subject

You’re some security analysts monitor a collection of networked computers, tracking the spread of an online virus. there are n computers in the system, call them c1,. you are given a trace indicating the times at which pairs of computers communicated. the trace consists of m triples (ci ,cj ,tk) that indicate that ci and cj communicated at time tk. at this time, a virus could have spread from ci to cj , or from cj to ci . we assume that the trace holds the triples sorted in order by time. for simplicity, we assume that each pair of computers communicates at most once over the time of the trace. also, it is possible to have pairs (cs ,cj ,tk) and (ct ,cj ,tk); this would indicate that cj opened connections to both cs and ct at time tk, allowing a virus to spread in any way among the 3 machines. there’s nothing special about 3 here – there might be 4 or 10 or however many connections open at the same time, allowing a virus to spread in any way among all of them. we would like to answer questions of the following form: if a virus was introduced at ci at time x, could it have spread to cj at time y? that is, is there a sequence of communications that could have led from the virus moving from ci to cj? design an algorithm that, given as input a collection of (sorted) trace data and a virus query, gives a yes/no answer for the query. the algorithm should run in time o(m+n).

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 00:40
If you arrive at the same time as another user straight across from you yield if a. they flash your headlights at you b. you can’t see their turn signals c. you’re going street and they’re running d. you’re turning they’re going straight plz
Answers: 1
question
Computers and Technology, 23.06.2019 08:00
Michael has written an e-mail to his employees that describes a new product special that will be introduced to the customers next week. by taking time to make sure the e-mail is well written, logical, and organized, michael has made sure his message has the characteristics of a) effective communicationb) ineffective communicationc) barriers to communicationd) workplace communication
Answers: 2
question
Computers and Technology, 23.06.2019 09:00
The first screen you see when you open word2016 what is called?
Answers: 1
question
Computers and Technology, 24.06.2019 02:30
How to apply the fly in effect to objects on a slide
Answers: 1
You know the right answer?
You’re some security analysts monitor a collection of networked computers, tracking the spread of a...
Questions
question
Mathematics, 16.05.2021 23:30
question
Mathematics, 16.05.2021 23:30
Questions on the website: 13722367