In order for metogivebackyour midterms, please form. a line and sort yourselves in alphabetical order, from A
|
|
- Emil Carter
- 5 years ago
- Views:
Transcription
1 Parallel Bulesort In order for metogiveackyour midterms, please form a line and sort yourselves in alphaetical order, from A to Z.
2 Cominatorial Search We have seen how clever algorithms can reduce sorting from O(n 2 )too(n log n). However, the stakes are even higher for cominatorially explosive prolems: The Travelling Salesman Prolem Given a weighted graph, nd the shortest cycle which visits each vertex once. Applications include minimizing plotter movement, printedcircuit oard wiring, transportation prolems, etc. There is no known polynomial time algorithm (ie. O(n k ) for some xed k) for this prolem, so search ased algorithm are the only way togoifyou need an optional solution.
3 But I want to use a Supercomputer Moving to a faster computer can only uy you a relatively small improvement: Hardware clock rates on the fastest computers only improved y a factor of 6 from 1976 to 1989, from 12ns to 2ns. Moving to a machine with 100 processors can only give you a factor of 100 speedup, even if your jo can e perfectly parallelized (ut of course it can't). The fast Fourier algorithm (FFT) reduced computation from O(n 2 )too(n lg n). This is a speedup of 340 times on n =4096 and revolutionized the eld of image processing. The fast multipole method for n-particle interaction reduced the computation from O(n 2 )too(n). This is a speedup of 4000 times on n =4096.
4 Can Eight Pieces Cover a Chess Board? Consider the 8 main pieces in chess (king, queen, two rooks, two ishops, two knights). Can they e positioned on a chessoard so every square is threatened? N N B R R B Q K Only 63 square are threatened in this conguration. Since 1849, no one had een ale to nd an arrangement with ishops on dierent colors to cover all squares. Of course, this is not an important prolem, ut we will use it as an example of how to attack a cominatorial search prolem.
5 How many positions to test? Picking a square for each piece gives us the ound: 64!=(64 ; 8)! = Anything much larger than 10 8 is unreasonale to search on a modest computer in a modest amount of time. However, we can exploit symmetry to save work. With reections along horizontal, vertical, and diagonal axis, the queen can go in only 10 non-equivallent positions. Even etter, we can restrict the white ishop to 16 spots and the queen to 16, while eing certain that we get all distinct congurations. Q Q Q =
6 Backtracking Backtracking is a systematic way to go through all the possile congurations of a search space. In the general case, we assume our solution is a vector v = (a 1 a 2 ::: an) where each element a i is selected from a nite ordered set S i, We uild from a partial solution of length k. v = (a 1 a 2 ::: an) and try to extend it y adding another element. After extending it, we will test whether what we have so far is still possile as a partial solution. If it is still a candidate solution, great. If not, we delete a k and try the next element from S k : Compute S 1,thesetofcandidate rst elements of v. count =0 k =1 While k>0do While S k 6= do (*advance*) a k =anelement in S k S k S k ; a k count = count ; 1 if (a 1 a 2 ::: a k )issolution, print! k = k +1 compute S k,candidate kth elements given v. k = k ; 1 (*acktrack*)
7 Recursive Backtracking Recursion can e used for elegant and easy implementation of acktracking. Backtrack(a, k) if a is a solution, print(a) else f k = k +1 compute S k while S k 6= do a k =anelement in S k S k = S k ; a k Backtrack(a, k) g Backtracking can easily e used to iterate through all susets or permutations of a set. Backtracking ensures correctness y enumerating all possiilities. For acktracking to e ecient, we must prune the search space.
8 Constructing all Susets How many susets are there of an n-element set? To construct all 2 n susets, set up an array/vector of n cells, where the value of a i is either true or false, signifying whether the ith item is or is not in the suset. Touse the notation of the general acktrack algorithm, S k =(true false), and v is a solution whenever k n. What order will this generate the susets of f1 2 3g? (1)! (1 2)! (1 2 3)! (1 2 ;)!(1 ;)! (1 ; 3)! (1 ; ;)!(1 ;)! (1)! (;)! (; 2)! (; 2 3)! (; 2 ;)!(; ;)! (; ; 3)! (; ; ;)!(; ;)! (;)! ()
9 Constructing all Permutations How many permutations are there of an n-element set? Toconstruct all n! permutations, set up an array/vector of n cells, where the value of a i is an integer from 1 to n which has not appeared thus far in the vector, corresponding to the ith element of the permutation. Touse the notation of the general acktrack algorithm, S k =(1 ::: n) ; v, and v is a solution whenever k n.
10 The n-queens Prolem INCLUDE TWO PAGES OF PICTURES ON THE EIGHT QUUENS The rst use of pruning to deal with the cominatorial explosion was y the king who rewarded the fellow who discovered chess! In the eight Queens, we prune whenever one queen threatens another.
11 Covering the Chess Board In covering the chess oard, we prune whenever we nd there is a square which we cannot cover given the initial conguration! Specically, each piece can threaten a certain maximum numer of squares (queen 27, king 8, rook 14, etc.) Whenever the numer of unthreated squares exceeds the sum of the maximum numer of coverage remaining in unplaced squares, we can prune. As implemented y a graduate student project, this acktrack search eliminates 95% of the search space, when the pieces are ordered y decreasing moility. With precomputing the list of possile moves, this program could search 1,000 positions per second. But this is too slow! =10 3 =10 9 seconds > 1000 days Although we might further speed the program y an order of magnitude, we need to prune more nodes! By using a more clever algorithm, we eventually were ale to prove no solution existed, in less than one day's worth of computing. You too can ght the cominatorial explosion!
12 The Backtracking Contest: Bandwidth The andwidth prolem takes as input a graph G, with n vertices and m edges (ie. pairs of vertices). The goal is to nd a permutation of the vertices on the line which minimizes the maximum length of any edge The andwidth prolem has a variety of applications, including circuit layout, linear algera, and optimizing memory usage in hypertext documents. The prolem is NP-complete, meaning that it is exceedingly unlikely that you will e ale to nd an algorithm with polynomial worst-case running time. It remains NP-complete even for restricted classes of trees. Since the goal of the prolem is to nd a permutation, a acktracking program which iterates through all the n! possile permutations and computes the length of the longest edge for each gives an easy O(n! m) algorithm. But the goal of this assignment is to nd as practically good an algorithm as possile.
13 Rules of the Game 1. Everyone must do this assignment separately. Just this once, you are not allowed to work with your partner. The idea is to think aout the prolem from scratch. 2. If you do not completely understand what the andwidth of a graph is, you don't have the slightest chance of producing a working program. Don't e afraid to ask for a clarication or explanation!!!!! 3. There will e a variety of dierent data les of dierent sizes. Test on the smaller les rst. Do not e afraid to create your own test les to help deug your program. 4. The data les are availale via the course WWW page. 5. You will e graded on how fast and clever your program is, not on style. No credit will e given for incorrect programs. 6. The programs are to run on the whatever computer you have access to, although it must e vanilla enough that I can run the program on something I have access to. 7. You are to turn in a listing of your program, along with a rief description of your algorithm and any
14 interesting optimizations, sample runs, and the time it takes on sample data les. Report the largest test le your program could handle in one minute or less of wall clock time. 8. The top ve self-reported times / largest sizes will e collected and tested y me to determine the winner.
15 Producing Ecient Programs 1. Don't optimize prematurely: Worrying aout recursion vs. iteration is counter-productive until you have worked out the est way to prune the tree. That is where the money is. 2. Choose your data structures for areason: What operations will you e doing? Is case of insertion/deletion more crucial than fast retrieval? When in dout, keep it simple, stupid (KISS). 3. Let the proler determine where to do nal tuning: Your program is proaly spending time where you don't expect.
Lecture 20: Combinatorial Search (1997) Steven Skiena. skiena
Lecture 20: Combinatorial Search (1997) Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.sunysb.edu/ skiena Give an O(n lg k)-time algorithm
More informationCMPS 12A Introduction to Programming Programming Assignment 5 In this assignment you will write a Java program that finds all solutions to the n-queens problem, for. Begin by reading the Wikipedia article
More informationIn the game of Chess a queen can move any number of spaces in any linear direction: horizontally, vertically, or along a diagonal.
CMPS 12A Introduction to Programming Winter 2013 Programming Assignment 5 In this assignment you will write a java program finds all solutions to the n-queens problem, for 1 n 13. Begin by reading the
More informationMore on games (Ch )
More on games (Ch. 5.4-5.6) Announcements Midterm next Tuesday: covers weeks 1-4 (Chapters 1-4) Take the full class period Open book/notes (can use ebook) ^^ No programing/code, internet searches or friends
More informationISudoku. Jonathon Makepeace Matthew Harris Jamie Sparrow Julian Hillebrand
Jonathon Makepeace Matthew Harris Jamie Sparrow Julian Hillebrand ISudoku Abstract In this paper, we will analyze and discuss the Sudoku puzzle and implement different algorithms to solve the puzzle. After
More informationCSE 21 Practice Final Exam Winter 2016
CSE 21 Practice Final Exam Winter 2016 1. Sorting and Searching. Give the number of comparisons that will be performed by each sorting algorithm if the input list of length n happens to be of the form
More information! HW5 now available! ! May do in groups of two.! Review in recitation! No fancy data structures except trie!! Due Monday 11:59 pm
nnouncements acktracking and Game Trees 15-211: Fundamental Data Structures and lgorithms! HW5 now available!! May do in groups of two.! Review in recitation! No fancy data structures except trie!! Due
More information1 Introduction The n-queens problem is a classical combinatorial problem in the AI search area. We are particularly interested in the n-queens problem
(appeared in SIGART Bulletin, Vol. 1, 3, pp. 7-11, Oct, 1990.) A Polynomial Time Algorithm for the N-Queens Problem 1 Rok Sosic and Jun Gu Department of Computer Science 2 University of Utah Salt Lake
More informationAdversary Search. Ref: Chapter 5
Adversary Search Ref: Chapter 5 1 Games & A.I. Easy to measure success Easy to represent states Small number of operators Comparison against humans is possible. Many games can be modeled very easily, although
More informationCSE373: Data Structure & Algorithms Lecture 23: More Sorting and Other Classes of Algorithms. Nicki Dell Spring 2014
CSE373: Data Structure & Algorithms Lecture 23: More Sorting and Other Classes of Algorithms Nicki Dell Spring 2014 Admin No class on Monday Extra time for homework 5 J 2 Sorting: The Big Picture Surprising
More informationCSE 573 Problem Set 1. Answers on 10/17/08
CSE 573 Problem Set. Answers on 0/7/08 Please work on this problem set individually. (Subsequent problem sets may allow group discussion. If any problem doesn t contain enough information for you to answer
More informationMore on games (Ch )
More on games (Ch. 5.4-5.6) Alpha-beta pruning Previously on CSci 4511... We talked about how to modify the minimax algorithm to prune only bad searches (i.e. alpha-beta pruning) This rule of checking
More informationEcient Multichip Partial Concentrator Switches. Thomas H. Cormen. Laboratory for Computer Science. Massachusetts Institute of Technology
Ecient Multichip Partial Concentrator Switches Thomas H. Cormen Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, Massachusetts 02139 Abstract Due to chip area and pin count
More informationBacktracking. Chapter Introduction
Chapter 3 Backtracking 3.1 Introduction Backtracking is a very general technique that can be used to solve a wide variety of problems in combinatorial enumeration. Many of the algorithms to be found in
More informationFoundations of AI. 5. Board Games. Search Strategies for Games, Games with Chance, State of the Art. Wolfram Burgard and Luc De Raedt SA-1
Foundations of AI 5. Board Games Search Strategies for Games, Games with Chance, State of the Art Wolfram Burgard and Luc De Raedt SA-1 Contents Board Games Minimax Search Alpha-Beta Search Games with
More informationStructured Programming Using Procedural Languages INSS Spring 2018
Structured Programming Using Procedural Languages INSS 225.101 - Spring 2018 Project #3 (Individual) For your third project, you are going to write a program like what you did for Project 2. You are going
More informationProblem A. Worst Locations
Problem A Worst Locations Two pandas A and B like each other. They have been placed in a bamboo jungle (which can be seen as a perfect binary tree graph of 2 N -1 vertices and 2 N -2 edges whose leaves
More informationCS61B Lecture #22. Today: Backtracking searches, game trees (DSIJ, Section 6.5) Last modified: Mon Oct 17 20:55: CS61B: Lecture #22 1
CS61B Lecture #22 Today: Backtracking searches, game trees (DSIJ, Section 6.5) Last modified: Mon Oct 17 20:55:07 2016 CS61B: Lecture #22 1 Searching by Generate and Test We vebeenconsideringtheproblemofsearchingasetofdatastored
More informationAfter learning the Rules, What should beginners learn next?
After learning the Rules, What should beginners learn next? Chess Puzzling Presentation Nancy Randolph Capital Conference June 21, 2016 Name Introduction to Chess Test 1. How many squares does a chess
More informationQuestion Score Max Cover Total 149
CS170 Final Examination 16 May 20 NAME (1 pt): TA (1 pt): Name of Neighbor to your left (1 pt): Name of Neighbor to your right (1 pt): This is a closed book, closed calculator, closed computer, closed
More informationTopic 10 Recursive Backtracking
Topic 10 ki "In ancient times, before computers were invented, alchemists studied the mystical properties of numbers. Lacking computers, they had to rely on dragons to do their work for them. The dragons
More informationHeuristic Search with Pre-Computed Databases
Heuristic Search with Pre-Computed Databases Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Abstract Use pre-computed partial results to improve the efficiency of heuristic
More informationUNIVERSITY of PENNSYLVANIA CIS 391/521: Fundamentals of AI Midterm 1, Spring 2010
UNIVERSITY of PENNSYLVANIA CIS 391/521: Fundamentals of AI Midterm 1, Spring 2010 Question Points 1 Environments /2 2 Python /18 3 Local and Heuristic Search /35 4 Adversarial Search /20 5 Constraint Satisfaction
More informationGrade 7/8 Math Circles Game Theory October 27/28, 2015
Faculty of Mathematics Waterloo, Ontario N2L 3G1 Centre for Education in Mathematics and Computing Grade 7/8 Math Circles Game Theory October 27/28, 2015 Chomp Chomp is a simple 2-player game. There is
More informationPast questions from the last 6 years of exams for programming 101 with answers.
1 Past questions from the last 6 years of exams for programming 101 with answers. 1. Describe bubble sort algorithm. How does it detect when the sequence is sorted and no further work is required? Bubble
More informationChapter 5 Backtracking. The Backtracking Technique The n-queens Problem The Sum-of-Subsets Problem Graph Coloring The 0-1 Knapsack Problem
Chapter 5 Backtracking The Backtracking Technique The n-queens Problem The Sum-of-Subsets Problem Graph Coloring The 0-1 Knapsack Problem Backtracking maze puzzle following every path in maze until a dead
More informationMonte Carlo based battleship agent
Monte Carlo based battleship agent Written by: Omer Haber, 313302010; Dror Sharf, 315357319 Introduction The game of battleship is a guessing game for two players which has been around for almost a century.
More informationHeuristics, and what to do if you don t know what to do. Carl Hultquist
Heuristics, and what to do if you don t know what to do Carl Hultquist What is a heuristic? Relating to or using a problem-solving technique in which the most appropriate solution of several found by alternative
More informationPartial Answers to the 2005 Final Exam
Partial Answers to the 2005 Final Exam Econ 159a/MGT522a Ben Polak Fall 2007 PLEASE NOTE: THESE ARE ROUGH ANSWERS. I WROTE THEM QUICKLY SO I AM CAN'T PROMISE THEY ARE RIGHT! SOMETIMES I HAVE WRIT- TEN
More informationYou ve seen them played in coffee shops, on planes, and
Every Sudoku variation you can think of comes with its own set of interesting open questions There is math to be had here. So get working! Taking Sudoku Seriously Laura Taalman James Madison University
More informationIntroduction to Genetic Algorithms
Introduction to Genetic Algorithms Peter G. Anderson, Computer Science Department Rochester Institute of Technology, Rochester, New York anderson@cs.rit.edu http://www.cs.rit.edu/ February 2004 pg. 1 Abstract
More informationFoundations of Artificial Intelligence
Foundations of Artificial Intelligence 6. Board Games Search Strategies for Games, Games with Chance, State of the Art Joschka Boedecker and Wolfram Burgard and Bernhard Nebel Albert-Ludwigs-Universität
More informationMonte Carlo Tree Search and AlphaGo. Suraj Nair, Peter Kundzicz, Kevin An, Vansh Kumar
Monte Carlo Tree Search and AlphaGo Suraj Nair, Peter Kundzicz, Kevin An, Vansh Kumar Zero-Sum Games and AI A player s utility gain or loss is exactly balanced by the combined gain or loss of opponents:
More informationLecture 13 Register Allocation: Coalescing
Lecture 13 Register llocation: Coalescing I. Motivation II. Coalescing Overview III. lgorithms: Simple & Safe lgorithm riggs lgorithm George s lgorithm Phillip. Gibbons 15-745: Register Coalescing 1 Review:
More informationTwo Parity Puzzles Related to Generalized Space-Filling Peano Curve Constructions and Some Beautiful Silk Scarves
Two Parity Puzzles Related to Generalized Space-Filling Peano Curve Constructions and Some Beautiful Silk Scarves http://www.dmck.us Here is a simple puzzle, related not just to the dawn of modern mathematics
More informationFoundations of Artificial Intelligence
Foundations of Artificial Intelligence 6. Board Games Search Strategies for Games, Games with Chance, State of the Art Joschka Boedecker and Wolfram Burgard and Frank Hutter and Bernhard Nebel Albert-Ludwigs-Universität
More informationFoundations of AI. 6. Board Games. Search Strategies for Games, Games with Chance, State of the Art
Foundations of AI 6. Board Games Search Strategies for Games, Games with Chance, State of the Art Wolfram Burgard, Andreas Karwath, Bernhard Nebel, and Martin Riedmiller SA-1 Contents Board Games Minimax
More informationComputer Science and Software Engineering University of Wisconsin - Platteville. 4. Game Play. CS 3030 Lecture Notes Yan Shi UW-Platteville
Computer Science and Software Engineering University of Wisconsin - Platteville 4. Game Play CS 3030 Lecture Notes Yan Shi UW-Platteville Read: Textbook Chapter 6 What kind of games? 2-player games Zero-sum
More informationFoundations of AI. 6. Adversarial Search. Search Strategies for Games, Games with Chance, State of the Art. Wolfram Burgard & Bernhard Nebel
Foundations of AI 6. Adversarial Search Search Strategies for Games, Games with Chance, State of the Art Wolfram Burgard & Bernhard Nebel Contents Game Theory Board Games Minimax Search Alpha-Beta Search
More informationCSC 380 Final Presentation. Connect 4 David Alligood, Scott Swiger, Jo Van Voorhis
CSC 380 Final Presentation Connect 4 David Alligood, Scott Swiger, Jo Van Voorhis Intro Connect 4 is a zero-sum game, which means one party wins everything or both parties win nothing; there is no mutual
More information: Principles of Automated Reasoning and Decision Making Midterm
16.410-13: Principles of Automated Reasoning and Decision Making Midterm October 20 th, 2003 Name E-mail Note: Budget your time wisely. Some parts of this quiz could take you much longer than others. Move
More informationTaking Sudoku Seriously
Taking Sudoku Seriously Laura Taalman, James Madison University You ve seen them played in coffee shops, on planes, and maybe even in the back of the room during class. These days it seems that everyone
More informationCMPT 310 Assignment 1
CMPT 310 Assignment 1 October 16, 2017 100 points total, worth 10% of the course grade. Turn in on CourSys. Submit a compressed directory (.zip or.tar.gz) with your solutions. Code should be submitted
More informationContents. Foundations of Artificial Intelligence. Problems. Why Board Games?
Contents Foundations of Artificial Intelligence 6. Board Games Search Strategies for Games, Games with Chance, State of the Art Wolfram Burgard, Bernhard Nebel, and Martin Riedmiller Albert-Ludwigs-Universität
More informationPRIMES STEP Plays Games
PRIMES STEP Plays Games arxiv:1707.07201v1 [math.co] 22 Jul 2017 Pratik Alladi Neel Bhalla Tanya Khovanova Nathan Sheffield Eddie Song William Sun Andrew The Alan Wang Naor Wiesel Kevin Zhang Kevin Zhao
More informationInstability of Scoring Heuristic In games with value exchange, the heuristics are very bumpy Make smoothing assumptions search for "quiesence"
More on games Gaming Complications Instability of Scoring Heuristic In games with value exchange, the heuristics are very bumpy Make smoothing assumptions search for "quiesence" The Horizon Effect No matter
More informationAdverserial Search Chapter 5 minmax algorithm alpha-beta pruning TDDC17. Problems. Why Board Games?
TDDC17 Seminar 4 Adversarial Search Constraint Satisfaction Problems Adverserial Search Chapter 5 minmax algorithm alpha-beta pruning 1 Why Board Games? 2 Problems Board games are one of the oldest branches
More informationMinimax Trees: Utility Evaluation, Tree Evaluation, Pruning
Minimax Trees: Utility Evaluation, Tree Evaluation, Pruning CSCE 315 Programming Studio Fall 2017 Project 2, Lecture 2 Adapted from slides of Yoonsuck Choe, John Keyser Two-Person Perfect Information Deterministic
More informationMAS336 Computational Problem Solving. Problem 3: Eight Queens
MAS336 Computational Problem Solving Problem 3: Eight Queens Introduction Francis J. Wright, 2007 Topics: arrays, recursion, plotting, symmetry The problem is to find all the distinct ways of choosing
More informationMidterm for Name: Good luck! Midterm page 1 of 9
Midterm for 6.864 Name: 40 30 30 30 Good luck! 6.864 Midterm page 1 of 9 Part #1 10% We define a PCFG where the non-terminals are {S, NP, V P, V t, NN, P P, IN}, the terminal symbols are {Mary,ran,home,with,John},
More informationComp th February Due: 11:59pm, 25th February 2014
HomeWork Assignment 2 Comp 590.133 4th February 2014 Due: 11:59pm, 25th February 2014 Getting Started What to submit: Written parts of assignment and descriptions of the programming part of the assignment
More informationOCTAGON 5 IN 1 GAME SET
OCTAGON 5 IN 1 GAME SET CHESS, CHECKERS, BACKGAMMON, DOMINOES AND POKER DICE Replacement Parts Order direct at or call our Customer Service department at (800) 225-7593 8 am to 4:30 pm Central Standard
More informationAlgorithm Performance For Chessboard Separation Problems
Algorithm Performance For Chessboard Separation Problems R. Douglas Chatham Maureen Doyle John J. Miller Amber M. Rogers R. Duane Skaggs Jeffrey A. Ward April 23, 2008 Abstract Chessboard separation problems
More informationImage Forgery. Forgery Detection Using Wavelets
Image Forgery Forgery Detection Using Wavelets Introduction Let's start with a little quiz... Let's start with a little quiz... Can you spot the forgery the below image? Let's start with a little quiz...
More informationX 1. x 1,k-1. ,0,1,k-1. x1,0 x1,1... x0,1 x0,k-1. size = n/k ,1 0,k-1. 1,0 1,1 1,k-1 0,0. k -1,1. k -1. k k. k -1 k
All-to-All Broadcast in Broadcast-and-Select WDM Networs with Tunale Devices of Limited Tuning Ranges Hongsi Choi 1 Hyeong-Ah Choi 1 and Lionel M. Ni 2 1 Department of Electrical Engineering and Computer
More informationAnalyzing Games: Solutions
Writing Proofs Misha Lavrov Analyzing Games: olutions Western PA ARML Practice March 13, 2016 Here are some key ideas that show up in these problems. You may gain some understanding of them by reading
More informationCPS331 Lecture: Search in Games last revised 2/16/10
CPS331 Lecture: Search in Games last revised 2/16/10 Objectives: 1. To introduce mini-max search 2. To introduce the use of static evaluation functions 3. To introduce alpha-beta pruning Materials: 1.
More informationIf a pawn is still on its original square, it can move two squares or one square ahead. Pawn Movement
Chess Basics Pawn Review If a pawn is still on its original square, it can move two squares or one square ahead. Pawn Movement If any piece is in the square in front of the pawn, then it can t move forward
More informationENGR170 Assignment Problem Solving with Recursion Dr Michael M. Marefat
ENGR170 Assignment Problem Solving with Recursion Dr Michael M. Marefat Overview The goal of this assignment is to find solutions for the 8-queen puzzle/problem. The goal is to place on a 8x8 chess board
More informationSGU 149. Computer Network. time limit per test: 0.50 sec. memory limit per test: 4096 KB input: standard input output: standard output
SGU 149. Computer Network time limit per test: 0.50 sec. memory limit per test: 4096 KB input: standard input output: standard output A school bought the first computer some time ago. During the recent
More informationSMT 2013 Advanced Topics Test Solutions February 2, 2013
1. How many positive three-digit integers a c can represent a valid date in 2013, where either a corresponds to a month and c corresponds to the day in that month, or a corresponds to a month and c corresponds
More informationMath 3012 Applied Combinatorics Lecture 2
August 20, 2015 Math 3012 Applied Combinatorics Lecture 2 William T. Trotter trotter@math.gatech.edu The Road Ahead Alert The next two to three lectures will be an integrated approach to material from
More informationMath236 Discrete Maths with Applications
Math236 Discrete Maths with Applications P. Ittmann UKZN, Pietermaritzburg Semester 1, 2012 Ittmann (UKZN PMB) Math236 2012 1 / 43 The Multiplication Principle Theorem Let S be a set of k-tuples (s 1,
More informationDue: Sunday 13 November by 10:59pm Worth: 8%
CSC 8 HF Project # General Instructions Fall Due: Sunday Novemer y :9pm Worth: 8% Sumitting your project You must hand in your work electronically, using the MarkUs system. Log in to https://markus.teach.cs.toronto.edu/csc8--9/en/main
More informationTwenty-fourth Annual UNC Math Contest Final Round Solutions Jan 2016 [(3!)!] 4
Twenty-fourth Annual UNC Math Contest Final Round Solutions Jan 206 Rules: Three hours; no electronic devices. The positive integers are, 2, 3, 4,.... Pythagorean Triplet The sum of the lengths of the
More informationAssignment 6 Play A Game: Minesweeper or Battleship!!! Due: Sunday, December 3rd, :59pm
Assignment 6 Play A Game: Minesweeper or Battleship!!! Due: Sunday, December 3rd, 2017 11:59pm This will be our last assignment in the class, boohoo Grading: For this assignment, you will be graded traditionally,
More informationPrevious Lecture. How can computation sort data faster for you? Sorting Algorithms: Speed Comparison. Recursive Algorithms 10/31/11
CS 202: Introduction to Computation " UIVERSITY of WISCOSI-MADISO Computer Sciences Department Professor Andrea Arpaci-Dusseau How can computation sort data faster for you? Previous Lecture Two intuitive,
More informationBinary Continued! November 27, 2013
Binary Tree: 1 Binary Continued! November 27, 2013 1. Label the vertices of the bottom row of your Binary Tree with the numbers 0 through 7 (going from left to right). (You may put numbers inside of the
More informationArtificial Intelligence. Minimax and alpha-beta pruning
Artificial Intelligence Minimax and alpha-beta pruning In which we examine the problems that arise when we try to plan ahead to get the best result in a world that includes a hostile agent (other agent
More informationExamination paper for TDT4120 Algorithms and Data Structures
Department of Computer and Information Science Examination paper for TDT0 Algorithms and Data Structures Academic contact during examination Magnus Lie Hetland Phone 98 5 99 Examination date Dec 0, 08
More informationDesign of Parallel Algorithms. Communication Algorithms
+ Design of Parallel Algorithms Communication Algorithms + Topic Overview n One-to-All Broadcast and All-to-One Reduction n All-to-All Broadcast and Reduction n All-Reduce and Prefix-Sum Operations n Scatter
More informationCS510 \ Lecture Ariel Stolerman
CS510 \ Lecture04 2012-10-15 1 Ariel Stolerman Administration Assignment 2: just a programming assignment. Midterm: posted by next week (5), will cover: o Lectures o Readings A midterm review sheet will
More informationGoogle DeepMind s AlphaGo vs. world Go champion Lee Sedol
Google DeepMind s AlphaGo vs. world Go champion Lee Sedol Review of Nature paper: Mastering the game of Go with Deep Neural Networks & Tree Search Tapani Raiko Thanks to Antti Tarvainen for some slides
More informationCPCS 222 Discrete Structures I Counting
King ABDUL AZIZ University Faculty Of Computing and Information Technology CPCS 222 Discrete Structures I Counting Dr. Eng. Farag Elnagahy farahelnagahy@hotmail.com Office Phone: 67967 The Basics of counting
More informationGrade 6 Math Circles Combinatorial Games November 3/4, 2015
Faculty of Mathematics Waterloo, Ontario N2L 3G1 Centre for Education in Mathematics and Computing Grade 6 Math Circles Combinatorial Games November 3/4, 2015 Chomp Chomp is a simple 2-player game. There
More informationLecture 14. Questions? Friday, February 10 CS 430 Artificial Intelligence - Lecture 14 1
Lecture 14 Questions? Friday, February 10 CS 430 Artificial Intelligence - Lecture 14 1 Outline Chapter 5 - Adversarial Search Alpha-Beta Pruning Imperfect Real-Time Decisions Stochastic Games Friday,
More information10/5/2015. Constraint Satisfaction Problems. Example: Cryptarithmetic. Example: Map-coloring. Example: Map-coloring. Constraint Satisfaction Problems
0/5/05 Constraint Satisfaction Problems Constraint Satisfaction Problems AIMA: Chapter 6 A CSP consists of: Finite set of X, X,, X n Nonempty domain of possible values for each variable D, D, D n where
More informationTetris: A Heuristic Study
Tetris: A Heuristic Study Using height-based weighing functions and breadth-first search heuristics for playing Tetris Max Bergmark May 2015 Bachelor s Thesis at CSC, KTH Supervisor: Örjan Ekeberg maxbergm@kth.se
More information5.4 Imperfect, Real-Time Decisions
5.4 Imperfect, Real-Time Decisions Searching through the whole (pruned) game tree is too inefficient for any realistic game Moves must be made in a reasonable amount of time One has to cut off the generation
More informationNANYANG TECHNOLOGICAL UNIVERSITY SEMESTER II EXAMINATION MH1301 DISCRETE MATHEMATICS. Time Allowed: 2 hours
NANYANG TECHNOLOGICAL UNIVERSITY SEMESTER II EXAMINATION 206-207 DISCRETE MATHEMATICS May 207 Time Allowed: 2 hours INSTRUCTIONS TO CANDIDATES. This examination paper contains FOUR (4) questions and comprises
More informationAlgorithmique appliquée Projet UNO
Algorithmique appliquée Projet UNO Paul Dorbec, Cyril Gavoille The aim of this project is to encode a program as efficient as possible to find the best sequence of cards that can be played by a single
More informationAn Algorithm for Longest Common Subsequence (LCS) Problem in Multiple Sequences
An Algorithm for Longest Common Subsequence (LCS) Problem in Multiple Sequences Bioinformatician & Software Engineer ormer Head & Asst. Professor, Deptt. of Bioinformatics, Singhania University, Pacheri
More information3. If you can t make the sum with your cards, you must draw one card. 4. Players take turns rolling and discarding cards.
1 to 10 Purpose: The object of the game is to get rid of all your cards. One player gets all the red cards, the other gets all the black cards. Players: 2-4 players Materials: 2 dice, a deck of cards,
More informationGrade 6 Math Circles Combinatorial Games - Solutions November 3/4, 2015
Faculty of Mathematics Waterloo, Ontario N2L 3G1 Centre for Education in Mathematics and Computing Grade 6 Math Circles Combinatorial Games - Solutions November 3/4, 2015 Chomp Chomp is a simple 2-player
More informationCCO Commun. Comb. Optim.
Communications in Combinatorics and Optimization Vol. 2 No. 2, 2017 pp.149-159 DOI: 10.22049/CCO.2017.25918.1055 CCO Commun. Comb. Optim. Graceful labelings of the generalized Petersen graphs Zehui Shao
More informationCS61B Lecture #33. Today: Backtracking searches, game trees (DSIJ, Section 6.5)
CS61B Lecture #33 Today: Backtracking searches, game trees (DSIJ, Section 6.5) Coming Up: Concurrency and synchronization(data Structures, Chapter 10, and Assorted Materials On Java, Chapter 6; Graph Structures:
More informationGame-Playing & Adversarial Search
Game-Playing & Adversarial Search This lecture topic: Game-Playing & Adversarial Search (two lectures) Chapter 5.1-5.5 Next lecture topic: Constraint Satisfaction Problems (two lectures) Chapter 6.1-6.4,
More informationCS 188 Fall Introduction to Artificial Intelligence Midterm 1
CS 188 Fall 2018 Introduction to Artificial Intelligence Midterm 1 You have 120 minutes. The time will be projected at the front of the room. You may not leave during the last 10 minutes of the exam. Do
More informationIntroduction to Spring 2009 Artificial Intelligence Final Exam
CS 188 Introduction to Spring 2009 Artificial Intelligence Final Exam INSTRUCTIONS You have 3 hours. The exam is closed book, closed notes except a two-page crib sheet, double-sided. Please use non-programmable
More informationBIEB 143 Spring 2018 Weeks 8-10 Game Theory Lab
BIEB 143 Spring 2018 Weeks 8-10 Game Theory Lab Please read and follow this handout. Read a section or paragraph completely before proceeding to writing code. It is important that you understand exactly
More informationChess Puzzle Mate in N-Moves Solver with Branch and Bound Algorithm
Chess Puzzle Mate in N-Moves Solver with Branch and Bound Algorithm Ryan Ignatius Hadiwijaya / 13511070 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi Bandung,
More informationN-Queens Problem. Latin Squares Duncan Prince, Tamara Gomez February
N-ueens Problem Latin Squares Duncan Prince, Tamara Gomez February 19 2015 Author: Duncan Prince The N-ueens Problem The N-ueens problem originates from a question relating to chess, The 8-ueens problem
More informationCHAPTER 3 ANALYSIS OF LOW POWER, AREA EFFICIENT AND HIGH SPEED ADDER TOPOLOGIES
44 CHAPTER 3 ANALYSIS OF LOW POWER, AREA EFFICIENT AND HIGH SPEED ADDER TOPOLOGIES 3.1 INTRODUCTION The design of high-speed and low-power VLSI architectures needs efficient arithmetic processing units,
More informationMITOCW ocw lec11
MITOCW ocw-6.046-lec11 Here 2. Good morning. Today we're going to talk about augmenting data structures. That one is 23 and that is 23. And I look here. For this one, And this is a -- Normally, rather
More informationA tournament problem
Discrete Mathematics 263 (2003) 281 288 www.elsevier.com/locate/disc Note A tournament problem M.H. Eggar Department of Mathematics and Statistics, University of Edinburgh, JCMB, KB, Mayeld Road, Edinburgh
More informationPart 1. Midterm exam PS 30 November 2012
Last name First name Student ID number Part 1 Midterm exam PS 30 November 2012 This is a closed book exam. The only thing you can take into this exam is yourself and writing instruments. No calculators,
More informationProblem 1. (15 points) Consider the so-called Cryptarithmetic problem shown below.
ECS 170 - Intro to Artificial Intelligence Suggested Solutions Mid-term Examination (100 points) Open textbook and open notes only Show your work clearly Winter 2003 Problem 1. (15 points) Consider the
More informationMITOCW R11. Principles of Algorithm Design
MITOCW R11. Principles of Algorithm Design The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources
More informationPermutations P-seuences n = 4 n = 5 n = 4 n =
Generating Alternating Permutations Lexicographically Bruce Bauslaugh and Frank Ruskey Department of Computer Science University of Victoria, Victoria, B.C. V8W 2Y2, Canada Abstract A permutation 1 2 n
More informationCheckpoint Questions Due Monday, October 7 at 2:15 PM Remaining Questions Due Friday, October 11 at 2:15 PM
CS13 Handout 8 Fall 13 October 4, 13 Problem Set This second problem set is all about induction and the sheer breadth of applications it entails. By the time you're done with this problem set, you will
More information