v.key = v.rightchild.key.

Convince yourself that what I said is indeed true. That is, create a binary tree that stores some (key, element) pairs and satisfies the weakened version of the property but is not a binary search tree.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93072138

Have any Question?


Related Questions in Computer Engineering

1 select one of the topics listed below and discuss

1. Select one of the topics listed below and discuss it. Describe an application that you have to solve by using at least 2 Excel functions. It can be Math, Statistics, Engineering, Financial, etc. Explain what Excel fun ...

Reading the biographybook where the body meets memory by

Reading the Biography Book : "Where the Body Meets Memory" by David Mura Questions: When David Mura was growing up, he tried very hard to reject his Japanese heritage. Find examples in Chapter 2 "All American Boy," and t ...

A sample of 1000 us households is taken and the average

A sample of 1,000 U.S. households is taken and the average amount of newspaper garbage or recycling is found to be 27.8 pounds. Assuming the standard deviation of newspaper for garbage or recycling is 2 pounds. Estimate, ...

A company that supplies batteries for watches guarantees

A company that supplies batteries for watches guarantees that 95% of the batteries it ships will be free from defects. You test a sample of 50 batteries you received. You find that fewer than 10 have defects. Does this l ...

For the rosenberg land development problem problem 2 in

For the Rosenberg Land Development problem (Problem 2 in Chapter 14), suppose that the construction costs are uncertain. Specifically, assume that the distribution ofconstruction costs is normally distributed, with the m ...

One of the authors received a credit card bill for 2988 but

One of the authors received a credit card bill for 2,988, but it included a charge of 1,834 that was not valid. Find the values of the absolute and relative errors the absolute value is 1,834 what is the relative errors?

Question how can the security vulnerabilities common with

Question : How can the security vulnerabilities common with wireless networking be handled to mitigate the risks? The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the A ...

Systems analysis project personal trainer inc owns and

Systems analysis project Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new "superce ...

Question suppose you arc a board game maker and you want to

Question : Suppose you arc a board game maker, and you want to give players a higher probability of rolling larger numbers. Originally you had them roll three six-sided dice and add their results. The new approach will h ...

What are the typical types of risk faced by a firm explain

What are the typical types of risk faced by a firm? Explain each type of risk in details.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As