Assignment #3 Sept. 2014Yangjun Chen ACS-71021 Assignment #3 Due: Nov. 27, 2014 1.(20) Produce a stylesheet to transform the document shown in Fig. 1(a)

Slides:



Advertisements
Similar presentations
Indexing DNA Sequences Using q-Grams
Advertisements

Fig. 4-1, p Fig. 4-2, p. 109 Fig. 4-3, p. 110.
Transitive Closure Compression Jan. 2013Yangjun Chen ACS Outline: Transitive Closure Compression Motivation DAG decomposition into node-disjoint.
Peer-to-Peer Distributed Search. Peer-to-Peer Networks A pure peer-to-peer network is a collection of nodes or peers that: 1.Are autonomous: participants.
P.464. Table 13-1, p.465 Fig. 13-1, p.466 Fig. 13-2, p.467.
Core Labeling: A New Way to Compress Transitive Closure
Jan. 2013Dr. Yangjun Chen ACS Outline Signature Files - Signature for attribute values - Signature for records - Searching a signature file Signature.
Fig. 11-1, p p. 360 Fig. 11-2, p. 361 Fig. 11-3, p. 361.
Implementation of Graph Decomposition and Recursive Closures Graph Decomposition and Recursive Closures was published in 2003 by Professor Chen. The project.
6 - 1 § 6 The Searching Strategies e.g. satisfiability problem x1x1 x2x2 x3x3 FFF FFT FTF FTT TFF TFT TTF TTT.
DBS and the Internet Sept. 2014Yangjun Chen ACS Database Systems and Internet Architecture of a search engine PageRank for indentifying important.
Table 6-1, p Fig. 6-1, p. 162 p. 163 Fig. 6-2, p. 164.
Programming Language for XML Sept. 2014Yangjun Chen ACS Programming Languages for XML XPath XQuery Extensible StyleSheets Language (XSLT)
Assignment #2 Sept. 2014Yangjun Chen ACS (20) The following is a DTD for books. Please produce an XML document conforming to the DTD.
Routing algorithms, all distinct routes, ksp, max-flow, and network flow LPs W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 E.
Reachability Queries Sept. 2014Yangjun Chen ACS Outline: Reachability Query Evaluation What is reachability query? Reachability query evaluation.
Huffman Coding Draw the tree, label all nodes w/ index, leaves w/ letter and all links(0 or 1) What is the most frequent letter? What is the least frequent.
Recursive Graph Deduction and Reachability Queries Yangjun Chen Dept. Applied Computer Science, University of Winnipeg 515 Portage Ave. Winnipeg, Manitoba,
 Last lesson  Graphs  Today  Graphs (Implementation, Traversal)
4.2 Graphing linear equations Objective: Graph a linear equation using a table of values.
Introduction to Data Structures. About the document. The document is prepared by Prof. Shannon Bradshaw at Drew University. The key concepts in data structure.
Chapter 2 Graph Algorithms.
Publication Spider Wang Xuan 07/14/2006. What is publication spider Gathering publication pages Using focused crawling With the help of Search Engine.
MA/CSSE 473 Day 28 Dynamic Programming Binomial Coefficients Warshall's algorithm Student questions?
Test an Equation for Symmetry Graph Key Equations Section 1.2.
1 Outline:  Optimization of Timed Systems  TA-Modeling of Scheduling Tasks  Transformation of TA into Mixed-Integer Programs  Tree Search for TA using.
Foundations of Data Structures Practical Session #13 Graphs Algorithms.
Solve: 1. |x – 4| = 9 2.|7x – 2| = 5 3.|3x – 2| + 4 = 21 Write the inequality shown: WU 36.
3.7 Absolute value DAY 2. Solve for x----no notes on this slide (just watch). |x| = 5 |x + 2| = 5 x = 5 or x = -5 x + 2 = 5 or x + 2 = -5 x =
SECONDARY ONE 6.1b Solving Linear Systems by Graphing.
ACS-4902Assignment 4 due: April 03, (15) What is the shadow paging principle? Assume that a database contains 7 pages and during the execution of.
1Computer Sciences Department. 2 Advanced Design and Analysis Techniques TUTORIAL 7.
John Hamann Vickey Yeh Compression of Stereo Images.
Finding Regular Simple Paths Sept. 2013Yangjun Chen ACS Finding Regular Simple Paths in Graph Databases Basic definitions Regular paths Regular simple.
Huffman code and Lossless Decomposition Prof. Sin-Min Lee Department of Computer Science.
EXAMPLE 1 Solve a system graphically Graph the linear system and estimate the solution. Then check the solution algebraically. 4x + y = 8 2x – 3y = 18.
CHAPTER 13 GRAPH ALGORITHMS ACKNOWLEDGEMENT: THESE SLIDES ARE ADAPTED FROM SLIDES PROVIDED WITH DATA STRUCTURES AND ALGORITHMS IN C++, GOODRICH, TAMASSIA.
1.[10] Suppose we have 14 integers: 10, 100, 30, 130, 80, 50, 140, 20, 60, 70, 120, 40, 90, 110. Please create a 2-3 tree by inserting one integer at a.
Chapter 11. Chapter Summary  Introduction to trees (11.1)  Application of trees (11.2)  Tree traversal (11.3)  Spanning trees (11.4)
On the Intersection of Inverted Lists Yangjun Chen and Weixin Shen Dept. Applied Computer Science, University of Winnipeg 515 Portage Ave. Winnipeg, Manitoba,
CS 440 Database Management Systems Web Data Management 1.
Patterns, Equations and Graphs Wednesday Sept. 2, 2015 Algebra.
Algebra 1 Section 4.2 Graph linear equation using tables The solution to an equation in two variables is a set of ordered pairs that makes it true. Is.
Assignment #1 due Wed. Feb. 15, (15)
6-1 Linear Systems Goal: Solve a system of linear equations by graphing Eligible Content: A / A
Algebra 1 Section 6.5 Graph linear inequalities in two variables.
PageRank Random Surfers on the Web Transition Matrix of the Web Dead Ends and Spider Traps Topic-Specific PageRank Jeffrey D. Ullman Stanford University.
Lecture 13 review Explain how distance vector algorithm works.
Quiz Feb Inf. Search & CSP.
Outline: Transitive Closure Compression
Solve a system of linear equation in two variables
Warm Up #3 1. Evaluate 5x + 2y for x = 2 and y = –4. 2 ANSWER
CS 440 Database Management Systems
Linking data to straight-line graphs
Database Systems and Internet
Assignment #3 Due: April 03, 2017
(a) A university is organized into faculties.
6-1 Linear Systems Goal: Solve a system of linear equations by graphing Eligible Content: A / A
Assignment #2 Due: March 08, 2017
y x y = x + 2 y = x + 4 y = x – 1 y = -x – 3 y = 2x y = ½x y = 3x + 1
Functions and Their Graphs
Some graphs you may have met under different circumstances.
Compact routing schemes with improved stretch
WU 36 Solve: 1. |x – 4| = 9 |7x – 2| = 5 |3x – 2| + 4 = 21
Ch.4.8 Quadratic Functions Preview
Assignment #1 Due: Feb. 15, Apply the following algorithm to the B+-tree shown in Fig. 4 to store it in a data file. Trace the computation process.
Assignment #2 (Assignment due: Nov. 06, 2018) v1 v2 v3 v4 v5
Constraint Graph Binary CSPs
Equations With Two Variables pages
OSPF Protocol.
Presentation transcript:

Assignment #3 Sept. 2014Yangjun Chen ACS Assignment #3 Due: Nov. 27, (20) Produce a stylesheet to transform the document shown in Fig. 1(a) to a document shown in Fig. 1(b). Fay Wray Jeff Brideges Jessica Lange Kevin Bacon John Lithgow Sarah Jessica Parkr Fay Wray Jeff Brideges Jessica Lange Kevin Bacon John Lithgow Sarah Jessica Parkr (a) (b) Fig. 1

Assignment #3 Sept. 2014Yangjun Chen ACS (15) In Fig. 2, we show a network, in which each node stands for a page and each arc for a link from a page to another. Please give the transition matrix for the network. Also, explain why the solution to the equation: A = MA can be used as the estimation of page importance, where A is a vector of n variables and M is an n  n transition matrix. Fig

Assignment #3 Sept. 2014Yangjun Chen ACS (10) Explain why the following equation (for estimate the importance of pages) works in the presence of spider traps and dead ends. P new =  MP old + (1 -  )T A v 1 B v 8 v 2 B v 3 CB v 4 v 5 C v 6 C v 7 D (1, 1, 11, 1) (1, 2, 9, 2) (1, 10, 10, 2) (1, 3, 3, 3) (1, 4, 8, 3) (1, 5, 5, 4) (1, 7, 7, 4) (1, 6, 6, 4) T:T: 4. (20) Fig. 3 shows a tree encoding. The quadruples can be stored as a sequence sorted by LeftPos values by using the depth-first search. Design an algorithm to transform it into another sequence sorted by RightPos values. Fig. 3

Assignment #3 Sept. 2014Yangjun Chen ACS (15)In the following table, we show the key words of five documents, as well as the key word sequences sorted by frequencies. Please construct a trie for the sorted sequences and a header table for all the key words to speed up the evaluation of conjunctive queries of form word1  word2  …  wordi. Also, show how a conjunctive query is evaluated by using the trie. Fig. 4 DocIDItemsSorted item sequence 1f, a, c, i, j, m, pc, f, i, a, m, p, j 2a, b, c, h, fc, f, a, b, h 3b, i, ff, b, i 4b, c, ic, b, i 5a, f, c, m, pc, f, a, m, p

Assignment #3 Sept. 2014Yangjun Chen ACS (20)The following is a directed graph G. Please find a spanning tree of it and then label the nodes in the spanning tree by intervals. Also, construct an interval sequence for each node, which can be used to check the reachability queries with respect G. Fig. 5 a b d r h e f g i j c k p