1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
4 years ago
9

Suppose you wish to develop a matrix-multiplication algorithm that is asymptotically faster than Strassen’s algorithm. Your algo

rithm will use divide-and-conquer, dividing each matrix into pieces of size n/8 × n/8, and the divide and combine steps together will take Θ(n2) time. You need to determine how many subproblems your algorithm has to create in order to beat Strassen’s algorithm. If your algorithm creates a subproblems, what is the largest integer value of a for which your algorithm would be asymptotically faster than Strassen’s algorithm?
Computers and Technology
1 answer:
Kazeer [188]4 years ago
5 0

Answer:

The number of subproblems are given as T(n)=a*T(n/8)+\theta(n^2) while the value of T(n) to be less than S(n) is for 342.

Explanation:

The number of subproblems are given as

T(n)=a*T(n/8)+\theta(n^2)

Asymptotic running time for Strassen’s algorithm is S(n)=\theta(n^{log(7)})

Now, when a increases, number of subproblems determines the asymptotic running time of the problem and case 1 of master theorem applies. So, in worst case, asymptotic running time of the algorithm will be

T(n)=\theta(n^{logb(a)})=\theta(n^{log8(a)})=\theta(n^{log_{2}(a^{1/3})})

Now, for T(n) to be smaller than S(n)

n^{loga^{1/3}}

So,

log(a^{(1/3)})

So,

a=342

You might be interested in
In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for
Alex787 [66]

Answer:

False

Explanation:

If your server has been hacked, accessed by Remote access domain, these are tips or recommendations:

- Disable the Remote Desktop service on the affected computer and close port 3389 on the router so that your server is not accessible by Remote Desktop from the Internet, as another hacker can re-access and encrypt more files or encrypt over those already encrypted. .

- Ensure that the virus is not active, to do this place some files to see if they are encrypted or not.

- Scan the server with an updated antivirus.

- Open Task Manager, view active processes, and end the encryption process, which is usually Payload.exe

- Change the passwords of all users of the computer.

- Install a good paid antivirus, we recommend these:

- Configure the antivirus with password protection, so hackers cannot uninstall or deactivate it.

- You can use a desktop blocking program such as Eusing Maze Lock.

- Use a network firewall and VPN connection to remotely access the computer.

- Never use direct connection by Remote Desktop without VPN.

- Set up an online backup or an appropriate backup policy.

6 0
3 years ago
True or False
sineoko [7]

Answer:

VPNs encrypt your traffic while proxy servers don't.

Explanation:

8 0
3 years ago
Q.No.3. A filling station (gas station) is to be set up for fully automated operation. Drivers swipe their credit card through a
scZoUnD [109]

Answer:

Following are the 5 problems, that can arise in this scenario:

Explanation:

  • When the driver swipes its credit or debit card, its connection with both the card company could not be formed due to the poor or ineffective development, therefore the driver may not put any fuel from its vehicle.  
  • It still wants to spend energy even after the card is read as incorrect.  
  • So, its total price to just be debited from the credit or debit card shall be much more and less than the real cost as well as the deduction of both the fuel should be overestimated.  
  • Its information may not adjust when a driver uses its device because the next driver could no matter how long only use the device.
  • Its fuel limit to also be established when the vehicle has stopped its card would be faulty as well as a certain restriction would not cause its device to be misused.
3 0
3 years ago
Mikaya works in the planning department
Sonja [21]

Answer:

I don't understand need more information mate.

Explanation:

5 0
3 years ago
Read 2 more answers
Quick SearchLinks to an external site. lets you refine or narrow your search results using links on the right side of the screen
nikdorinn [45]

Answer:

Answer is

By topic, By collection.

Refer below.

Explanation:

Quick SearchLinks to an external site. lets you refine or narrow your search results using links on the right side of the screen. Do a search on wind power. Some criteria that can refine your search results in Quick Search are:

By topic

By collection

5 0
3 years ago
Other questions:
  • Branching is so called because <br>​
    5·2 answers
  • printStars is a method that accepts a single int argument and returns no value. It prints as many stars as indicated by its argu
    9·1 answer
  • Write a short java method that takes an integer n and returns the sum of all the odd positive integers less than or equal to n.
    5·1 answer
  • When converting the relationships to the relational model and the database schema, it is possible that some of the relationships
    15·1 answer
  • A_____ handles all the instructions that it received from hardware and software which are available on the computer ​
    10·1 answer
  • Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using the adaptive tree walk protocol
    7·1 answer
  • List and briefly explain four common template elements
    6·1 answer
  • The physical parts of a computer are called application software.
    9·2 answers
  • You want to purchase a computer, and the salesperson refers to separate pricing for a system unit and for the software applicati
    9·1 answer
  • Write a program that allows the user to enter three separate strings: a city name, a state name, and a ZIP code.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!