CS 415, Section 001 | Sonoma State University | Spring, 2023 |
Algorithm Analysis
|
||
Instructor: Henry M. Walker
Lecturer, Sonoma State University |
Although much of this course is well developed, some details can be
expected to evolve as the semester progresses.
Any changes in course details will be announced promptly during class.
This assignment contains two regular problems plus an additional option for extra credit. Completion of the extra credit option may yield up to 20 extra credit points (credited toward assignments).
For this exercise, you are to view a film online and answer several questions. Each question asks you to state a conclusion. In each case, be sure to explain your reasoning behind the result, as well as stating the conclusion itself. Also, be sure that each of your responses is written in complete sentences, using careful English. In grading, expect consistent point deductions for sentence fragments–sequences of words without subjects or without verbs, or constructions with other grammatical errors.
Film: Public Key Cryptography: RSA Encryption Algorithm, by the Khan Academy, July 30, 1012.
The RSA Encryption Algorithm depends upon mathematical properties of prime numbers and their products. This video outlines some of the history and motivation for this encryption algorithm and gives some simple examples about how it works in practice.
These exercises encourage you to take a high-level view of several algorithms discussed in this course.
Many computing applications require the addition of a long sequence of numbers: a1, a2, a3, . . . an, where these numbers get smaller as the index increases. That is,
To obtain the best accuracy in the final sum, which of the following approaches should be followed (and why)?
To what extent, if any, do the following algorithms fit within the category of greedy algorithms?
The only known solutions to the Traveling Salesperson Problem (TSP) have a run time that is worse than any polynomial—that is, their run time is exponential or factorial or worse, or they do not solve a complete version of TSP. In particular, neither the branch-and-bound algorithm nor the twice-around-the-tree algorithm always run in polynomial-time to fully solve TSP.
Film: The era of blind faith in big data must end" by Cathy O'Neil, September 7, 2017. (Ted Talk)
This talk considers algorithms that arise from the collection of massive data sets—a field often called "Big Data". Behind the scenes, the algorithms largely involve extensive use of statistical methods. In practice, much of the mathematics is not made public, under the protection of corporate secrets as well as arguments related to the complexity of the mathematics. After viewing this film, answer the following questions/statements.
created December 30, 2022 revised December 30, 2022—January 3, 2023 substantially reworked Summer 2023 revised January 15, 2024 revised April 29, 2024 |
|
For more information, please contact Henry M. Walker at walker@cs.grinnell.edu. |