Poset , computer science, Basic Computer Science

Assignment Help:
1. (40 points) Add a course drop method to the system that you implemented in Problem Set
1. Modularize your new implementation properly. For any new methods that you introduce:
1. Write a speci cation.
2. Write an implementation sketch.
3. Annotate the code.
2. (80 points) A partially ordered set (PoSet) is a pair (S; R) where S is a set and R  S  S
is a binary relation over S such that:
 R is re
exive: 8 x 2 S : xRx
 R is antisymmettric: 8 x; y 2 S : xRy ^ yRx ) x = y
 R is transitive: 8 x; y; z 2 S : xRy ^ yRz ) xRz
R is called a partial order over S.
Implement PoSet as an abstract data type. Your implementation must provide the following
operations:
 Create an empty partially ordered set (S; R), i.e., S = ;, R = ;.
 Add an element x to S: S := S [ fxg, with R remaining unchanged.
 Add an ordering between two existing elements x; y 2 S: R := R [ (x; y), provided that
this does not violate the partial order conditions.
 Answer a membership query x 2 S.
 Answer an ordering query (x; y) 2 R.
You may use any class in the Java collections framework.
Your solution must include the following:
1. An abstraction function and representation invariant for the class that implements PoSet.
2. Overview statements for every class.
3. Speci cation, implementation sketch, and annotation for all methods, with the exception
of very simple and obvious methods such as one line getter methods.

Related Discussions:- Poset , computer science

The internet or the world wide web, The internet or the World Wide Web is ...

The internet or the World Wide Web is the most familiar and popular example. These databases hold vast amounts of information, for example, on companies. By obtaining details in t

Which port does FTP uses, Why is it called out of band protocol? A1) FTP us...

Why is it called out of band protocol? A1) FTP uses port 20 and port 21; port 20 is used for data connection, whereas port 21 is used for control connection. FTP is known as out-of

Cryptography, Consider the one-time pad encryption scheme to encrypt a 1-bi...

Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "message

Functions, difference between recursion and iteration

difference between recursion and iteration

Cisc, two characteristics og CISC architecture?

two characteristics og CISC architecture?

Telecommunication networks architecture, Telecommunication Networks Archite...

Telecommunication Networks Architecture is the manner in which the components of thenetwork are organized and integrated to provide telecommunication services to users ofthe netwo

Define Twisted Pair Cables , Twisted pair cables comes in two appearance :...

Twisted pair cables comes in two appearance : Unshielded twisted pair cable : UTP : UTP cables is the most common types of telecommunication medium used today. Its frequency range

Quotation in Python, Python allows single (''), double (") and triple (''''...

Python allows single (''), double (") and triple ('''''' or """) quotes to indicate string literals, as long as the similar type of quote starts and ends the string. The triple quo

Explain initial dynamic model with example, Question 1 Explain initial dyn...

Question 1 Explain initial dynamic model with example Question 2 Discuss the importance of object orientation during system development Question 3 Distinguish between Ob

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd