Scheme, computer science, Basic Computer Science

Assignment Help:
There is a path between two vertices if there is a series of edges that you can use to travel between them. For example, between vertices 1 and 3 above, there is a path made up of the edges (1 2) and (2 3), written ((1 2)(2 3)). A path may not include repeated vertices.
Write two functions: in Scheme, a predicate path?, which takes a graph and two numbers indicating vertices, which returns true iff there is a path between them.:

(path? ''(5 ((1 2)(2 3)(3 4)(3 5)(4 5))) 1 5)
#t
(path? ''(5 ((1 2)(3 4)(3 5)(4 5))) 1 5)
#f

In Prolog, write a query path(+G, +V1, +V2) which succeeds iff there is a path in graph G between vertices V1 and V2.

path(graph(5, [[1,2],[2,3],[3,4],[3,5],[4,5]]), 1 5).
true.
path(graph(5, [[1,2],[3,4],[3,5],[4,5]]), 1 5).
false.

Related Discussions:- Scheme, computer science

#title, what is HMtl stands for, meaning and purpose

what is HMtl stands for, meaning and purpose

Define virtualization, Question 1 Define virtualization. Discuss the benef...

Question 1 Define virtualization. Discuss the benefits of virtualization. Discuss the benefits of server virtualization Question 2 What is para virtualization? How para vi

Frequency and bandwidth, Frequency and Bandwidth: Let us try to unders...

Frequency and Bandwidth: Let us try to understand a little about how information is transmitted. The information may be in the form of sound (human voice, music) or it may be

Assembly, can you help me to do my assembly program homework

can you help me to do my assembly program homework

Design problem, Design Problem 1. Implement a basic file system managed fr...

Design Problem 1. Implement a basic file system managed from within a file. The file system should have the following capabilities: i. List files stored along with their sizes.

Data mining analysis, Using Weka 3.6 (basketball or cloud data set). Using ...

Using Weka 3.6 (basketball or cloud data set). Using the EM clustering method, how many clusters did the algorithm decide to make? If we change from "Use Training Set" to "Percenta

Data input , Data Input : There are several aspects of data input that nee...

Data Input : There are several aspects of data input that need careful consideration. We shall assume that in a laboratory environment you are mainly concerned with entering data

Read only memory (rom), Read only memory (rom): The problem with RAM is...

Read only memory (rom): The problem with RAM is that its memory is volatile, i.e. it loses all its data when the power supply is removed.  A non-volatile memory is a permanent

Unix Shell, Write a shell script, change-lines, which will substitute a str...

Write a shell script, change-lines, which will substitute a string for a replacement string for each occurance of the string in files specified. The original file will be saved,

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd