subject

Collaborative problem: you are some security analysts monitor a collection of networked computers, tracking the spread of an online virus. there are n computers in the system, labeled c1,c2 cn, and as input, you are given a collection of trace data indicating the times at which pairs of computers communicated. thus the data is a sequence of ordered triples (ci, cj, tk) such a triple indicates that ci and c, communicated at time tk. assume there are m triples total. now let us assume that the triples are presented to you in sorted order of time. for purposes of simplicity, we will assume that each pair of computers communicates at most once during the inter val you are observing. the security analysts you are working with would like to be able to answer questions of the following form: if the virus was inserted into computer ca at time r, could it pos- sibly have infected computer cb by time y? the mechanics of infection are simple if an infected computer ci communicates with an uninfected computer cj at time t (in other words, if one of the triples (ci, cj, tk) or (cj, ci, tk) appears in the trace data), then computer c, becomes infected as well, starting at time tk. infection can thus spread from one machine to another across a sequence of communications, provided that no step in this sequence involves a move backwards in time. thus, for example, if ci is infected by time tk and the trace data contains triples (ci, cj, tk) and (cj, ct), where tks tr, then c will become infected via cj. (note that it is okay for tk to be equal to tr. this would mean that c, had open connections to both ci and c at the same time, so a virus could move from ci to cq) for example, suppose 4, the trace data consists of the triples (c1,c2,4), (c2,c4,8) (cs, c4,8) (c1, c4, 12) and the virus was inserted into computer ci at time 2. then cs would be infected at time 8 by a sequence of three steps first c2 becomes infected at time 4, then c4 gets the virus from c2 at time 8, and then cs gets the virus from c4 at time 8.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 04:00
Acetylene is a gas which burns rapidly on its own, and is considered highly explosive. a) true b) false
Answers: 2
question
Computers and Technology, 23.06.2019 03:10
Fill in the following program so that it will correctly calculate the price of the orange juice the user is buying based on the buy one get one sale.#include //main functionint main() { int cartons; float price, total; //prompt user for input information printf("what is the cost of one container of oj in dollars? \n"); scanf(" [ select ] ["%d", "%c", "%f", "%lf"] ", & price); printf("how many containers are you buying? \n"); scanf(" [ select ] ["%d", "%c", "%f", "%lf"] ", & cartons); if ( [ select ] ["cartons / 2", "cartons % 1", "cartons % 2", "cartons % price", "cartons / price", "cartons / total"] [ select ] ["=", "==", "! =", "< =", "> =", "< "] 0) total = [ select ] ["price * cartons", "cartons * price / 2 + price", "(cartons / 2) * price", "cartons / (2.0 * price)", "(cartons / 2.0) * price + price", "((cartons / 2) * price) + price"] ; else total = ((cartons / 2) * price) + price; printf("the total cost is $%.2f.\n", total); return 0; }
Answers: 2
question
Computers and Technology, 23.06.2019 04:31
This graph compares the cost of room and board at educational institutions in texas.
Answers: 1
question
Computers and Technology, 23.06.2019 22:00
Jackson, who works in the finance department of a company, is holding a seminar for other employees on how to file taxes. only three employees sign up to attend the seminar. which device can he use to share his presentation with a group of three employees?
Answers: 1
You know the right answer?
Collaborative problem: you are some security analysts monitor a collection of networked computers,...
Questions
question
Chemistry, 29.11.2020 14:00
Questions on the website: 13722359