• Non ci sono risultati.

Algorithm Engineering 29

N/A
N/A
Protected

Academic year: 2021

Condividi "Algorithm Engineering 29"

Copied!
1
0
0

Testo completo

(1)

Algorithm Engineering

29 July 2014

1. [rank 4] Compute the I/O-complexity of Binary Mergesort when executed on a machine with disk-page size B and memory-size M.

2. [rank 4+4] Write the pseudo-code of Bounded-Space Quicksort and then simulate it over the array A=[4,1,2,6,3,8], assuming the pivot is chosen as the first item of the array to be sorted (at each recursive call).

3. [rank 5+3] Given the string S=abracadabra, compute the LCP-array using the linear-time optimal algorithm. Show, for each LCP, which characters are really scanned in S.

4. [rank 5] Let us assume that you are given the binary sequence 10101010 produced by the algorithm BWT+MTF. Assuming an MTF-list = {a,b} and $- position = 2 (counting from 0) derive the original string.

5. [rank 5] Given the string S=aaccacaacc, show the execution of the Skew algorithm for the first level of recursion, thus solving directly the construction of SA^{2,0}, as done in class. (Comment also the ratio behind every step.)

Riferimenti

Documenti correlati

• Backward pass : the “ error ” made by the network is propagated backward, and weights are updated properly.

The rst weakness is the existence of large classes of weak keys, in which a small part of the secret key determines a large number of bits of the initial permutation (KSA output)..

Exercise [rank 5] Discuss the optimality of the disk striping technique in combination with multi-way mergesort when sorting N items over D disks, in a model with.. internal memory

Assume you are given 6 strings (aa, ab, bb, bc, ca, db) and you wish to construct a minimal ordered perfect

The result is the logistic regression model // based on the best set of parameters (based on the results of the // cross-validation operation). CrossValidatorModel model

• Scan the sorted list to find a match with the second half of the

•  Beta compute a hash of the file B and send it to alpha?. •  Alpha compute the hash of A and send back to beta either the hash (if the two hash are the same) or the content of

The resulting binary images are input into the spline-based algorithm for diameter estimates and the measurements performance against REVIEW is reported in Table 8.. The removal