Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question 1. Algorithm Design by Kleinberg and Tardos.

In Exercise 5 of Chapter 8, we claimed that the Hitting Set Problem was NP-complete. To recap the definitions, consider a set A = {a 1 , . . . , a n } and a collection B 1 , B 2 , . . . , B m of subsets of A. We say that a set H ⊆ A is a hitting set for the collection B1, B2 , . . . , Bm if H contains at least one element from each B i -that is, if H ∩ B i is not empty for each i. (So H "hits" all the sets B i .)

Now suppose we are given an instance of this problem, and we'd like to determine whether there is a hitting set for the collection of size at most k. Furthermore suppose that each set B i has at most c elements, for a constant c. Give an algorithm that solves this problem with a running time of the form O(f (c, k) • p(n, m)), where p(•) is a polynomial function, and f (•) is an arbitrary function that depends only on c and k, not on n or m.

Question 2. (Algorithm Design by Kleinberg and Tardos.)

The Minimum-Cost Dominating Set Problem is specified by an undirected graph G = (V , E) and costs c(v) on the nodes v ∈ V. A subset S ⊂ V is said to be a dominating set if all nodes u ∈ V -S have an edge (u, v) to a node v in S. (Note the difference between dominating sets and vertex covers: in a dominating set, it is fine to have an edge (u, v) with neither u nor v in the set S as long as both u and v have neighbors in S.)

(a) Give a polynomial-time algorithm for the Dominating Set Problem for the special case in which G is a tree.

(b) Give a polynomial-time algorithm for the Dominating Set Problem for the special case in which G has tree-width 2, and we are also given a tree decomposition of G with width 2.

Hints:-

Hint:
1. Problem 1 - refers to the example in 10.1 Small vertex cover set problem. Example: A={a, b, c, d, e, f, g} B1={a,b}, B2=(a, c, d, e}, B3=(c, f, g} H1={a, c} is a hitting set for B1, B2 and B3.
H2={b, c, f} and H3={a,b, c, d, g} are also hitting sets.

The problem is to identify if there is a hitting set of size at most k. In this example, the answer is yes for k=2, and the answer is no for k=1.

2. For Problem 5, refers to Section 10.2, the Maximum-Weight Independent Set Problem on a Tree. Noted the difference between Dominate Set and Vertex Cover Set. Hence, for a no-leaf node u, if u is in, its children can be either in or out; if u is out, then one of the two following cases must be true: a. u's parent node is in ; b. at least one of u's children nodes is in.

Requirements:-

- Problem A: Create an application scenario where the problem can be formulated as Maximum- Weight Independent Set Problem on a Tree. Use a small problem instance of this application problem as input to illustrate how th algorithm described in Section 10.2 works and show the solution.

Requirement

When present an algorithm:

1. First describe the overall idea of the algorithm using English language.

2. Then present the algorithm details using pseudo code, be clear of the meaning of each variable, with comments on important steps to explain its purpose.

3. Must walk through the algorithm step by step with a small problem instance to show how the algorithm works. (Required, unless you have implemented the algorithm and show the output instead).

4. Analyze time complexity of algorithm and present results in big-O notation.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92041542
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Assignment 2 windows 8 upgradeby the due date assigned

Assignment 2: Windows 8 Upgrade By the due date assigned, submit your assignment to the Submissions Area. Scenario: You are a consultant for a company that is using Windows 7 as their operating system and are considering ...

Question 1conduct research to determine three types of

Question: 1. Conduct research to determine three types of computer crime. Please provide a detailed description for all crimes, and share an example of where an organization was impacted by each of the types. 2. Elaborat ...

Assessment - managing services and securitytask - in this

Assessment - Managing Services and Security Task - In This Assignment your job is to create two Virtual machines each running a different but the latest distribution of Linux e.g. Ubuntu Server and CentOS. Each of these ...

Sorted golf scores - need flowchartdesign a program that

Sorted Golf Scores - need flowchart Design a program that asks the user to enter 10 golf scores. The scores should be stored in an Integer array. Sort the array in ascending order and display its contents. Looking for "" ...

Explain how the following industries should adapt their

Explain how the following industries should adapt their businesses to the ever expanding use of social networks and mobile computing (smart phones, tablet computers, etc.): 1) Media and Entertainment, 2) Department store ...

Question please read this instruction and section 5 and 6

Question: Please read this instruction, and section 5 and 6 in particular, CAREFULLY as it affects all future programming assignments. 1. Setup Android Studio Development Environment 1.1 Download necessary packages using ...

Question develop a taxonomy of dsia document a taxonomy is

Question: Develop a "taxonomy" of DS/IA document. A taxonomy is a way of organizing something on a "group within group" basis. (Remember how the biological taxonomy is structured.) Initially, define data security and inf ...

Describe how to discover cookies on web browsers what is a

Describe how to discover cookies on web browsers. what is a reverse DNS lookup and can it be used when attacking the network.

Take screenshots of functions running in clisplet x1 x2 xn

Take screenshots of functions running in cLISP, Let x1, x2, ...xN be a set of input features. A linear function that represent those features, will have a following form: Fw(x1, x2, .. xn)= w0 + w1 * x1 + w2 * x2 +... + ...

What are the minimum numbers of keys and pointers in btree

What are the minimum numbers of keys and pointers in Btree (i) interior nodes and (ii) leaves, when: a) n = 10; i.e., a block holds 10 keys and 11 pointeis. b) n = 11; i.e., a block holds 11 keys and 12 pointers.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As