Poset , computer science, Basic Computer Science

Assignment Help:
1. (40 points) Add a course drop method to the system that you implemented in Problem Set
1. Modularize your new implementation properly. For any new methods that you introduce:
1. Write a speci cation.
2. Write an implementation sketch.
3. Annotate the code.
2. (80 points) A partially ordered set (PoSet) is a pair (S; R) where S is a set and R  S  S
is a binary relation over S such that:
 R is re
exive: 8 x 2 S : xRx
 R is antisymmettric: 8 x; y 2 S : xRy ^ yRx ) x = y
 R is transitive: 8 x; y; z 2 S : xRy ^ yRz ) xRz
R is called a partial order over S.
Implement PoSet as an abstract data type. Your implementation must provide the following
operations:
 Create an empty partially ordered set (S; R), i.e., S = ;, R = ;.
 Add an element x to S: S := S [ fxg, with R remaining unchanged.
 Add an ordering between two existing elements x; y 2 S: R := R [ (x; y), provided that
this does not violate the partial order conditions.
 Answer a membership query x 2 S.
 Answer an ordering query (x; y) 2 R.
You may use any class in the Java collections framework.
Your solution must include the following:
1. An abstraction function and representation invariant for the class that implements PoSet.
2. Overview statements for every class.
3. Speci cation, implementation sketch, and annotation for all methods, with the exception
of very simple and obvious methods such as one line getter methods.

Related Discussions:- Poset , computer science

What are the three basic security provided by ssl, QUESTION (a) Can SSL...

QUESTION (a) Can SSL be used to encrypt email data? Justify your answer (b) What are the three basic security provided by SSL? (c) State the port number used by applicati

Variable - concept of programming language, Variable - Concept of programmi...

Variable - Concept of programming language: Variable: As referencing memory by its physical address is very tedious, variable names are used. A variable is a symbolic name giv

Software development, requirement analysis and specification for online vot...

requirement analysis and specification for online voting

Data transmission, DATA TRANSMISSION: When we talk on the telephone we...

DATA TRANSMISSION: When we talk on the telephone we generally transmit a message to someone else. The message is made up of words that we speak into the telephone instrument.

Heuristic search strategies-artificial intelligence, Heuristic Search Strat...

Heuristic Search Strategies-Artificial intelligence In general speaking, a heuristic search is one which utilizes a rule of thumb to improve an agent's performance in solving p

Explain digital multiplexers, Problem 1 Perform the following conversio...

Problem 1 Perform the following conversion a. (ABE) 16 =() 2 b. (101011) 2 =() 10 2 Explain how full adder adds three bits 3 Explain digital multiplexers

Alternative approaches for acquiring software, Alternative approaches for a...

Alternative approaches for acquiring software: There are some alternative approaches for acquiring software. They are:  i)  'off the shelf' software package  ii)  'turnk

Importance of good database design , Importance of Good Database Design Poo...

Importance of Good Database Design Poor database design may have results in unwanted data redundancy Poor database design keeps errors leading to bad decisions and results Practica

Hacking, how can i hack a server

how can i hack a server

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd