91精品国产91久久久久久_国产精品二区一区二区aⅴ污介绍_一本久久a久久精品vr综合_亚洲视频一区二区三区

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

代寫CS/INFO 6850 代做信息網(wǎng)絡(luò)結(jié)構(gòu)程序
代寫CS/INFO 6850 代做信息網(wǎng)絡(luò)結(jié)構(gòu)程序

時(shí)間:2024-09-14  來源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯(cuò)


The Structure of Information Networks

Homework 1

CS/INFO 6850 Fall 2024

Due 6pm, Wednesday, Sept. 18, 2024

The goal of this problem set is to provide practice implementing some basic network analysis techniques on a moderate-sized network dataset — specifically, a coauthorship network con-structed from a bibliography file of computer science papers maintained by Joel Seiferas at the University of Rochester. To make sure that the bibliography file is easy to obtain, a copy of it is has been posted on Canvas as the file “ps1data.txt”. As a first step, we will only be using papers written between the years 1985 and 2005 inclusive, so you should only keep lines in the file corresponding to papers written in this interval.

Building the coauthorship network. Here are some instructions on how to create the coau-thorship network from the raw bibliography. The short explanation is: each line represents a paper, and we want to build the undirected graph whose nodes are the people named in the bibliography, and whose edges join those pairs of people who’ve coauthored a paper in the bib-liography. This graph should only be constructed using papers written between the years 1985 and 2005 inclusive.

The more detailed instructions now follow. Each line in the bibliography describes a distinct paper, and has the following format:

year [number] conference/journal author & author & ... & author, title

Here, conference/journal is an acronym encoding the conference or journal where the paper appeared, year is the year of the paper, and number is the volume number of the journal or conference. We write number in brackets above because it is present in some lines and (when it is not known or not applicable) absent in others. Authors are given by last name only, and separated by the & symbol. The list of authors ends with a comma, and the the remainder of the line is the title. Thus, a sample line from the file is

1994 11 ALGRTHMICA Khuller & Naor, Flow in Planar Graphs with Vertex Capacities

encoding the paper “Flow in Planar Graphs with Vertex Capacities” by Khuller and Naor in Volume 11 of the journal Algorithmica. Finally (as with any list of records of this length), it is possible that a few of the lines in the file are misformatted.

You should start by only keeping lines for which the year is in the interval [1985, 2005] (including the two endpoints 1985 and 2005). From this set of lines, you should construct a coauthorship network as follows.

• There should be one node for each person. (Note that even if a person is an author on 50 of the papers listed in the bibliography file, there should still just be one node corresponding to him or her, not 50.)

• There should be an undirected edge between nodes A and B if and only if they are coauthors on a paper in the bibliography. (If they are coauthors on multiple papers, there should still just be a single edge joining them.)

For example, if the file consisted of just the three lines

1992 27 BAMS Alon & Kleitman, Piercing Convex Sets

1994 11 ALGRTHMICA Khuller & Naor, Flow in Planar Graphs with Vertex Capacities

1996 45 IEEETC Azar & Naor & Rom, Routing Strategies for Fast Networks

then the graph should have node set

{Alon, Azar, Khuller, Kleitman, N aor, Rom}

and edge set

{(Alon, Kleitman),(Azar, N aor),(Azar, Rom),(N aor, Rom),(Khuller, N aor)}.

Caveats. Before we move on to the problems themselves, here are three points worth mention-ing about the network we’re studying here.

(i) As we’ll see at various points in the course, coauthorship networks are a popular kind of “model system” for large-scale network analysis. This is not so much because there’s universal fascination with the coauthoring habits of scientists (though it’s an interesting topic that some people study as their research area), but because coauthorship networks are a kind of social network, encoding a particular type of collaboration among people, for which extremely rich and detailed data is available. As a result, it is a chance to try out network analysis techniques at very high resolution, in a setting that possesses many of the properties exhibited by much “messier” and harder-to-measure social networks as well.

(ii) Any time one tries to build a network from a file containing a list of names, there’s the concern that different people can have the same name, and hence these different people are being “merged” into a single node. This is definitely something to worry about when one tries to draw inferences about social structure from the resulting network. However, in our case, we are using this dataset simply to build an interesting graph on which to practice various analysis techniques, so for our limited purposes there’s no problem: if two authors have the same last name, then for us they are the same person.

(ii') In fact, because of the issue in (2), there are papers where someone appears to coauthor with themselves. We will omit from the network those edges that link some node to itself.

(iii) Point (ii) is a particular instance of a broader principle, that in building a network from everyday data such as this list of papers, some of the entries will be misformatted or contain idiosyncracies that conflict with the general assumptions we’re making about how the data is structured. For these unusual cases, it’s fine to make up a consistent set of rules for how you’re handling situations that don’t follow the expected structure, and to document the choices you made in doing this. The goal is to make choices that don’t have a significant effect on the result, where possible.

What to hand in

You should upload the following files to Canvas; please read this section carefully, since the format is important. In particular, for the first file, there is a specific line format we need, since we will be using scripts as part of the grading.

The files to hand in:

(1) An ascii .txt file named “hw1solution.txt”. This should have results for the questions below, with each line on which you are reporting part of the answer beginning with a “@”. The form. for these lines will be described in the questions below. The first line of this file hw1solution.txt should be just your NetID, as a single string.

(2) Four files named “plot1”, “plot2”, “plot3”, and “plot4”, containing the plots associated with Questions 1, 2, 3, and 4 respectively. These can be in any standard image format (e.g. plot1.png, or plot1.jpg, and so forth.).

(3) The source code you used to compute the answers. By default, we won’t be grading the quality of the code itself, but it will be useful to have it in case we run into any confusion. It is fine to use packages or software specifically designed for handling graphs, in which case you should just include what you wrote. If you answer the questions by some means where the notion of “source code” doesn’t exactly apply, such as an interactive session with a software package, then submit whatever analogue of source code we’d need to see how you answered the questions — for example, a script. you wrote as part of some larger existing package, or a transcript. of an interactive session in which you did it. (This file should be named “code” and can be in any format; if you need to bundle together multiple files, for example, it can be a zipped or gzipped folder or tar file.)

(4) A brief description of how to apply your code (or code analogue, or transcript) to the data, together with any decisions you made about how to handle the data that would be useful for us to know about. (This file should be named “explanation” and can be in any format. It’s this file that can address any decisions on data-handling that you had to make in accordance with general caveat (iii) above.)

Again, for most of the solutions, we’ll simply be evaluating (1) and (2), and only consulting (3) or (4) as background if necessary.

The Problems

(1) Recall that the degree of a node is the number of edges it’s incident to. We start by considering how the degrees of the nodes are distributed.

Thus, for a number j, let nj denote the number of nodes with degree exactly j. Let d ∗ be the maximum degree of any node in the network. (This is the maximum total number of co-authors that any one author has — the maximum j for which nj > 0.)

(a) For each j from 0 to d ∗ , output the number nj . Each of these should correspond to a line in the file hw1solution.txt with the following four fields

@ 1 j nj

(The second field here simply denotes that you’re answering the first question.) So for example, in the file above consisting only of the three lines

1992 27 BAMS Alon & Kleitman, Piercing Convex Sets

1994 11 ALGRTHMICA Khuller & Naor, Flow in Planar Graphs with Vertex Capacities

1996 45 IEEETC Azar & Naor & Rom, Routing Strategies for Fast Networks

the correct output would be

@ 1 0 0

@ 1 1 3

@ 1 2 2

@ 1 3 1

(Recall that before any of these lines, the first line of your file hw1solution.txt should be your NetID.)

(b) Produce a scatterplot in the plane of the ordered pairs (log j, log nj ) for those j such that both j > 0 and nj > 0. Hand this in as the file plot1. Later in the course, we’ll see some proposed explanations for why such scatterplots can often be approximated fairly well by a straight line.

(2) Now we consider the sizes of the connected components in the network.

(a) Let n* be the number of nodes in the largest connected component, and let n be the number of nodes in graph overall. Report these two quantities and their ratio, as a line in the file hw1solution.txt of the form.

@ 2 n* n n*/n

For example, on our sample graph above, you would report

@ 2 4 6 .667

Looking at the ratio of these two quantities is a good way to assess whether we should think of the network as having a “giant” component, or whether it consists entirely of small components.

(b) Let kj denote the number of connected components of size j, and let c* denote the size of the second-largest component. For each j from 1 to c*, output the number kj . Each of these should correspond to a line in the file hw1solution.txt with the following four fields

@ 2 j kj

For example, on our sample graph above, you would report

@ 2 1 0

@ 2 2 1

(c) Produce a scatterplot in the plane of the ordered pairs (log j, log kj ) for those j such that both 1 ≤ j ≤ c* and also kj > 0. Hand this in as the file plot2. The extent to which logarithmic plots of component sizes should look like straight lines is less heavily studied, but there is evidence for this as well.

(3) We next consider node-to-node distances in the largest component.

(a) We start by fixing the author name Gries (i.e. David Gries, an eminent faculty member of Cornell CS, who joined in its early years) as our “root node.” For each j, let rj denote the number of nodes at distance exactly j from Gries. (So r0 = 1, and r1 is equal to the degree of Gries.) Let s* denote the largest j for which rj > 0 — this is the farthest anyone in the bibliography is from Gries, yet still connected to him by a path.

For each j from 1 to s*, output the number rj . Each of these should correspond to a line in the file hw1solution.txt with the following four fields

@ 3 j rj

For example, on our sample graph above, if the starting node were Khuller (rather than Gries), you would report

@ 3 1 1

@ 3 2 2

(b) Produce a histogram that plots rj as a function of j, for j from 1 to s*. Hand this in as the file plot3.

(4) Finally, we continue the analysis from the previous question by considering the structure of breadth-first search trees. In a graph G, a breadth-first search tree rooted at a node r is simply a tree T that we build as follows. We first make node r the root of T. Then, for j = 1, 2, 3, ... in increasing order, we include in T all the nodes whose distance from r in G is equal to j. When we get to a value of j (meaning that we’ve already included all nodes at distance up to j − 1 in T), we consider each node v whose distance from r is equal to j. For each such v, we include it in T by making it the child of some node u at distance j −1 from r, where u and v are neighbors in G. Note that since there might be multiple choices of u for a given v, this means that there may be multiple breadth-first search trees rooted at r.

A breadth-first search tree thus satisfies the following properties.

(i) The root of T is r, and T contains precisely the nodes in r’s connected component.

(ii) Each edge of T is also in G.

(iii) For each node v in T, if the shortest-path distance from r to v in G is equal to j, then v is at depth j in T.

(a) Construct a breadth-first search tree T rooted at the node corresponding to Gries. Above, we noted why there can be many different breadth-first search trees with a given root: each time a node v at distance j from the root has multiple neighbors at distance j − 1, each of these neighbors is eligible to be the parent of v.

One way to quantify this variability is to count the number of options that nodes have for their parents. For a node v at distance j from the root, let’s say that u is a potential parent associated with v if u is at distance j − 1 from the root, and u is a neighbor of v in the graph G. Note that the parent of v in the breadth-first search is one of the potential parents associated with v.

For each j, let pj denote the average number of potential parents associated with nodes at distance j from the root node (in this case, Gries). That is, each node v at distance j from the root has a number of potential parents associated with it; we take the average of these numbers over all nodes v at distance j from the root.

Recall from the previous question that s* denotes the largest j for which there is some node at distance j from Gries.

For each j from 1 to s*, output the number pj . Each of these should correspond to a line in the file hw1solution.txt with the following four fields

@ 4 j pj

To construct an example with respect to potential parents, suppose we add two more papers to our sample input from earlier (to go along with the three we already have), so that the full input is now:

1992 27 BAMS Alon & Kleitman, Piercing Convex Sets

1994 11 ALGRTHMICA Khuller & Naor, Flow in Planar Graphs with Vertex Capacities

1996 45 IEEETC Azar & Naor & Rom, Routing Strategies for Fast Networks

1987 16 SICOMP Azar & Vishkin, Tight Comparison Bounds on the Complexity of

Parallel Sorting

1992 24 STOC Khuller & Vishkin, Biconnectivity Approximations and Graph Carvings

Now, if we construct a breadth-first search tree with Khuller as the root node, using the co-authorship graph built from these five papers (the two above and the three original ones), then the resulting tree will have Naor and Vishkin at depth 1, and Azar and Rom at depth 2. Naor, Vishkin, and Rom each have one potential parent in any breadth-first search tree rooted at Khuller, but Azar has two potential parents: Naor and Vishkin.

Thus, on this example input with five papers, the output would be

@ 4 1 1

@ 4 2 1.5

(b) Produce a histogram that plots pj as a function of j, for j from 1 to s*. Hand this in as the file plot4.

 

請(qǐng)加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp











 

掃一掃在手機(jī)打開當(dāng)前頁
  • 上一篇:代寫CDS540程序、代做Python/Java編程設(shè)計(jì)
  • 下一篇:ENG 5105代做、代寫Java/Python編程設(shè)計(jì)
  • 無相關(guān)信息
    合肥生活資訊

    合肥圖文信息
    2025年10月份更新拼多多改銷助手小象助手多多出評(píng)軟件
    2025年10月份更新拼多多改銷助手小象助手多
    有限元分析 CAE仿真分析服務(wù)-企業(yè)/產(chǎn)品研發(fā)/客戶要求/設(shè)計(jì)優(yōu)化
    有限元分析 CAE仿真分析服務(wù)-企業(yè)/產(chǎn)品研發(fā)
    急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計(jì)優(yōu)化
    急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計(jì)優(yōu)化
    出評(píng) 開團(tuán)工具
    出評(píng) 開團(tuán)工具
    挖掘機(jī)濾芯提升發(fā)動(dòng)機(jī)性能
    挖掘機(jī)濾芯提升發(fā)動(dòng)機(jī)性能
    海信羅馬假日洗衣機(jī)亮相AWE  復(fù)古美學(xué)與現(xiàn)代科技完美結(jié)合
    海信羅馬假日洗衣機(jī)亮相AWE 復(fù)古美學(xué)與現(xiàn)代
    合肥機(jī)場(chǎng)巴士4號(hào)線
    合肥機(jī)場(chǎng)巴士4號(hào)線
    合肥機(jī)場(chǎng)巴士3號(hào)線
    合肥機(jī)場(chǎng)巴士3號(hào)線
  • 短信驗(yàn)證碼 目錄網(wǎng) 排行網(wǎng)

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
    ICP備06013414號(hào)-3 公安備 42010502001045

    91精品国产91久久久久久_国产精品二区一区二区aⅴ污介绍_一本久久a久久精品vr综合_亚洲视频一区二区三区
    麻豆视频一区二区| 亚洲精品一区二区三区樱花 | 一区二区久久久久| 国产欧美另类| 亚洲一级二级| 国产xxx精品视频大全| 一区二区三区 在线观看视频 | 国产精品自拍一区| 日本一区二区三区高清不卡| 在线观看一区二区视频| 亚洲欧美成人| 国产精品日本欧美一区二区三区| 99视频一区二区| 成人av网址在线| 成人动漫一区二区在线| 蜜臀av性久久久久av蜜臀妖精| 一区二区不卡在线视频 午夜欧美不卡在| 日本一区二区视频在线观看| 久久亚洲欧美国产精品乐播| 亚洲麻豆视频| 国产aⅴ精品一区二区三区色成熟| 美女视频网站黄色亚洲| 美国三级日本三级久久99| 天天色综合成人网| 无吗不卡中文字幕| 婷婷中文字幕一区三区| 免费观看在线综合| 久久超碰97中文字幕| 亚洲国产视频在线| 欧美aa在线视频| 久久99精品国产麻豆婷婷| 日韩av一区二区在线影视| 日本欧美一区二区三区乱码| 男人的天堂亚洲一区| 一区二区三区国产精华| 欧美aaa在线| 91尤物视频在线观看| 99精品免费网| 91精品视频网| 久久久久久久久蜜桃| 亚洲欧洲日韩在线| 男女激情视频一区| 国产一区二区在线视频| 国产高清成人在线| 不卡一区二区在线| av资源站一区| 久久一区二区精品| 日韩一区二区精品在线观看| 国产精品久久久久久久久动漫| 无码av免费一区二区三区试看| 视频一区二区三区入口| 国产一区二区中文字幕| 欧美精品三级| 欧洲一区在线电影| 一区二区三区日韩在线观看| 久久成人18免费观看| 欧美日韩免费高清| 欧美亚洲自拍偷拍| 国产三级精品三级在线专区| 久久人人精品| 欧美国产精品一区二区三区| 国产99久久精品| 欧美在线观看18| 亚洲一区二区三区视频在线播放 | 国产美女av一区二区三区| 久久国产主播精品| 亚洲最大成人综合| 999在线观看精品免费不卡网站| 欧美美女喷水视频| 五月天一区二区| 亚洲一区二区精品在线| 国产丝袜美腿一区二区三区| 国产精品一区二区黑丝| 91成人免费在线| 性感美女极品91精品| 国产欧美日韩亚洲| 亚洲精选视频免费看| 极品中文字幕一区| 亚洲同性gay激情无套| 欧美a级一区| 国产精品婷婷午夜在线观看| 欧美成人一区二区在线| 自拍偷拍国产精品| 中文亚洲欧美| 久久99国产乱子伦精品免费| 久久久久久黄| 日本最新不卡在线| 欧美一级爆毛片| 成人黄色a**站在线观看| 日韩欧美在线综合网| 国产传媒日韩欧美成人| 久久日韩精品一区二区五区| 狠狠色噜噜狠狠狠狠色吗综合| 亚洲人成影院在线观看| 亚洲欧美日韩国产综合精品二区| 婷婷丁香激情综合| 在线不卡免费欧美| 欧美日韩一区在线播放| 精品乱人伦小说| 欧美激情综合| 亚洲超丰满肉感bbw| 91麻豆精品国产91久久久更新时间| 94色蜜桃网一区二区三区| 一区二区三区四区蜜桃| 欧美色网站导航| 91蜜桃婷婷狠狠久久综合9色| 国产精品麻豆视频| 日本韩国视频一区二区| 本田岬高潮一区二区三区| 亚洲精品欧美激情| 欧美一区二区三区影视| 国产精品有限公司| 成人一区在线看| 亚洲a一区二区| 中文字幕不卡三区| 色94色欧美sute亚洲线路二| 欧美福利网址| 激情成人综合网| 亚洲午夜免费视频| 久久伊人蜜桃av一区二区| 在线观看一区不卡| 狠狠色丁香久久综合频道| 国产综合色在线| 性做久久久久久免费观看| 久久精品亚洲精品国产欧美| 7777精品久久久大香线蕉| 国产精品日本| 国产毛片久久| 中文亚洲字幕| 国产精品国产亚洲精品看不卡15| 亚洲一区二区三区四区在线免费观看 | 欧美日韩另类国产亚洲欧美一级| 国产久一道中文一区| 99精品视频网| 91久久国产综合久久蜜月精品| 欧美精品一卡| 国内精品亚洲| 亚洲精选一区| 国产精品乱看| 香蕉久久夜色精品| 亚洲欧美日韩专区| 羞羞答答国产精品www一本| 国产日韩精品一区观看| 国产精品美女久久久浪潮软件| 中文欧美日韩| 欧美午夜精品电影| 精品视频资源站| 精品日韩99亚洲| 国产欧美精品日韩区二区麻豆天美| 欧美tickle裸体挠脚心vk| 欧美激情一区二区在线| 日韩一区在线免费观看| 中文字幕亚洲一区二区va在线| 国产欧美精品在线观看| 中文字幕av一区 二区| 亚洲一级二级三级在线免费观看| 午夜不卡在线视频| 国产一区二区在线观看免费| 国产曰批免费观看久久久| kk眼镜猥琐国模调教系列一区二区| 午夜精品久久| 久久蜜桃精品| 欧美日韩一本到| 国产丝袜欧美中文另类| 亚洲男同1069视频| 国内久久精品视频| 国产一区在线观看视频| 欧美日产一区二区三区在线观看| 国产精品yjizz| 91高清在线观看| 国产精品灌醉下药二区| 免费在线欧美视频| 99精品1区2区| 国产视频在线观看一区| 欧美va亚洲va在线观看蝴蝶网| 亚洲国产日韩a在线播放性色| 高清久久久久久| 在线免费观看欧美| 日韩一区二区三区在线| 亚洲免费观看在线视频| 国产福利一区二区三区视频| 亚洲美女少妇无套啪啪呻吟| 欧美成人精品高清在线播放| 日韩精品福利网| 欧美日韩1区2区3区| 欧美日韩高清一区二区不卡 | 日韩毛片在线免费观看| 国产一二精品视频| 美女久久一区| 欧美国产精品一区二区三区| 成人av免费在线| 色吧成人激情小说| 国产亚洲欧美激情| 久久成人综合网| 久久人人97超碰国产公开结果| 国产日韩av一区二区| 国产成人午夜精品5599| 色综合激情久久| 日本美女一区二区三区视频| 亚洲国产日韩欧美|