Poset , computer science, Basic Computer Science

1. (40 points) Add a course drop method to the system that you implemented in Problem Set
1. Modularize your new implementation properly. For any new methods that you introduce:
1. Write a speci cation.
2. Write an implementation sketch.
3. Annotate the code.
2. (80 points) A partially ordered set (PoSet) is a pair (S; R) where S is a set and R  S  S
is a binary relation over S such that:
 R is re
exive: 8 x 2 S : xRx
 R is antisymmettric: 8 x; y 2 S : xRy ^ yRx ) x = y
 R is transitive: 8 x; y; z 2 S : xRy ^ yRz ) xRz
R is called a partial order over S.
Implement PoSet as an abstract data type. Your implementation must provide the following
 Create an empty partially ordered set (S; R), i.e., S = ;, R = ;.
 Add an element x to S: S := S [ fxg, with R remaining unchanged.
 Add an ordering between two existing elements x; y 2 S: R := R [ (x; y), provided that
this does not violate the partial order conditions.
 Answer a membership query x 2 S.
 Answer an ordering query (x; y) 2 R.
You may use any class in the Java collections framework.
Your solution must include the following:
1. An abstraction function and representation invariant for the class that implements PoSet.
2. Overview statements for every class.
3. Speci cation, implementation sketch, and annotation for all methods, with the exception
of very simple and obvious methods such as one line getter methods.
Posted Date: 3/3/2012 12:39:30 PM | Location : United States

Related Discussions:- Poset , computer science, Assignment Help, Ask Question on Poset , computer science, Get Answer, Expert's Help, Poset , computer science Discussions

Write discussion on Poset , computer science
Your posts are moderated
Related Questions
FMS CONTROL-DISPLAY UNIT: The CDU provides a means for the crew to communicate with the FMC.  It contains pushbutton key controllers and a display screen.  The keys are of two

QUESTION (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Explain how s

Binary Codes: We have seen earlier that digital computers use signals that have two distinct values and there exists a direct analogy between binary signals and binary digits.

SOFTWARE EVOLUTION:  As you know that in a computer system both hardware and software complement each other  -  one is of hardly any use without the other. Hence, since the ve

Question 1 Discuss the usage and benefits of storyboarding Question 2 Explain the different stages of scriptwriting Question 3 Explain the 12 fundamental principle

IDA* Search-Artificial intelligence: A* search is a sophisticated and successful search strategy. yet, a problem with A* search is that it might  keep every states in its memor

Input devices of a digital computer: Input devices are used to read the instructions and data to be processed and output devices display the results obtained after executing t

Systems Software: Systems software is generally supplied by the hardware manufacturers. It includes operating systems, assemblers, compilers, and interpreters (to convert prog

what protocol is used by DNS name server