Sonoma State University | ||
Algorithm Analysis
|
||
Instructor: Henry M. Walker
Lecturer, Sonoma State University |
Although CS 415 has been well developed for several years, last year the CS faculty made a significant, long-term curricular change regarding SSU's Upper Division GE Area B Requirement.
Historically, CS Majors could satisfy this requirement by taking CS 454, Theory of Computation, and CS 454 will continue in this role for the next several semesters.
At some time in the future (but not Spring 2025), CS 415, Algorithm Analysis, will allow students to satisfy SSU's Upper Division GE Area B Requirement.
During an anticipated time of transition:
For future semesters, students should check with the CS faculty regarding which course(s) (CS 415 and/or CS 454) will satisfy SSU's Upper Division GE Area B Requirement.
In place of an in-person class, you are to view three films online and answer the following questions regarding each film. (Each question asks you to state a conclusion. In each case, be sure to explain your reasoning behind the result, as well as stating the conclusion itself. Also, be sure that each of your responses is written in complete sentences, using careful English. In grading, expect consistent point deductions for sentence fragments–sequences of words without subjects or without verbs, or constructions with other grammatical errors.)
Film: Sorting Out Sorting, Dynamic Graphics Project, Computer Systems Research Group, University of Toronto, 1981.
Although this film is clearly dated (it is over 40 years old), it has become a classic, and it still provides a fine review of 9 different sorting algorithms and compares their efficiency in a direct way. After viewing this film, answer the following questions.
Film: Public Key Cryptography: RSA Encryption Algorithm, by the Khan Academy, July 30, 1012.
The RSA Encryption Algorithm depends upon mathematical properties of prime numbers and their products. This video outlines some of the history and motivation for this encryption algorithm and gives some simple examples about how it works in practice.
In answering the following questions, you need not delve into depth with the number theory that underlies RSA encryption—only a high-level understanding of number theory should be adequate.
Film: The era of blind faith in big data must end" by Cathy O'Neil, September 7, 2017. (Ted Talk)
This talk considers algorithms that arise from the collection of massive data sets—a field often called "Big Data". Behind the scenes, the algorithms largely involve extensive use of statistical methods. In practice, much of the mathematics is not made public, under the protection of corporate secrets as well as arguments related to the complexity of the mathematics. After viewing this film, answer the following questions/statements.
created December 30, 2022 revised December 30, 2022—January 3, 2023 updated October 29, 2024 |
|
For more information, please contact Henry M. Walker at walker@cs.grinnell.edu. |