Poset , computer science, Basic Computer Science

Assignment Help:
1. (40 points) Add a course drop method to the system that you implemented in Problem Set
1. Modularize your new implementation properly. For any new methods that you introduce:
1. Write a speci cation.
2. Write an implementation sketch.
3. Annotate the code.
2. (80 points) A partially ordered set (PoSet) is a pair (S; R) where S is a set and R  S  S
is a binary relation over S such that:
 R is re
exive: 8 x 2 S : xRx
 R is antisymmettric: 8 x; y 2 S : xRy ^ yRx ) x = y
 R is transitive: 8 x; y; z 2 S : xRy ^ yRz ) xRz
R is called a partial order over S.
Implement PoSet as an abstract data type. Your implementation must provide the following
operations:
 Create an empty partially ordered set (S; R), i.e., S = ;, R = ;.
 Add an element x to S: S := S [ fxg, with R remaining unchanged.
 Add an ordering between two existing elements x; y 2 S: R := R [ (x; y), provided that
this does not violate the partial order conditions.
 Answer a membership query x 2 S.
 Answer an ordering query (x; y) 2 R.
You may use any class in the Java collections framework.
Your solution must include the following:
1. An abstraction function and representation invariant for the class that implements PoSet.
2. Overview statements for every class.
3. Speci cation, implementation sketch, and annotation for all methods, with the exception
of very simple and obvious methods such as one line getter methods.

Related Discussions:- Poset , computer science

HACKER, Briefly explain who a hacker is and what the activities of a hacker...

Briefly explain who a hacker is and what the activities of a hacker are?k question #Minimum 100 words accepted#

What are search engines, QUESTION 1 What are search engines? QUESTI...

QUESTION 1 What are search engines? QUESTION 2 Write short notes on the inverted file. QUESTION 3 Write short notes on: (i) Derivative indexing (also known a

Computer security, concepts and components of computer security

concepts and components of computer security

E - R diagram, draw the e r diagram for irctc rail ticket reservation onlin...

draw the e r diagram for irctc rail ticket reservation online

N-ary relationships in database design, n-ary relationships in database des...

n-ary relationships in database design Each n-ary where n>2 relationship type is maped into a table name of the relationship works as the name of the table. The primary key of suc

Differentiate the client–server and peer-to-peer models of d, The client-se...

The client-server model firmly differentiates the roles of the client and server. According to this model, the client requests services that are provided by the server. The peer-to

Digital electronic, draw the logic diagram of 2*4 decoder in only NOR gate ...

draw the logic diagram of 2*4 decoder in only NOR gate .include enable inputs .

Access time - storage devices, Access time: Access time: This is the t...

Access time: Access time: This is the time required to locate and retrieve stored data from the storage unit in response to a program instruction. That is the time interval be

Graphical user interface and arrays, In this program, you are going to writ...

In this program, you are going to write a program for playing the game of Hangman. In this game, the computer will pick a word and display a sequence of blanks to be filled in; one

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd