Computer Science
Subforums
-
Discussion of computer problems
- 434 posts
3274 topics in this forum
-
I do not fully comprehend what a data structure "is." Are they the bounds in which computers act on in order to prevent computational confusion? Why do they exist? Why not just make everything abstract strings or use just a single data type? Does it have any relationships with sets in mathematics? Is there a relationship with and mathematics? What is the "use" and "function" of data structures? Thank you in advance for answering my questions. ok, so I believe that data structures act as a sort of "specialized cell" for information. In which they are processed differently in different possible sections of memory. However that does not answer what there relationsh…
-
0
Reputation Points
- 3 replies
- 1.4k views
- 1 follower
-
-
For the purpose of this question, a vector addition system (VAS) is a pair (v,A) such that such that A is a finite subset of ℤᵈ for some dimension d∈ℕ₊. (Sometimes an initial vector is considered a part of the definition; saying that a VAS is a pair (v,A) of finite set A⊆ℤᵈ and v∈ℤᵈ for some d∈ℕ₊ would be a valid alternative.) Consider the set of all such vector addition systems A (or (v,A) in the alternative formulation) such that for the dimension d of the VAS and all vectors a∈A we have ∑_{i ∈ dom a} aᵢ = 0 (here, dom a is the set of indexes of a, usually between 0 and d−1 or between 1 and d; the choice of the convention is not important). Does this set have an es…
-
0
Reputation Points
- 0 replies
- 880 views
- 1 follower
-
-
Hi, I am trying to apply PTAS on an algorithm. I think that we apply PTAS on the running time equation of the algorithm. We use the term (1-ϵ) and (1+ ϵ) in the running time of the algorithm but I don’t know how we insert these terms in the running time equation of the algorithm, and that’s what I want to understand. Also how we evaluate the value of ϵ. Let suppose we have a algorithm: M = K * Y Let’s the running time of algorithm is pseudo-polynomial i.e p(n) * K where k and p(n) are polynomial in n. Somebody please guide me. Zulfi.
-
0
Reputation Points
- 0 replies
- 808 views
-
-
Hi, I am trying to understand the set cover problem. I found the algorithm at: https://.mit.edu/~goemans/18434S06/setcover-tamara.pdf I found the example: Somebody please guide me how we evaluate the denominator |S-C|? Zulfi.
-
0
Reputation Points
- 1 reply
- 856 views
-
-
Hi, I am trying to understand the aging algorithm. I found the algorithm in the “Modern Operating Systems” book 4th Edition. I am able to understand the above but I can't understand the following: I can’t understand the following stuff: I think what it talks above happens in the row 0 which is my second figure, I have uploaded just the row correspond to Page 0: Somebody please guide me about the working of the algorithm according to the figure. Zulfi.
-
0
Reputation Points
- 1 reply
- 849 views
-
-
Hi, I am trying to understand the hardware implementation of LRU. I got its explanation from the following link: LRU implementation using a Matrix I can't understand can we use this technique to tell (i)which page has been evicted and (ii) which pages are in the memory I have attached its image: Somebody please guide me. Zulfi.
-
0
Reputation Points
- 2 replies
- 872 views
-
-
Hi, I am trying to find out the number of page faults. I have found an example question with solution: I am trying to solve it using LRU. The solution says that LRU would generate 14 page faults and optimal would generate 10 page fault. However I am getting 10 page fault. The solution is given below (sorry , I can't understand the solution): My solution is: 01232304523143263212. 0 0 0 0 4 5 1 4 6 1 1 1 3 3 3 3 3 3 3 2 2 2 2 2 2 2 2 My solution is working like optimal solution. Somebody please guide me what is the betw…
-
0
Reputation Points
- 0 replies
- 835 views
-
-
Hi, I was going through a solution and I found the above question with the answer: Is there a better answer for this? What I understand is that we are using a binary number system, that's why page sizes should be powers of 2. Somebody please guide me whether I am right or wrong? Zulfi.
-
0
Reputation Points
- 5 replies
- 5.4k views
-
-
Hi, I am trying to understand ILP for vertex cover. I have got following example: Some body please guide me how we this example is working? Zulfi.
-
0
Reputation Points
- 0 replies
- 743 views
-
-
Hi all, I'm stuck with this exercise for my Digital control module (image below). Can you help me solve it? Thanks
-
0
Reputation Points
- 0 replies
- 951 views
- 1 follower
-
-
Hi, I am trying to understand the FPTAS for the knapsack problem. I have got the following from wikepedia: I have following questions: (a)It shows two 2 ‘k’ symbols. I can’t understand the difference between them. (b)Why its dividing the value v_i with the value of ‘K’ which is a ratio of P/n multiply by epsilon (c)what is the significance of Epsilon? (d)why rounding would convert the problem into a polynomial time problem? Somebody please guide me. Zulfi.
-
0
Reputation Points
- 1 reply
- 889 views
-
-
Hi, I am trying to solve the following question: What is the CPU utilization if there are 5 processes running at the same time, and on average the CPU spends 30% of its time waiting on I/O completion? The formula is : What is P in this formula?: 1-P ^n I found a solution which finds the CPU utilization for each process separately. Can we do it in the following way: 1- (0.3)^5 = 0.9975 Is the above answer correct? Somebody please guide me. Zulfi.
-
0
Reputation Points
- 3 replies
- 3.6k views
-
-
Hello, I have a wireless Brother printer in a small network (PC, printer, tp-link router+access point). I can print without any problem. But I can't print to file. I have tried all combinations available ports and connections. How can I create a virtual printer capable of printing to file. I am stuck, I will appreciate your replies and inputs very much.
-
0
Reputation Points
- 1 reply
- 797 views
- 1 follower
-
-
Why i am unable to style paragraph tag which comes after image tag??i am trying to style my paragraph using external style sheet but i am unable to style paragraph which comes just after img tag Here is my html code.Its similar to my html code <html> <head> </head> <body> <p class="abc">sth</p> <p class="xyz">sth</p> <img src="sth.jpg> <p class="top">sth sth sth</p> </body> So,here i am able to style paragraph of class xyz and abc but i am unable to style paragraph of class top.Why's that?? Actually i want to style color:red; of that parag…
-
0
Reputation Points
- 27 replies
- 251.4k views
- 1 follower
-
-
Hi, I am trying to understand the following text. I can’t understand the term Summation of (j tj). Are we multiplying j and tj. But the text is not talking about multiplying, it says”Total processing time. Somebody please guide me. Zulfi. Hi, Thanks. Its not "j * tj" Zulfi. I got it. Zulfi.
-
0
Reputation Points
- 1 reply
- 751 views
-
-
Can't we edit code after running it??actually i have been writing programme using turbo c+ and i m unable to edit my code after running it.Is it bcoz of my processor or is that fact that we can't edit code after running it??
-
0
Reputation Points
- 5 replies
- 1.6k views
- 1 follower
-
-
Hi, I am having problem in understanding the following text of the book: If m = 1 then its possible to have 6 bins. All1/7 elements would go into 1 bin. All 6*1/3 items would go into 2 bins All 6 *1/2 items would go into 3 bins. Total = 6 bins It further says: Why First Fit would require 10 bins. I think First Fit would also require 6 bins. Somebody please guide me why First Fit would need 10 bins? Zulfi.
-
0
Reputation Points
- 10 replies
- 1.4k views
-
-
Hi, I am trying to understand the circuitry provided at: MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation The circuit is : Somebody please guide me what is the purpose of priority encoder in this circuit and how it works in the context of stable matching problem. Is it doing some encryption/ decryption? Zulfi.
-
0
Reputation Points
- 8 replies
- 1.4k views
-
-
someone a little of my info from armor games and I want to give the scammer a little poke.
-
0
Reputation Points
- 13 replies
- 2.4k views
-
-
When data is entered in computer,its actually stored in ram but actually is it dram or sram(cache memory)??or it depends upon type of computer??and also is cache memory type of sram or anything else??
-
0
Reputation Points
- 21 replies
- 3.2k views
- 2 followers
-
-
My previous laptop had Windows 10 Home pre-installed and that version was trash but this Windows 10 S has an even worse discrepancy, you cannot access apps that are part of the operating system until you "switch out your Windows at the Store". I tried to open regedit and the error message is "For security and performance, this mode of Windows only runs verified apps from the store." "Still want to run this unverified app? see how" You press "see how" and you get linked to the Microsoft store. Im trying to avoid linking to the web or activating wifi, in fact I was entering regedit to disable my wireless card. What a hypocrisy. (regedit is part of the windows ope…
-
0
Reputation Points
- 11 replies
- 2.2k views
- 1 follower
-
-
Hi, My question is pretty simple : If we center the outputs of our training set on 0 in a regression task by substracting the mean, do we need to use a bias parameter ? I ask this question because I'm using a Sparse Group Lasso model and I don't know how to introduce a bias parameter in it. Thanks in advance
-
0
Reputation Points
- 0 replies
- 689 views
-
-
Hi, I am reading the following paper: Toward Practical Secure Stable Matching: https://encrypto.de/papers/RSSSK17.pdf. According to the paper: and at other place: Somebody please provide me an example for this model i.e reducing from multiparty data into 2-party data. A very good link is: https://crypto.stackexchange.com/questions/11372/xor-secret-sharing-scheme Zulfi.
-
0
Reputation Points
- 0 replies
- 877 views
-
-
If someone, somehow have his own pixel on my site. When people visit a post on my site where a person has a pixel on, their IP addr can be intercepted by that person. I want that the person who is intercepting see only one IP addr for all unique visitors (thus the ip addr of my site and not their IP addr) for privacy reasons How can I configure this? Thanks
-
0
Reputation Points
- 6 replies
- 1.4k views
-
-
Hi, I am trying to write a program for selection sort. I got an example program: https://www.geeksforgeeks.org/selection-sort/ import random class SSSort: arr = [] # class var access by className.arr def __init__(self, n): self.n = n def generate1000_5digit_RandomNum(self): for i in range(self.n): num = random.randint(10000, 99999) SSSort.arr.append(num) for j in range(self.n): print("random {0}".format(SSSort.arr[j])) def find_the_min_element(self, i): min = i for j in range(i+1, self.n-1): if (SSSort.arr[j] < SSSort.arr[min]): min = j return SSSor…
-
0
Reputation Points
- 3 replies
- 1.1k views
-