Algorithms Chapter 3 Growth of Functions
|
|
- Shannon Hopkins
- 5 years ago
- Views:
Transcription
1 Algorithms Chapter 3 Growth of Fuctios Istructor: Chig Chi Li 林清池助理教授 chigchi.li@gmail.com Departmet of Computer Sciece ad Egieerig Natioal Taiwa Ocea Uiversity
2 Outlie Asymptotic otatio Stadard otatios ad commo fuctios 2
3 The purpose of this chapter 1/3 The order of growth of the ruig time of a algorithm gives us some iformatio about: the algorithm s efficiecy the relative performace of alterative algorithms The merge sort, with its Θ( lg ) worst case ruig time, beats isertio sort, whose worst case ruig time is Θ( 2 ). For large eough iputs, the followig are domiated by the effects of the iput size itself. multiplicative costats lower order terms of a exact ruig time 3
4 The purpose of this chapter 2/3 Whe the iput size becomes large eough, we are studyig the asymptotic efficiecy of algorithms. That is, we are cocered with how the ruig time of a algorithm icreases with the size of the iput i the limit, as the size of the iput icreases without boud. Usually, a algorithm that is asymptotically more efficiet will be the best choice for all but very small iputs. 4
5 The purpose of this chapter 3/3 We will study how to measure ad aalyze a algorithm s efficiecy for large iputs. The ext sectio begis by defiig asymptotic otatios, Θ otatio O otatio Ω otatio The, we review the commoly used fuctios i the aalysis of algorithms. 5
6 Θ otatio For a give fuctio g(), we deote by Θ(g()) the set of fuctios Θ(g()) = { f(): there exist positive costats c 1, c 2, ad 0 such that 0 c 1 g() f () c 2 g() for all 0 }. For 0, the fuctio f() is equal to g() to withi a costat factor. Here, g() is a asymptotically tight boud for f(). Because Θ(g()) is a set, we could write f() Θ(g()). Usually, we write f() = Θ(g()). 6
7 A example To show that 2 /2 3 = Θ( 2 ), we must determie positive costats c 1, c 2, ad 0 such that Dividig by 2 yields c /2 3 c 2 2 for all 0. c 1 1/2 3/ c 2. c 1 1/2 3/ holds for 7byc 1 1/14 1/2 3/ c 2 holds for 1byc 2 1/2 Thus, choosig c 1 = 1/14, c 2 =1/2, ad 0 =7, we ca verify that 2 /2 3 = Θ( 2 ).
8 Aother example We show that 6 3 Θ( 2 ) by cotradictio. Suppose c 2 ad 0 exist such that 6 3 c 2 2 for all 0. The c 2 /6, a cotradictio. Sice c 2 is costat, it caot possibly hold for arbitrary large,
9 Summary The lower order terms ca be igored because they are isigificat for large. The coefficiet of the highest order term ca likewise be igored sice it oly chages c 1 ad c 2 by a costat factor equal to the coefficiet. I geeral, for ay polyomial p() = Σ i=0~d a i i, where a i are costats ad a d > 0, we have p() = Θ( d ). For example, f() = a 2 + b + c, where a, b, ad c are costats ad a > 0. The, we have f() = Θ( 2 ).
10 O otatio For a give fuctio g(), we deote by O(g()) the set of fuctios O(g()) = { f(): there exist positive costats c ad 0 such that 0 f () cg() for all 0 }. We write f() = O(g()) implies f()is a member of the set O(g()). Note that f() = Θ(g()) implies f() = O(g()). ay proof showig that f() = Θ(g()) also shows that f() = O(g()). Θ(g()) O(g()).
11 The meaig of O otatio 1/2 The Θ otatio asymptotically bouds a fuctio from above ad below. Whe we have oly a asymptotic upper boud, we use O otatio. Hece, Θ otatio is a stroger otatio tha O otatio.
12 The meaig of O otatio 2/2 Ay liear fuctio a + b is i O( 2 ), which is easily verified by takig c = a+ b ad 0 = 1. a+ b (a+ b ) 2 for 1 f() = O(g()) merely claims that g() is a asymptotic upper boud o f() does ot claim about how tight a upper boud it is I practical, O otatio is used to describe the worst case ruig time of a algorithm. a algorithm is O(g()) meas that the ruig time is at most costat times g(), for sufficietly large o matter what particular iput of size is chose for each value of
13 Ω otatio For a give fuctio g(), we deote by Ω(g()) the set of fuctios Ω(g()) = { f (): there exist positive costats c ad 0 such that 0 cg() f () for all 0 }. We write f() = Ω(g()) implies f()is a member of the set Ω(g()). Ω otatio provides asymptotic lower boud.
14 The relatioship betwee Θ, O, ad Ω Theorem 3.1 For ay two fuctios f() ad g(), we have f() = Θ(g()) if ad oly if f() = O(g()) ad f() = Ω(g()). For example: 2 /2 3 = Θ( 2 ) 2 /2 3 = O( 2 ) ad 2 /2 3 = Ω( 2 ) 2 /2 3 = O( 2 ) ad 2 /2 3 = Ω( 2 ) 2 /2 3 = Θ( 2 )
15 The meaig of Ω otatio The Ω otatio is used to boud the best case ruig time of a algorithm. a algorithm is Ω(g()) meas that the ruig time is at least costat times g(), for sufficietly large o matter what particular iput of size is chose for each value of
16 Asymptotic otatio i equatios ad iequalities 1/2 O the right had side of a equatio (or iequality) the equal sig meas set membership = O( 2 ) meas that O( 2 ) I a formula it is iterpreted as some aoymous fuctio that we do ot care to ame =2 2 +Θ() meas that =2 2 +f(), where f () Θ() O the left had side of a equatio 16 No matter how the aoymous fuctios are chose o the left of the equal sig, there is a way to choose the aoymous fuctios o the right of the equal sig to make the equatio valid 2 2 +Θ()=Θ( 2 ) meas that for ay fuctio f() Θ(), there is some fuctio g() Θ( 2 ) such that 2 2 +f ()=g() for all
17 Asymptotic otatio i equatios ad iequalities 2/2 A umber of such relatioships ca be chaied together, as i =2 2 +Θ() =Θ( 2 ) The first equatio says that there is some fuctio f() Θ() such that =2 2 +f() for all. The secod equatio says that for ay fuctio g() Θ(), there is some fuctio h() Θ( 2 ) such that 2 2 +g()=h() for all. Note that the iterpretatio implies )=Θ( 2 ), which is what the chaiig of equatios ituitively gives us. 17
18 o otatio For a give fuctio g(), we deote by o(g()) the set of fuctios o(g()) = {f(): for ay positive costat c>0, there exists a costat 0 >0 such that 0 f()<cg() for all 0 }. We use o otatio to deote a upper boud that is ot asymptotically tight. For example, 2=o( 2 ), but 2 2 o( 2 ). Ituitively, the fuctio f() becomes isigificat relative to g() as approaches ifiity; that is, lim f( ) = 0 g ( ) 18
19 ω otatio For a give fuctio g(), we deote by ω(g()) the set of fuctios ω(g())={f(): for ay positive costat c>0, there exists a costat 0 >0 such that 0 cg()<f() for all 0 }. We use ω otatio to deote a lower boud that is ot asymptotically tight. For example, 2 /2=ω(), but 2 /2 ω( 2 ). The relatio f()=ω(g()) implies that lim f( ) = g ( ) if the limit exists. 19
20 Compariso of fuctios 1/4 Trasitivity: f() = Θ(g()) ad g()= Θ(h()) imply f() = Θ(h()), f() = O(g()) ad g()= O(h()) imply f() = O(h()), f() = Ω(g())ad g()= Ω(h()) imply f() = Ω(h()), f() = o(g()) ad g()= o(h()) imply f() = o(h()), f() = ω(g()) ad g()= ω(h()) imply f() = ω(h()). 20
21 Compariso of fuctios 2/4 Reflexivity: f() = Θ(f()), f() = O(f()), f() = Ω(f()). Symmetry: f() = Θ(g()) if a oly if g() = Θ(f()). Traspose symmetry: f() = O(g()) if ad oly if g() = Ω(f()), f() = o(g()) if ad oly if g() = ω(f()). 21
22 Compariso of fuctios 3/4 Aalogy betwee the asymptotic compariso ad the real umber compariso: f() = Θ(g()) a = b f() = O(g()) a b f() = Ω(g()) a b f() = o(g()) a < b f() = ω(g()) a > b 22
23 Compariso of fuctios 4/4 Trichotomy property of real umbers does ot carry over to asymptotic otatio: Trichotomy: For ay two real umbers a ad b, exactly oe of the followig must hold: a < b, a = b, or a > b. Not all fuctios are asymptotically comparable. For two fuctios f() ad g(), it may be the case that either f()=o(g()) or f()=ω(g()). For example, the fuctio ad 1+si caot be compared, sice the value of 1+si oscillates betwee 0 ad 2. 23
24 Outlie Asymptotic otatio Stadard otatios ad commo fuctios 24
25 Mootoicity A fuctio f() is mootoically icreasig if m implies f(m) f(). A fuctio f() is mootoically decreasig if m implies f(m) f(). A fuctio f() is strictly icreasig if m< implies f(m)<f(). A fuctio f() is strictly decreasig if m> implies f(m)>f(). 25
26 Floors ad ceiligs For ay real umber x, we deote the greatest iteger less tha or equal to x by x ad the least iteger greater tha or equal to x by x. For all real x, For ay iteger, x-1< x x x <x+1 /2 + /2 = For ay real umber 0 ad itegers a, b>0 /a /b = /ab, ad /a /b = /ab a/b (a+(b-1))/b, ad a/b (a-(b-1))/b The floor ad ceilig fuctios are mootoically icreasig. 26
27 Modular arithmetic For ay iteger a ad ay positive iteger, the value a mod is the remaider (or residue) of the quotiet a/: a mod =a- a/ If (a mod )=(b mod ), we write a b (mod ) ad say that a is equivalet to b, modulo. If a b (mod ) If a ad b have the same remaider whe divided by If ad oly if is a divisor of b-a We write a b(mod ) if a is ot equivalet to b, modulo. 27
28 Polyomials A polyomial i of degree d is a fuctio P() = a d d + a d-1 d a a 1 + a 0 d is a oegative iteger a d,, a 0 are costats called the coefficiets of the polyomial a d 0 A asymptotically positive fuctio is oe that is positive for all sufficietly large. A polyomial is asymptotically positive if ad oly if a d > 0. For ay real costat a 0 (respectively, a 0), the fuctio a is mootoically icreasig (respectively, decreasig). A fuctio f() is polyomially bouded if f()=o( k ) for some costat k. 28
29 Expoetials 1/2 For all real a>0, m, ad, we have the followig idetities: a 0 = 1, a 1 = a, a 1 = 1/a (a m ) = (a ) m = a m a m a = a m+ 0 0 = 1 (for coveiet) For all real costats a ad b such that a > 1, lim b = 0, from a which we coclude that b = o(a ). Thus, ay expoetial fuctio with a base strictly greater tha 1 grows faster tha ay polyomial fuctio. 29
30 Expoetials 2/2 The atural logarithm fuctio for all real x, e e = x 2 3 x x = 1+ x + + 2! 3! + K = i= For all real x, we have e x 1+x equality holds oly whe x = 0 Whe x 1, we have 1+x e x 1+x+x 2 Whe x 0, we have e x =1+x+Θ(x 2 ) 0 i x i! For all x, lim 1 x + = e x 30
31 Logarithms 1/4 We shall use the followig otatios: lg = log 2 (biary logarithm) l = log e (atural logarithm) lg k = (lg) k lglg = lg(lg) (expoetiatio) (compositio) Note that lg+k meas (lg)+k, ot lg(+k). If we hold b > 1 costat, the for > 0, the fuctio log b is strictly icreasig. 31
32 Logarithms 2/4 For all real a, b, c > 0, ad, if the logarithm bases are ot 1, the, we have logc a log b a = logb logb a = log b c a log b c = c log b a a = b log b a 1 log b = logb a logb a = a 1 log a b c ( ab) = log a log b log + c c 32
33 Logarithms 3/4 If x < 1, the We also have the followig iequalities for x > 1: x 2 x 3 x 4 ( + x) = x + + L l 1 x l 1+ x the equality holds oly for x = 0 2 ( 1+ x) x 3 4 x
34 Logarithms 4/4 f() is called polylogarithmically bouded if f() = O(lg k ) for some costat k. By substitutig lg for ad 2 a for a i So, for ay costat a > 0 b lg a (2 ) lim = lg lim = a lg b = o( a ) b lg 0 lim b = 0 ay positive fuctio grows faster tha ay polylogarithmic fuctio a 34
35 Factorials Stirlig s approximatio: e is the base of the atural logarithm give a tighter upper boud, ad a tighter low boud Oe ca prove For all 1, we have 35 + = e 1 1 2! θ π > = = 0. if 1)! ( 0, if 1! ) (2! ) lg θ(!) lg( ) (! o ω = = = e e where, 2! < < + = α π α
36 Fuctioal iteratio Let f() be a fuctio over the reals. The, for oegative iteger i, we recursively defie f f ( f ( i) ( ) = ( i 1 ) ( )) For example, if f() = 2, the f (i) () = 2 i if if i = > 0, 0. 36
37 The iterated logarithm fuctio Let lg (i) be defied as above, with f() = lg Note that lg i = (lg) i lg (i) Because the logarithm of a opositive umber is udefied, lg (i) is defied oly if lg (i 1) >0 The iterated logarithm fuctio, is defied as lg* = mi{i 0: lg (i) 1} lg*2 = 1 lg*4 = 2 lg*16 = 3 lg*65536 = 4 lg* = 5 a very slowly growig fuctio 37
38 Fiboacci umbers 1/2 The Fiboacci umbers are defied by the recurrece relatio F F F 0 1 i = 0, = 1, = F i 1 + F i 2 for i 2. The Fiboacci umbers are : 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, Fiboacci umbers are related to the golde ratio φ ad to its cojugate φˆ. Oe ca prove that φ i φˆi 1+ 5 F i =, where φ = = ad ˆ φ = =
39 Fiboacci umbers 2/2 i φ 1 1 Sice ˆ φ < 1, we have < <. So that the ith Fiboacci umber roud to the earest iteger. ˆ F i = φ i ˆi φ 5 is equal to i φ 5 Thus, Fiboacci umber grow expoetially. 39
CS473-Algorithms I. Lecture 2. Asymptotic Notation. CS 473 Lecture 2 1
CS473-Algorithms I Lecture Asymptotic Notatio CS 473 Lecture 1 O-otatio (upper bouds) f() = O(g()) if positive costats c, 0 such that e.g., = O( 3 ) 0 f() cg(), 0 c 3 c c = 1 & 0 = or c = & 0 = 1 Asymptotic
More informationBig-O Analysis. Asymptotics
Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses
More informationBig-O Analysis. Asymptotics
Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses
More informationCIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)
CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig
More informationAnalysis of Algorithms
Aalysis of Algorithms Ruig Time of a algorithm Ruig Time Upper Bouds Lower Bouds Examples Mathematical facts Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite
More informationOutline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis
Outlie ad Readig Aalysis of Algorithms Iput Algorithm Output Ruig time ( 3.) Pseudo-code ( 3.2) Coutig primitive operatios ( 3.3-3.) Asymptotic otatio ( 3.6) Asymptotic aalysis ( 3.7) Case study Aalysis
More informationAnalysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis
Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems
More informationPseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance
Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured
More informationWhat are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs
What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure
More informationData Structures and Algorithms. Analysis of Algorithms
Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output
More informationHomework 1 Solutions MA 522 Fall 2017
Homework 1 Solutios MA 5 Fall 017 1. Cosider the searchig problem: Iput A sequece of umbers A = [a 1,..., a ] ad a value v. Output A idex i such that v = A[i] or the special value NIL if v does ot appear
More informationPractical Session 2 Constants Don t Matter!!!
Practical Sessio 2 Costats Do t Matter!!! Algorithm Aalysis f() = O(g()) Big O f() = Ω(g()) Big Omega There exist c > 0 ad 0 > 0 such that: 0 f() cg() for each 0 There exist c > 0 ad 0 > 0 such that: 0
More informationLecture 5. Counting Sort / Radix Sort
Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018
More informationRunning Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments
Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.
More informationAnalysis of Algorithms
Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The
More informationLecture 1: Introduction and Strassen s Algorithm
5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access
More informationLecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming
Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis
More informationA graphical view of big-o notation. c*g(n) f(n) f(n) = O(g(n))
ca see that time required to search/sort grows with size of We How do space/time eeds of program grow with iput size? iput. time: cout umber of operatios as fuctio of iput Executio size operatio Assigmet:
More informationAlgorithm. Counting Sort Analysis of Algorithms
Algorithm Coutig Sort Aalysis of Algorithms Assumptios: records Coutig sort Each record cotais keys ad data All keys are i the rage of 1 to k Space The usorted list is stored i A, the sorted list will
More informationRunning Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments
Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The
More informationAlgorithm Design Techniques. Divide and conquer Problem
Algorithm Desig Techiques Divide ad coquer Problem Divide ad Coquer Algorithms Divide ad Coquer algorithm desig works o the priciple of dividig the give problem ito smaller sub problems which are similar
More informationCSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS)
CSC165H1, Witer 018 Learig Objectives By the ed of this worksheet, you will: Aalyse the ruig time of fuctios cotaiig ested loops. 1. Nested loop variatios. Each of the followig fuctios takes as iput a
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms
More informationPolynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0
Polyomial Fuctios ad Models 1 Learig Objectives 1. Idetify polyomial fuctios ad their degree 2. Graph polyomial fuctios usig trasformatios 3. Idetify the real zeros of a polyomial fuctio ad their multiplicity
More informationLecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein
068.670 Subliear Time Algorithms November, 0 Lecture 6 Lecturer: Roitt Rubifeld Scribes: Che Ziv, Eliav Buchik, Ophir Arie, Joatha Gradstei Lesso overview. Usig the oracle reductio framework for approximatig
More informationCSE 417: Algorithms and Computational Complexity
Time CSE 47: Algorithms ad Computatioal Readig assigmet Read Chapter of The ALGORITHM Desig Maual Aalysis & Sortig Autum 00 Paul Beame aalysis Problem size Worst-case complexity: max # steps algorithm
More informationHow do we evaluate algorithms?
F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:
More informationA Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions
Proceedigs of the 10th WSEAS Iteratioal Coferece o APPLIED MATHEMATICS, Dallas, Texas, USA, November 1-3, 2006 316 A Geeralized Set Theoretic Approach for Time ad Space Complexity Aalysis of Algorithms
More information2. ALGORITHM ANALYSIS
2. ALGORITHM ANALYSIS computatioal tractability survey of commo ruig times 2. ALGORITHM ANALYSIS computatioal tractability survey of commo ruig times Lecture slides by Kevi Waye Copyright 2005 Pearso-Addiso
More informationImproved Random Graph Isomorphism
Improved Radom Graph Isomorphism Tomek Czajka Gopal Paduraga Abstract Caoical labelig of a graph cosists of assigig a uique label to each vertex such that the labels are ivariat uder isomorphism. Such
More informationRecursive Estimation
Recursive Estimatio Raffaello D Adrea Sprig 2 Problem Set: Probability Review Last updated: February 28, 2 Notes: Notatio: Uless otherwise oted, x, y, ad z deote radom variables, f x (x) (or the short
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19
CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.
More informationcondition w i B i S maximum u i
ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility
More informationSorting in Linear Time. Data Structures and Algorithms Andrei Bulatov
Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio
More informationAnalysis of Algorithms
Presetatio for use with the textbook, Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Aalysis of Algorithms Iput 2015 Goodrich ad Tamassia Algorithm Aalysis of Algorithms
More informationMath Section 2.2 Polynomial Functions
Math 1330 - Sectio. Polyomial Fuctios Our objectives i workig with polyomial fuctios will be, first, to gather iformatio about the graph of the fuctio ad, secod, to use that iformatio to geerate a reasoably
More information9 x and g(x) = 4. x. Find (x) 3.6. I. Combining Functions. A. From Equations. Example: Let f(x) = and its domain. Example: Let f(x) = and g(x) = x x 4
1 3.6 I. Combiig Fuctios A. From Equatios Example: Let f(x) = 9 x ad g(x) = 4 f x. Fid (x) g ad its domai. 4 Example: Let f(x) = ad g(x) = x x 4. Fid (f-g)(x) B. From Graphs: Graphical Additio. Example:
More informationBezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only
Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of
More informationLecture 2: Spectra of Graphs
Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad
More information1.2 Binomial Coefficients and Subsets
1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =
More informationIntro to Scientific Computing: Solutions
Itro to Scietific Computig: Solutios Dr. David M. Goulet. How may steps does it take to separate 3 objects ito groups of 4? We start with 5 objects ad apply 3 steps of the algorithm to reduce the pile
More informationSolution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions:
CS 604 Data Structures Midterm Sprig, 00 VIRG INIA POLYTECHNIC INSTITUTE AND STATE U T PROSI M UNI VERSI TY Istructios: Prit your ame i the space provided below. This examiatio is closed book ad closed
More informationExamples and Applications of Binary Search
Toy Gog ITEE Uiersity of Queeslad I the secod lecture last week we studied the biary search algorithm that soles the problem of determiig if a particular alue appears i a sorted list of iteger or ot. We
More informationThe golden search method: Question 1
1. Golde Sectio Search for the Mode of a Fuctio The golde search method: Questio 1 Suppose the last pair of poits at which we have a fuctio evaluatio is x(), y(). The accordig to the method, If f(x())
More informationNTH, GEOMETRIC, AND TELESCOPING TEST
NTH, GEOMETRIC, AND TELESCOPING TEST Sectio 9. Calculus BC AP/Dual, Revised 08 viet.dag@humbleisd.et /4/08 0:0 PM 9.: th, Geometric, ad Telescopig Test SUMMARY OF TESTS FOR SERIES Lookig at the first few
More informationBACHMANN-LANDAU NOTATIONS. Lecturer: Dr. Jomar F. Rabajante IMSP, UPLB MATH 174: Numerical Analysis I 1 st Sem AY
BACHMANN-LANDAU NOTATIONS Lecturer: Dr. Jomar F. Rabajate IMSP, UPLB MATH 174: Numerical Aalysis I 1 st Sem AY 018-019 RANKING OF FUNCTIONS Name Big-Oh Eamples Costat O(1 10 Logarithmic O(log log, log(
More informationNormal Distributions
Normal Distributios Stacey Hacock Look at these three differet data sets Each histogram is overlaid with a curve : A B C A) Weights (g) of ewly bor lab rat pups B) Mea aual temperatures ( F ) i A Arbor,
More informationCounting the Number of Minimum Roman Dominating Functions of a Graph
Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph
More informationCharacterizing graphs of maximum principal ratio
Characterizig graphs of maximum pricipal ratio Michael Tait ad Josh Tobi November 9, 05 Abstract The pricipal ratio of a coected graph, deoted γg, is the ratio of the maximum ad miimum etries of its first
More informationCreating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA
Creatig Exact Bezier Represetatios of CST Shapes David D. Marshall Califoria Polytechic State Uiversity, Sa Luis Obispo, CA 93407-035, USA The paper presets a method of expressig CST shapes pioeered by
More informationHash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.
Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative
More information1 Graph Sparsfication
CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider
More informationA Study on the Performance of Cholesky-Factorization using MPI
A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio
More informationAlpha Individual Solutions MAΘ National Convention 2013
Alpha Idividual Solutios MAΘ Natioal Covetio 0 Aswers:. D. A. C 4. D 5. C 6. B 7. A 8. C 9. D 0. B. B. A. D 4. C 5. A 6. C 7. B 8. A 9. A 0. C. E. B. D 4. C 5. A 6. D 7. B 8. C 9. D 0. B TB. 570 TB. 5
More informationUniversity of Waterloo Department of Electrical and Computer Engineering ECE 250 Algorithms and Data Structures
Uiversity of Waterloo Departmet of Electrical ad Computer Egieerig ECE 250 Algorithms ad Data Structures Midterm Examiatio ( pages) Istructor: Douglas Harder February 7, 2004 7:30-9:00 Name (last, first)
More informationAssignment 5; Due Friday, February 10
Assigmet 5; Due Friday, February 10 17.9b The set X is just two circles joied at a poit, ad the set X is a grid i the plae, without the iteriors of the small squares. The picture below shows that the iteriors
More informationOn Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract
O Ifiite Groups that are Isomorphic to its Proper Ifiite Subgroup Jaymar Talledo Baliho Abstract Two groups are isomorphic if there exists a isomorphism betwee them Lagrage Theorem states that the order
More informationThe isoperimetric problem on the hypercube
The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose
More informationn n B. How many subsets of C are there of cardinality n. We are selecting elements for such a
4. [10] Usig a combiatorial argumet, prove that for 1: = 0 = Let A ad B be disjoit sets of cardiality each ad C = A B. How may subsets of C are there of cardiality. We are selectig elemets for such a subset
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More informationRecursive Procedures. How can you model the relationship between consecutive terms of a sequence?
6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.
More informationMajor CSL Write your name and entry no on every sheet of the answer script. Time 2 Hrs Max Marks 70
NOTE:. Attempt all seve questios. Major CSL 02 2. Write your ame ad etry o o every sheet of the aswer script. Time 2 Hrs Max Marks 70 Q No Q Q 2 Q 3 Q 4 Q 5 Q 6 Q 7 Total MM 6 2 4 0 8 4 6 70 Q. Write a
More informationENGI 4421 Probability and Statistics Faculty of Engineering and Applied Science Problem Set 1 Descriptive Statistics
ENGI 44 Probability ad Statistics Faculty of Egieerig ad Applied Sciece Problem Set Descriptive Statistics. If, i the set of values {,, 3, 4, 5, 6, 7 } a error causes the value 5 to be replaced by 50,
More informationarxiv: v2 [cs.ds] 24 Mar 2018
Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves
More informationON MATHIEU-BERG S INEQUALITY
ON MATHIEU-BERG S INEQUALITY BICHENG YANG DEPARTMENT OF MATHEMATICS, GUANGDONG EDUCATION COLLEGE, GUANGZHOU, GUANGDONG 533, PEOPLE S REPUBLIC OF CHINA. bcyag@pub.guagzhou.gd.c ABSTRACT. I this paper, by
More informationA New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method
A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro
More informationEVALUATION OF TRIGONOMETRIC FUNCTIONS
EVALUATION OF TRIGONOMETRIC FUNCTIONS Whe first exposed to trigoometric fuctios i high school studets are expected to memorize the values of the trigoometric fuctios of sie cosie taget for the special
More informationProtected points in ordered trees
Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic
More informationOrder statistics. Order Statistics. Randomized divide-andconquer. Example. CS Spring 2006
406 CS 5633 -- Sprig 006 Order Statistics Carola We Slides courtesy of Charles Leiserso with small chages by Carola We CS 5633 Aalysis of Algorithms 406 Order statistics Select the ith smallest of elemets
More informationTest 4 Review. dy du 9 5. sin5 zdz. dt. 5 Ê. x 2 È 1, 3. 2cos( x) dx is less than using Simpson's. ,1 t 5 t 2. ft () t2 4.
Name: Class: Date: ID: A Test Review Short Aswer. Fid the geeral solutio of the differetial equatio below ad check the result by differetiatio. dy du 9 u. Use the error formula to estimate the error i
More informationFundamental Algorithms
Techische Uiversität Müche Fakultät für Iformatik Lehrstuhl für Effiziete Algorithme Dmytro Chibisov Sadeep Sadaada Witer Semester 2007/08 Solutio Sheet 6 November 30, 2007 Fudametal Algorithms Problem
More informationLecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions
U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets
More informationRedundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis
IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical
More informationLower Bounds for Sorting
Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig
More informationMathematical Stat I: solutions of homework 1
Mathematical Stat I: solutios of homework Name: Studet Id N:. Suppose we tur over cards simultaeously from two well shuffled decks of ordiary playig cards. We say we obtai a exact match o a particular
More informationA Comparative Study of Positive and Negative Factorials
A Comparative Study of Positive ad Negative Factorials A. M. Ibrahim, A. E. Ezugwu, M. Isa Departmet of Mathematics, Ahmadu Bello Uiversity, Zaria Abstract. This paper preset a comparative study of the
More informationConvergence results for conditional expectations
Beroulli 11(4), 2005, 737 745 Covergece results for coditioal expectatios IRENE CRIMALDI 1 ad LUCA PRATELLI 2 1 Departmet of Mathematics, Uiversity of Bologa, Piazza di Porta Sa Doato 5, 40126 Bologa,
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationANN WHICH COVERS MLP AND RBF
ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi
More informationBayesian approach to reliability modelling for a probability of failure on demand parameter
Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee
More informationThe Graphs of Polynomial Functions
Sectio 4.3 The Graphs of Polyomial Fuctios Objective 1: Uderstadig the Defiitio of a Polyomial Fuctio Defiitio Polyomial Fuctio 1 2 The fuctio ax a 1x a 2x a1x a0 is a polyomial fuctio of degree where
More informationChapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.
Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4
More information9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence
_9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to
More informationON A PROBLEM OF C. E. SHANNON IN GRAPH THEORY
ON A PROBLEM OF C. E. SHANNON IN GRAPH THEORY m. rosefeld1 1. Itroductio. We cosider i this paper oly fiite odirected graphs without multiple edges ad we assume that o each vertex of the graph there is
More informationOptimal Mapped Mesh on the Circle
Koferece ANSYS 009 Optimal Mapped Mesh o the Circle doc. Ig. Jaroslav Štigler, Ph.D. Bro Uiversity of Techology, aculty of Mechaical gieerig, ergy Istitut, Abstract: This paper brigs out some ideas ad
More informationFREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS
FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y
More information15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015
15-859E: Advaced Algorithms CMU, Sprig 2015 Lecture #2: Radomized MST ad MST Verificatio Jauary 14, 2015 Lecturer: Aupam Gupta Scribe: Yu Zhao 1 Prelimiaries I this lecture we are talkig about two cotets:
More information1.8 What Comes Next? What Comes Later?
35 1.8 What Comes Next? What Comes Later? A Practice Uderstadig Task For each of the followig tables, CC BY Hiroaki Maeda https://flic.kr/p/6r8odk describe how to fid the ext term i the sequece, write
More informationCluster Analysis. Andrew Kusiak Intelligent Systems Laboratory
Cluster Aalysis Adrew Kusiak Itelliget Systems Laboratory 2139 Seamas Ceter The Uiversity of Iowa Iowa City, Iowa 52242-1527 adrew-kusiak@uiowa.edu http://www.icae.uiowa.edu/~akusiak Two geeric modes of
More informationArea As A Limit & Sigma Notation
Area As A Limit & Sigma Notatio SUGGESTED REFERENCE MATERIAL: As you work through the problems listed below, you should referece Chapter 5.4 of the recommeded textbook (or the equivalet chapter i your
More informationMarkov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size
Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA
More informationNew Results on Energy of Graphs of Small Order
Global Joural of Pure ad Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 2837-2848 Research Idia Publicatios http://www.ripublicatio.com New Results o Eergy of Graphs of Small Order
More informationCivil Engineering Computation
Civil Egieerig Computatio Fidig Roots of No-Liear Equatios March 14, 1945 World War II The R.A.F. first operatioal use of the Grad Slam bomb, Bielefeld, Germay. Cotets 2 Root basics Excel solver Newto-Raphso
More informationData Structures and Algorithms Part 1.4
1 Data Structures ad Algorithms Part 1.4 Werer Nutt 2 DSA, Part 1: Itroductio, syllabus, orgaisatio Algorithms Recursio (priciple, trace, factorial, Fiboacci) Sortig (bubble, isertio, selectio) 3 Sortig
More informationAlgorithm Efficiency
Algorithm Effiiey Exeutig ime Compariso of algorithms to determie whih oe is better approah implemet algorithms & reord exeutio time Problems with this approah there are may tasks ruig ourretly o a omputer
More informationThe Adjacency Matrix and The nth Eigenvalue
Spectral Graph Theory Lecture 3 The Adjacecy Matrix ad The th Eigevalue Daiel A. Spielma September 5, 2012 3.1 About these otes These otes are ot ecessarily a accurate represetatio of what happeed i class.
More informationOn Computing the Fuzzy Weighted Average Using the KM Algorithms
O Computig the Fuzzy Weighted Average Usig the KM Algorithms Feilog iu ad Jerry M Medel Sigal ad Image Processig Istitute, Departmet of Electrical Egieerig Uiversity of Souther Califoria, 3740 McClitock
More informationCMPT 125 Assignment 2 Solutions
CMPT 25 Assigmet 2 Solutios Questio (20 marks total) a) Let s cosider a iteger array of size 0. (0 marks, each part is 2 marks) it a[0]; I. How would you assig a poiter, called pa, to store the address
More informationXiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation
Flexible Colorig Xiaozhou (Steve) Li, Atri Rudra, Ram Swamiatha HP Laboratories HPL-2010-177 Keyword(s): graph colorig; hardess of approximatio Abstract: Motivated b y reliability cosideratios i data deduplicatio
More informationA NOTE ON COARSE GRAINED PARALLEL INTEGER SORTING
Chater 26 A NOTE ON COARSE GRAINED PARALLEL INTEGER SORTING A. Cha ad F. Dehe School of Comuter Sciece Carleto Uiversity Ottawa, Caada K1S 5B6 æ {acha,dehe}@scs.carleto.ca Abstract Keywords: We observe
More information