subject

You’re some security analysts monitor a collection of networked computers, tracking the spread of an online virus. there are n computers in the system, call them c1,. you are given a trace indicating the times at which pairs of computers communicated. the trace consists of m triples (ci ,cj ,tk) that indicate that ci and cj communicated at time tk. at this time, a virus could have spread from ci to cj , or from cj to ci . we assume that the trace holds the triples sorted in order by time. for simplicity, we assume that each pair of computers communicates at most once over the time of the trace. also, it is possible to have pairs (cs ,cj ,tk) and (ct ,cj ,tk); this would indicate that cj opened connections to both cs and ct at time tk, allowing a virus to spread in any way among the 3 machines. there’s nothing special about 3 here – there might be 4 or 10 or however many connections open at the same time, allowing a virus to spread in any way among all of them. we would like to answer questions of the following form: if a virus was introduced at ci at time x, could it have spread to cj at time y? that is, is there a sequence of communications that could have led from the virus moving from ci to cj? design an algorithm that, given as input a collection of (sorted) trace data and a virus query, gives a yes/no answer for the query. the algorithm should run in time o(m+n).

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 18:30
All of the following are characteristics that must be contained in any knowledge representation scheme except
Answers: 3
question
Computers and Technology, 23.06.2019 02:30
How to launch an app: steps to be successful? launching an app is a great idea, but it’s not that easy as we supposed to think. the majority of mobile applications don’t generate revenue because companies aren’t ready to be competitive. referring to our experience in successfully building and launching apps we hope to you omit these difficulties. we are going to talk about ideas, marketing, testing your product, its development, distribution and support. you will learn 8 product launch stages to succeed.
Answers: 1
question
Computers and Technology, 23.06.2019 13:10
What is domain name system (dns)? allows dynamic ip address allocation so users do not have to have a preconfigured ip address to use the network converts ip addresses into domains, or identifying labels that use a variety of recognizable naming conventions the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures the integration of communication channels into a single service
Answers: 2
question
Computers and Technology, 23.06.2019 15:30
Hey so i was just trying out some game hacks so i took a paste from online and built it in my visual studio and then suddenly my computer was working or clicking on stuff on its own am i hacked?
Answers: 1
You know the right answer?
You’re some security analysts monitor a collection of networked computers, tracking the spread of a...
Questions
question
Mathematics, 06.01.2021 01:00
question
Geography, 06.01.2021 01:00
question
Spanish, 06.01.2021 01:00
question
History, 06.01.2021 01:00
question
Chemistry, 06.01.2021 01:00
question
Computers and Technology, 06.01.2021 01:00
question
Mathematics, 06.01.2021 01:00