logo Use CA10RAM to get 10%* Discount.
Order Nowlogo
(5/5)

coworker suggests a paycheck of 2|log2n∫+1 per splay operation instead of 3|log2 n∫+ 1, the same credit invariant as before, and a strategy of spending only 2k credits

INSTRUCTIONS TO CANDIDATES
ANSWER ALL QUESTIONS

Homework 5, CS420, Spring 2020

  1. A coworker suggests a paycheck of 2|log2n∫+1 per splay operation instead of 3|log2 n∫+ 1, the same credit invariant as before, and a strategy of spending only 2k credits from the paycheck instead of 3k if x’s credit requirement goes up by k during a rotation

Where does the strategy fail? Your answer must address the which types of rotations  on page 54 and the values of k for which they fail. Justify each case where you claim  it fails.

  1. The coworker suggests a paycheck of 3|log2n∫ per splay operation instead of 3|log2 n∫+ 1, the same credit invariant as before, and a strategy of spending only 3k credits from the paycheck if x’s credit requirement goes up by k during a rotation

Where does the strategy fail? Your answer must address the which types of rotations  on page 54 and the values of k for which they fail. Justify each case where you claim  it fails.

  1. Suppose a co-worker implements a pseudo-array, as I have described in lectures, using splay trees. However, when looking up an  element,  if  the  path  traversed  down  the splay tree to the position where the element is found or inserted has length at most     3|log2 n∫ + 1, she doesn’t bother to splay it.  (The only exception she makes is when  the element is required to be moved  to the root to delete it, or to split the list after          the In that case, she splays it and pays for it as we described before.)

She reasons that she can use the paycheck of 3|log2 n∫ + 1 to pay directly the cost of traversing the path if its length is bounded by this value, so there is no need to splay.

Is her analysis correct? Reason in terms of the goals we sought to achieve during each splay: not overspending our paycheck and maintaining invariants we must maintain in order to make sure that subsequent operations also do not overspend their paychecks,

  1. Consider the data structure suggested by Problem 17-2 on page 473, without sup- porting the Delete operation suggested by part

 

  • Let n be the number of insertions that will take place on the data structure. This will be the largest it ever grows. Suppose you already know the largest value of n before you begin inserting

Assume that you have a paycheck of |log2 n∫ credits for each insertion. You maintain a credit invariant  that if an element is in an array of size 2 ,  then it     has |log2 n∫ − i credits on it.

You need to pay for all work resulting from an insertion at the rate of O(1) per credit while maintaining the credit invariant. Explain how to do that.

Hint: Consider the running time of the merge operation from Mergesort.

  • Suppose you don’t know the value of n in advance. Does the amortized O(log n) bound for insertion still apply, where you only find out what n is after the last insertion?
  • Derive the big-Θ bound for the lookup operation of part b?

 

  1. In our study of max flow, we have seen how to find a minimum cut separating t from

s, where s and t are given.

 

Suppose we want  to find a minimum cut separating any  two  vertices in the graph.  One way to do this is to run the max-flow algorithm for each of the n(n − 1) ordered pairs (s, t) of vertices.

Tell how to solve the problem with O(n) calls to the max-flow algorithm.

  1. To the operations on pseudo-arrays that I discussed in lectures, let us add a new one,

reverse, which reverses the order of elements in it.

For instance, the following gives the elements and their indices before and after the

reverse operation on an example:

 

1 2 3 4 5 6 7

[3,9,1,2,5,4,6]

 

1 2 3 4 5 6 7

[6,4,5,2,1,9,3]

 

Before the reverse operation if the user asks for the element at position 2, the list returns 9. After it, it returns 4. Similarly for any other operation that indexes by position.

Here is a hint:  Instead of letting each node have  a left child and a right child, it has   an A child and a B child. Assign an integer k(v) to each node v. If k(v) is even, then the A child of v is interpreted as the left child and the B child as the right child; if  k(v) is odd, then the A child of v is interpreted as the right child and the B child as  the left child.

Alternatively, let k(v) be a bit, and let the interpretation of the two children depend on whether k(v) = 0 or k(v) = 1.

All operations that traverse from the root to an element consult k(v) and use the prescribed interpretation of A and B, both otherwise work as before.

Tell how to implement the reverse operation so that it takes o(n) time, though the list still supports the operation of looking up an element by  its position,  changing    the value of an element in a given position, deleting an element in a given position, inserting an element in a given position, and splitting and concatenating lists.

Tell what amortized bounds you can achieve. You may use any claims I have already shown in lectures to be true in deriving your bounds.

(5/5)
Attachments:

Related Questions

. Introgramming & Unix Fall 2018, CRN 44882, Oakland University Homework Assignment 6 - Using Arrays and Functions in C

DescriptionIn this final assignment, the students will demonstrate their ability to apply two ma

. The standard path finding involves finding the (shortest) path from an origin to a destination, typically on a map. This is an

Path finding involves finding a path from A to B. Typically we want the path to have certain properties,such as being the shortest or to avoid going t

. Develop a program to emulate a purchase transaction at a retail store. This program will have two classes, a LineItem class and a Transaction class. The LineItem class will represent an individual

Develop a program to emulate a purchase transaction at a retail store. Thisprogram will have two classes, a LineItem class and a Transaction class. Th

. SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 1 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

. Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

Ask This Question To Be Solved By Our ExpertsGet A+ Grade Solution Guaranteed

expert
Um e HaniScience

622 Answers

Hire Me
expert
Muhammad Ali HaiderFinance

955 Answers

Hire Me
expert
Husnain SaeedComputer science

756 Answers

Hire Me
expert
Atharva PatilComputer science

660 Answers

Hire Me
June
January
February
March
April
May
June
July
August
September
October
November
December
2025
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
2031
2032
2033
2034
2035
2036
2037
2038
2039
2040
2041
2042
2043
2044
2045
2046
2047
2048
2049
2050
SunMonTueWedThuFriSat
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
4
5
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30