# Assignment 4: Greedy Approach Solution

\$30.00 \$26.40

Category:

## Description

1. You wish to drive from point A to point B along a highway minimizing the time that you are stopped for gas. You are told beforehand the capacity C of you gas tank in liters, your rate F of fuel consumption in liters/kilometer, the rate r in liters/minute at which you can ll your tank at a gas station, and the locations A = x1; ; B = xn of the gas stations along the highway. So if you stop to ll your tank from 2 liters to 8 liters, you would have to stop for 6=r minutes. Consider the following two algorithms:

1. Stop at every gas station, and ll the tank with just enough gas to make it to the next gas station.

1. Stop if and only if you don’t have enough gas to make it to the next gas station, and if you stop, ll the tank up all the way.

For each algorithm either prove or disprove that this algorithm correctly solves the problem.

Your proof of correctness must use an exchange argument.

1. Consider the following problem. The input is a collection A = fa1; ; ang of n points on the real line. The problem is to nd a minimum cardinality collection S of unit intervals that cover every point in A. Another way to think about this same problem is the following. You know a collection of times (A) that trains will arrive at a station. When a train arrives there must be someone manning the station. Due to union rules, each employee can work at most one hour at the station. The problem is to nd a scheduling of employees that covers all the times in A and uses the fewest number of employees.

1. Prove or disprove that the following algorithm correctly solves this problem. Let I be the interval that covers the most number of points in A. Add I to the solution set S. Then recursively continue on the points in A not covered by I.

1. Prove or disprove that the following algorithm correctly solves this problem. Let aj be the smallest (leftmost) point in A. Add the interval I = (aj; aj + 1) to the solution set S. Then recursively continue on the points in A not covered by I.

HINT: One of the above greedy algorithms is correct and one is incorrect for the other. The proof of correctness must use an exchange argument.

1. We consider a greedy algorithm for two related problems.

1. The input to this problem consists of an ordered list of n words. The length of the ith word is wi ,that is the ith word takes up wi spaces. (For simplicity assume that there are no spaces between words.) The goal is to break this ordered list of words into lines, this is called a layout. Note that you can not reorder the words. The length of a line

is the sum of the lengths of the words on that line. The ideal line length is L. No line may be longer than L, although it may be shorter. The penalty for having a line of length K is LK. The total penalty is the sum of the line penalties. The problem is to nd a layout that minimizes the total penalty. Prove of disprove that the following greedy algorithm correctly solves this problem.

For i= 1 to n

Place the ith word on the current line if it fits

else place the ith word on a new line.

1. The input to this problem consists of an ordered list of n words. The length of the ith word is wi , that is the ith word takes up wi spaces. (For simplicity assume that there are no spaces between words.) The goal is to break this ordered list of words into lines, this is called a layout. Note that you can not reorder the words. The length of a line is the sum of the lengths of the words on that line. The ideal line length is L. No line may be longer than L, although it may be shorter. The penalty for having a line of length K is LK. total penalty is the maximum of the line penalties. The problem is to nd a layout that minimizes the total penalty. Prove of disprove that the following greedy algorithm correctly solves this problem.

For i= 1 to n

Place the ith word on the current line if it fits else place the ith word on a new line

HINT: The greedy algorithm is correct for one of the above two problems and is incorrect for the other.The proof of correctness must be done using an exchange argument.

1. Consider the following problem. The input consists of n skiers with heights p1; ; pn , and n skies with heights s1; ; sn. The problem is to assign each skier a ski to to minimize the average di erence between the height of a skier and his/her assigned ski. That is, if the ith skier is given the (i)th ski, then you want to minimize:

• Pn jpi s (i)j n i=1

1. Consider the following greedy algorithm. Find the skier and ski whose height di erence is minimized. Assign this skier this ski. Repeat the process until every skier has a ski. Prove of disprove that this algorithm is correct.

1. Consider the following greedy algorithm. Give the shortest skier the shortest ski, give the second shortest skier the second shortest ski, give the third shortest skier the third shortest ski, etc.Prove of disprove that this algorithm is correct.

HINT: One of the above greedy algorithms is correct and one is incorrect for the other. The proof of correctness must be done using an exchange argument.

Page 2

5. We consider the following scheduling problem:

INPUT: A collection of jobs J1; ; Jn. The size of job Ji is xi, which is a non-negative integer. An integer m.

OUTPUT: A nonpreemptive feasible schedule for these jobs on m processor that minimizes the total n completion time Pni=1 Ci .

A schedule speci es for each unit time interval and for each processor, the unique job that that is run during that time interval on that processor. In a feasible schedule, every job Ji has to be run for exactly xi time units after time 0. In a nonpreemptive schedule, once a job starts running on a particular processor, it has to be run to completion on that particular processor. The completion time Ci for job Ji is the earliest time when Ji has been run for xi time units. So for example if m = 2 jobs of size 1; 4; 3 are run in that order on the rst processor, and jobs of size 7; 10 are run on the second processor in that order, then the total completion time would be 1 + 5 + 8 + 7 + 17 = 38.

Give a greedy algorithm for this problem and prove that it is correct.

6. Consider the following problem.

INPUT: Positive integers r1; ; rn and c1; ; cn .

OUTPUT: An n by n matrix A with 0=1 entries such that for all i the sum of the ith row in A is ri and the sum of the ith column in A is ci , if such a matrix exists.

Think of the problem this way. You want to put pawns on an n by n chessboard so that the ith row has ri pawns and the ith column has ci pawns.

Consider the following greedy algorithm that constructs A row by row. Assume that the rst i-1 rows have been constructed. Let aj be the number of 10s in the jth column in the rst i-1 rows. Now the ri columns with with maximum cj-aj are assigned 1’s in row i, and the rest of the columns are assigned 00s. That is, the columns that still needs the most 1’s are given 1’s. Formally prove that this algorithm is correct using an exchange argument.

1. Consider the following bridge crossing problem where n people with speeds s1; ; sn wish to cross the bridge as quickly as possible. The rules remain:

It is nighttime and you only have one ashlight.

A maximum of two people can cross at any one time

Any party who crosses, either 1 or 2 people must have the ashlight with them. The ashlight must be walked back and forth, it cannot be thrown, etc.

A pair must walk together at the rate of the slower person’s pace.

Give an e cient algorithm to nd the fastest way to get a group of people across the bridge.

You must have a proof of correctness for your method.

Page 3

1. The GreedySchedule algorithm we described for the class scheduling problem is not the only greedy strategy we could have tried. For each of the following alternative greedy strategies, either prove that the resulting algorithm always constructs an optimal schedule, or describe a small input example for which the algorithm does not produce an optimal schedule. Assume that all algorithms break ties arbitrarily (that is, in a manner that is completely out of your control). [Hint: Three of these algorithms are actually correct.]

1. Choose the course x that ends last, discard classes that con ict with x, and recurse.

1. Choose the course x that starts rst, discard all classes that con ict with x, and recurse.

1. Choose the course x that starts last, discard all classes that con ict with x, and recurse.

1. Choose the course x with shortest duration, discard all classes that con ict with x, and recurse.

1. Choose a course x that con icts with the fewest other courses, discard all classes that con ict with x, and recurse.

1. If no classes con ict, choose them all. Otherwise, discard the course with longest duration and recurse.

1. If no classes con ict, choose them all. Otherwise, discard a course that con icts with the most other courses and recurse.

1. Let x be the class with the earliest start time, and let y be the class with the second earliest start time.

If x and y are disjoint, choose x and recurse on everything but x. If x completely contains y, discard x and recurse.

1. If any course x completely contains another course, discard x and recurse. Oth-erwise, choose the course y that ends last, discard all classes that con ict with y, and recurse.

1. Let X be a set of n intervals on the real line. We say that a subset of intervals Y X covers X if the union of all intervals in Y is equal to the union of all intervals in X. The size of a cover is just the number of intervals. Describe and analyze an e cient algorithm to compute the smallest cover of X. Assume that your input consists of two arrays L[1 .. n] and R[1 .. n], representing the left and right endpoints of the intervals in X. If you use a greedy algorithm, you must prove that it is correct. Page 4

1. Let X be a set of n intervals on the real line. We say that a set P of points stabs X if every interval in X contains at least one point in P. Describe and analyze an e cient algorithm to compute the smallest set of points that stabs X. Assume that your input consists of two arrays L[1 .. n] and R[1 .. n], representing the left and right endpoints of the intervals in X. As usual, If you use a greedy algorithm, you must prove that it is correct. 1. Let X be a set of n intervals on the real line. A proper coloring of X assigns a color to each interval, so that any two overlapping intervals are assigned di erent colors. Describe and analyze an e cient algorithm to compute the minimum number of colors needed to properly color X. Assume that your input consists of two arrays L[1 .. n] and R[1 .. n], representing the left and right endpoints of the intervals in X. As usual, if you use a greedy algorithm, you must prove that it is correct. 1. Hu man Coding:

1. For every integer n, nd a frequency array f[1 .. n] whose Hu man code tree has depth n-1, such that the largest frequency is as small as possible.

1. Suppose the total length N of the unencoded message is bounded by a polynomial in the alphabet size n. Prove that the any Hu man tree for the frequencies f[1 .. n] has depth O(log n).

1. Call a frequency array f [1 .. n] -heavy if it satis es two conditions:

f  > f [i] for all i > 1; that is, 1 is the unique most frequent symbol.

f  Pn f[i] ; that is, at least an fraction of the symbols are 1s.

i=1

Page 5

Find the largest real number such that in every Hu man code for every -heavy fre-quency array, symbol 1 is represented by a single bit. [Hint: First prove that 1/3 1/2.]

1. You’ve been hired to store a sequence of n books on shelves in a library. The order of the books is xed by the cataloging system and cannot be changed; each shelf must store a contiguous interval of the given sequence of books. You are given two arrays H[1 .. n] and T[1 .. n], where H[i] and T[i] are respectively the height and thickness of the ith book in the sequence. All shelves in this library have the same length L; the total thickness of all books on any single shelf cannot exceed L.

1. Suppose all the books have the same height h and the shelves have height larger than h, so every book ts on every shelf. Describe and analyze a greedy algorithm to store the books in as few shelves as possible. [Hint: The algorithm is obvious, but why is it correct?]

1. That was a nice warmup, but now here’s the real problem. In fact the books have di erent heights, but you can adjust the height of each shelf to match the tallest book on that shelf. (In particular, you can change the height of any empty shelf to zero.) Now your task is to store the books so that the sum of the heights of the shelves is as small as possible. Show that your greedy algorithm from part (a) does not always give the best solution to this problem.

1. Describe and analyze an algorithm to nd the best matching between books and shelves as described in part (b).

1. A string w of parentheses ( and ) is balanced if it satis es one of the following conditions:

w is the empty string.

w = (x) for some balanced string x

w = x y for some balanced strings x and y

For example, the string w = ((())()())(()())() is balanced, because w = x y, where x = ((())()()) and y = (()())().

1. Describe and analyze an algorithm to determine whether a given string of parentheses is balanced.

1. Describe and analyze a greedy algorithm to compute the length of a longest balanced subsequence of a given string of parentheses. As usual, don’t forget to prove your algorithm is correct. For both problems, your input is an array w[1 .. n], where for each i, either w[i] = ( or w[i] = ). Both of your algorithms should run in O(n) time.

1. One day Alex got tired of climbing in a gym and decided to take a large group of climber friends outside to climb. They went to a climbing area with a huge wide boulder, not very

Page 6

tall, with several marked hand and foot holds. Alex quickly determined an \allowed” set of moves that her group of friends can perform to get from one hold to another.

The overall system of holds can be described by a rooted tree T with n vertices, where each vertex corresponds to a hold and each edge corresponds to an allowed move between holds. The climbing paths converge as they go up the boulder, leading to a unique hold at the summit, represented by the root of T.

Alex and her friends (who are all excellent climbers) decided to play a game, where as many climbers as possible are simultaneously on the boulder and each climber needs to perform a sequence of exactly k moves. Each climber can choose an arbitrary hold to start from, and all moves must move away from the ground. Thus, each climber traces out a path of k edges in the tree T, all directed toward the root. However, no two climbers are allowed to touch the same hold; the paths followed by di erent climbers cannot intersect at all.

1. Describe and analyze a greedy algorithm to compute the maximum number of climbers that can play this game. Your algorithm is given a rooted tree T and an integer k as input, and it should compute the largest possible number of disjoint paths in T, where each path has length k. Do not assume that T is a binary tree. For example, given the tree below as input, your algorithm should return the integer 8.

1. Now suppose each vertex in T has an associated reward, and your goal is to maximize the total reward of the vertices in your paths, instead of the total number of paths. Show that your greedy algorithm does not always return the optimal reward. (

1. Describe an e cient algorithm to compute the maximum possible reward, as described in part (b). 1. We use Hu man’s algorithm to obtain an encoding of alphabet fa, b, cg with frequencies fa; fb; fc. In each of the following cases, either give an example of frequencies (fa; fb; fc) that

Page 7

would yield the speci ed code, or explain why the code cannot possibly be obtained (no matter what the frequencies are).

1. Code: f0, 10, 11g

1. Code: f0, 1, 00g

1. Code: f10, 01, 00g

1. Prove the following two properties of the Hu man encoding scheme.

1. If some character occurs with frequency more than 2/5, then there is guaranteed to be a codeword of length 1.

1. If all characters occur with frequency less than 1/3, then there is guaranteed to be no codeword of length 1.

1. Under a Hu man encoding of n symbols with frequencies f1; f2; :::; fn, what is the longest a codeword could possibly be? Give an example set of frequencies that would produce this case.

1. A feedback edge set of an undirected graph G = (V, E) is a subset of edges E’ E that intersects every cycle of the graph. Thus, removing the edges E’ will render the graph acyclic. Give an e cient algorithm for the following problem:

Input: Undirected graph G = (V, E) with positive edge weights we.

P

Output: A feedback edge set E’ E of minimum total weigth e2E0 we.

1. You are given a graph G = (V, E) with positive edge weights, and a minimum spanning tree T = (V, E’) with respect to these weights; you may assume G and T are given as adjacency lists. Now suppose the weight of a particular edge e 2 E is modi ed from w(e) to a new value w(e)^. You wish to quickly update the minimum spanning tree T to re ect this change, without recomputing the entire tree from scratch. There are four cases. In each case give a linear-time algorithm for updating the tree.

1. e 2= E’ and w(e)^ > w(e).

1. e 2= E’ and w(e)^ < w(e).

1. e 2 E’ and w(e)^ < w(e).

1. e 2 E’ and w(e)^ > w(e).

1. Graphs with prescribed degree sequences. Given a list of n positive integers d1; d2; :::; dn, we want to e ciently determine whether there exists an undirected graph G = (V, E) whose nodes have degrees precisely d1; d2; :::; dn. That is, if V = fv1; :::; vng, then the degree of vi should be exactly di. We call (d1; :::; dn) the degree sequence of G. This graph G should not contain self-loops (edges with both endpoints equal to the same node) or multiple edges between the same pair of nodes.

Page 8

1. Give an example of d1; d2; :::; dn where all the di 3 and d1 + d2 + d3 + d4 is even, but for which no graph with degree sequence (d1; d2; d3; d4) exists.

1. Suppose that d1 d2 ::: dn and that there exists a graph G = (V, E) with degree sequence (d1; d2; :::; dn). We want to show that there must exist a graph that has this degree sequence and where in addition the neighbors of v1 are v2; v3; :::; vd1+1. The idea is to gradually transform G into a graph with the desired additional property.

1. Suppose the neighbors of v1 in G are not v2; v3; :::; vd1+1. Show that there exists i < j n and u 2 V such that fv1; vig, fu; vjg 2= E and fv1; vjg, fu; vig 2 E.

1. Specify the changes you would make to G to obtain a new graph G’ = (V, E’) with the same degree sequence as G and where (v1; vi) 2 E’.

1. Now show that there must be a graph with the given degree sequence but in which v1 has neighbors v2; v3; :::; vd1+1.

1. Using the result from part (b), describe an algorithm that on input d1; d2; :::; dn (not necessarily sorted) decides whether there exists a graph with this degree sequence. Your algorithm should run in time polynomial in n.

1. The following statements may or may not be correct. In each case, either prove it (if it is correct) or give a counter example (if it isn’t correct). Always assume that the graph G = (V, E) is undirected. Do not assume that edge weights are distinct unless this is speci cally stated.

1. If graph G has more than jV j -1 edges, and there is a unique heaviest edge, then this edge cannot be part of a minimum spanning tree.

1. If G has a cycle with a unique heaviest edge e, then e cannot be part of any MST.

1. Let e be any edge of minimum weight in G. Then e must be part of some MST.

1. If the lightest edge in a graph is unique, then it must be part of every MST.

1. If e is part of some MST of G, then it must be a lightest edge across some cut of G.

1. If G has a cycle with a unique lightest edge e, then e must be part of every MST.

1. The shortest-path tree computed by Dijkstra’s algorithm is necessarily an MST.

1. The shortest path between two nodes is necessarily part of some MST.

1. Prim’s algorithm works correctly when there are negative edges.

1. (For any r > 0, de ne an r-path to be a path whose edges all have weight < r.) If G contains an r-path from node s to t, then every MST of G must also contain an r-path from node s to node t.

1. Give an algorithm that takes as input a directed graph with positive edge lengths, and returns the length of the shortest cycle in the graph (if the graph is acyclic, it should say so). Your algorithm should take time at most O(jV j3).

Page 9

25. Give an O(jV j2) algorithm for the following task.

Input: An undirected graph G = (V, E); edge lengths le > 0; an edge e 2 E.

Output: The length of the shortest cycle containing edge e.

1. You are given a set of cities, along with the pattern of highways between them, in the form of an undirected graph G = (V, E). Each stretch of highway e 2 E connects two of the cities, and you know its length in miles, le. You want to get from city s to city t. There’s one problem: your car can only hold enough gas to cover L miles. There are gas stations in each city, but not between cities. Therefore, you can only take a route if every one of its edges has length le L.

1. Given the limitation on your car’s fuel tank capacity, show how to determine in linear time whether there is a feasible route from s to t.

1. You are now planning to buy a new car, and you want to know the minimum fuel tank capacity that is needed to travel from s to t. Give an O((jV j + jEj )log jV j ) algorithm to determine this.

1. Shortest paths are not always unique: sometimes there are two or more di erent paths

with the minimum possible length. Show how to solve the following problem in O(( jV j + jEj ) log jV j ) time.

Input: An undirected graph G = (V, E); edge lengths le > 0; starting vertex s 2S .

Output: A Boolean array usp[ ]: for each node u, the entry usp[u] should be true if and

only if there is a unique shortest path from s to u. (Note: usp[s] = true.)

1. In cases where there are several di erent shortest paths between two nodes (and edges have varying lengths), the most convenient of these paths is often the one with fewest edges. For instance, if nodes represent cities and edge lengths represent costs of ying between cities, there might be many ways to get from city s to city t which all have the same cost. The most convenient of these alternatives is the one which involves the fewest stopovers. Accordingly, for a speci c starting node s, de ne

best[u] = minimum number of edges in a shortest path from s to u.

In the example below, the best values for nodes S, A, B, C, D, E, F are 0, 1, 1, 1, 2, 2, 3, respectively.

Page 10 Give an e cient algorithm for the following problem.

Input: Graph G = (V, E); positive edge lengths le; starting node s 2 V .

Output: The values of best[u] should be set for all nodes ujinV .

1. Generalized shortest-paths problem. In Internet routing, there are delays on lines but also, more signi cantly, delays at routers. This motivates a generalized shortest-paths problem. Suppose that in addition to having edge lengths fle : e 2 Eg, a graph also has vertex costs fcv : v 2 V g. Now de ne the cost of a path to be the sum of its edge lengths, plus the costs of all vertices on the path (including the endpoints). Give an e cient algorithm for the following problem.

Input: A directed graph G = (V, E); positive edge lengths le and positive vertex costs cv; a starting vertex s 2 V .

Output: An array cost[ ] such that for every vertex u, cost[u] is the least cost of any path from s to u (i.e., the cost of the cheapest path), under the de nition above. Notice that cost[s] = cs.

1. Which of the following claims are true and which are false? Justify your answer by giving a proof or by constructing a counterexample.

1. If all arcs in a network have di erent costs, the network has a unique shortest path tree.

1. In a directed network with positive arc lengths, if we eliminate the direction on every arc (i.e., make it undirected), the shortest path distances will not change.

1. In a shortest path problem, if each arc length increases by k units, shortest path dis-tances increase by a mUltiple of k.

1. In a shortest path problem, if each arc length decreases by k units, shortest path distances decrease by a mUltiple of k.

1. Among all shortest paths in a network, Dijkstra’s algorithm always nds a shortest path with the least number of arcs.

1. Most vital arc problem. A vital arc of a network is an arc whose removal from the network causes the shortest distance between two speci ed nodes, say node s and node t, to increase. A most vital arc is a vital arc whose removal yields the greatest increase in the shortest distance from node s to node t. Assume that the network is directed, arc lengths

Page 11

are positive, and some arc is vital. Prove that the following statements are true or show through counterexamples that they are false.

1. A most vital arc is an arc with the maximum value of Cij.

1. A most vital arc is an arc with the maximum value of Cij on some shortest path from node s to node t.

1. An arc that does not belong to any shortest path from node s to node t cannot be a most vital arc.

1. A network might contain several most vital arcs.

1. Describe an algorithm for determining a most vital arc in a directed network. What is the running time of your algorithm?

1. Maximum capacity path problem. Let Cij 0 denote the capacity of an arc in a given network. De ne the capacity of a directed path P as the minimum arc capacity in P. The maximum capacity path problem is to determine a maximum capacity path from a speci ed source node s to every other node in the network. Modify Dijkstra’s algorithm so that it solves the maximum capacity path problem. Justify your algorithm.

1. Suppose that the Floyd-Warshall algorithm terminates after detecting the presence of a negative cycle. At this time, how would you detect a negative cycle using the predecessor indices?

1. In an all-pairs shortest path problem, suppose that several shortest paths connect node i and node j. If we use the Floyd-Warshall algorithm to solve this problem, which path will the algorithm choose? Will this path be the one with the least number of arcs?

1. Show that if we use the Floyd-Warshall algorithm to solve the all-pairs shortest path problem in a network containing a negative cycle, then at some stage dk[i; i] < 0 for some node i. [Hint: Let i be the least indexed node satisfying the property that the network contains a negative cycle using only nodes 1 through i (not necessarily all of these nodes).]

1. Suppose that a network G contains no negative cycle. Let dn+1(i; j) denote the node pair distances at the end of the Floyd-Warshall algorithm, when the network is initialized

with d[i; i] = 1 instead of d[i; i] = 0 for all i .Show that minfdn+1[i; i] : 1 i ng is the minimum length of a directed cycle in G.

1. Sensitivity analysis. Let dij denote the shortest path distances between the pair [i; j] of nodes in a directed network G = (N, A) with arc lengths dij. Suppose that the length of one arc (p; q) changes to value c0pq < cpq. Show that the following set of statements nds the modi ed all-pairs shortest path distances:

Page 12

if dqp + c0pq < 0, then the network has a negative cycle else

for each pair [i, j] of nodes do

dij := minfdij; dip + c0pq + dqjg;

1. In question 38 we described an O(n2) method for updating shortest path distances between all-pairs of nodes when we decrease the length of one arc (p; q). Suppose that we increase the length of the arc (p; q). Can you modify the method so that it reoptimizes the shortest path distances in O(n2) time? If your answer is yes, specify an algorithm for performing the reoptimization and provide a justi cation for it; and if your answer is no, outline the di culties encountered.

1. Arc addition. After solving an all-pairs shortest path problem, you realize that you omitted ve arcs from the network G. Can you reoptimize the shortest path distances with the addition of these arcs in O(n2) time? (Hint: Reduce this problem to the one in question 38.)

Page 13