## Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

6.046J/18.401J/SMA5503

Lecture 15

Prof. Charles E. Leiserson

Dynamic programming

Design technique, like divide-and-conquer. Example: Longest Common Subsequence (LCS) • Given two sequences x[1 . . m] and y[1 . . n], find a longest subsequence common to them both. “a” not “the” x: A B C B D A B BCBA = LCS(x, y) y: B D C A B A functional notation, but not a function

© 2001 by Charles E. Leiserson Introduction to Algorithms Day 26 L15.2

**Brute-force LCS algorithm
**

Check every subsequence of x[1 . . m] to see if it is also a subsequence of y[1 . . n]. Analysis • Checking = O(n) time per subsequence. • 2m subsequences of x (each bit-vector of length m determines a distinct subsequence of x). Worst-case running time = O(n2m) = exponential time.

© 2001 by Charles E. Leiserson Introduction to Algorithms Day 26 L15.3

**Towards a better algorithm
**

Simplification: 1. Look at the length of a longest-common subsequence. 2. Extend the algorithm to find the LCS itself. Notation: Denote the length of a sequence s by | s |. Strategy: Consider prefixes of x and y. • Define c[i, j] = | LCS(x[1 . . i], y[1 . . j]) |. • Then, c[m, n] = | LCS(x, y) |.

© 2001 by Charles E. Leiserson Introduction to Algorithms Day 26 L15.4

Recursive formulation

Theorem. c[i–1, j–1] + 1 if x[i] = y[j], c[i, j] = max{c[i–1, j], c[i, j–1]} otherwise. Proof. Case x[i] = y[ j]: x: y:

1 1 2 2 i m

=

L

j n

L

**Let z[1 . . k] = LCS(x[1 . . i], y[1 . . j]), where c[i, j] = k. Then, z[k] = x[i], or else z could be extended. Thus, z[1 . . k–1] is CS of x[1 . . i–1] and y[1 . . j–1].
**

© 2001 by Charles E. Leiserson Introduction to Algorithms Day 26 L15.5

Proof (continued)

Claim: z[1 . . k–1] = LCS(x[1 . . i–1], y[1 . . j–1]). Suppose w is a longer CS of x[1 . . i–1] and y[1 . . j–1], that is, | w | > k–1. Then, cut and paste: w || z[k] (w concatenated with z[k]) is a common subsequence of x[1 . . i] and y[1 . . j] with | w || z[k] | > k. Contradiction, proving the claim. Thus, c[i–1, j–1] = k–1, which implies that c[i, j] = c[i–1, j–1] + 1. Other cases are similar.

© 2001 by Charles E. Leiserson Introduction to Algorithms Day 26 L15.6

**Dynamic-programming hallmark #1
**

Optimal substructure An optimal solution to a problem (instance) contains optimal solutions to subproblems. If z = LCS(x, y), then any prefix of z is an LCS of a prefix of x and a prefix of y.

© 2001 by Charles E. Leiserson Introduction to Algorithms Day 26 L15.7

**Recursive algorithm for LCS
**

LCS(x, y, i, j) if x[i] = y[ j] then c[i, j] ← LCS(x, y, i–1, j–1) + 1 else c[i, j] ← max{ LCS(x, y, i–1, j), LCS(x, y, i, j–1)} Worst-case: x[i] ≠ y[ j], in which case the algorithm evaluates two subproblems, each with only one parameter decremented.

© 2001 by Charles E. Leiserson Introduction to Algorithms Day 26 L15.8

Recursion tree

m = 3, n = 4:

2,4 2,4 1,4 1,4 1,3 1,3 2,3 2,3 2,2 2,2 1,3 1,3 3,4 3,4 3,3 3,3 2,3 2,3 2,2 2,2 3,2 3,2

same subproblem

m+n

**, Height = m + n ⇒ work potentially exponential. but we’re solving subproblems already solved!
**

© 2001 by Charles E. Leiserson Introduction to Algorithms Day 26 L15.9

**Dynamic-programming hallmark #2
**

Overlapping subproblems A recursive solution contains a “small” number of distinct subproblems repeated many times. The number of distinct LCS subproblems for two strings of lengths m and n is only mn.

© 2001 by Charles E. Leiserson

Introduction to Algorithms

Day 26

L15.10

Memoization algorithm

Memoization: After computing a solution to a subproblem, store it in a table. Subsequent calls check the table to avoid redoing work.

LCS(x, y, i, j) if c[i, j] = NIL then if x[i] = y[j] then c[i, j] ← LCS(x, y, i–1, j–1) + 1 else c[i, j] ← max{ LCS(x, y, i–1, j), LCS(x, y, i, j–1)}

same as before

**Time = Θ(mn) = constant work per table entry. Space = Θ(mn).
**

© 2001 by Charles E. Leiserson Introduction to Algorithms Day 26 L15.11

**Dynamic-programming algorithm
**

IDEA: Compute the table bottom-up. Time = Θ(mn). A B C B D 0 0 0 0 0 0 0 0 0 0 0 0 B 0 0 1 1 1 1 0 0 1 1 1 1 D 0 0 1 1 1 2 0 0 1 1 1 2 C 0 0 1 0 0 1 A 0 1 1 0 1 1 B 0 1 2 0 1 2 A 0 1 2 0 1 2

© 2001 by Charles E. Leiserson Introduction to Algorithms

A B 0 0 0 0 1 1 1 1

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 3 3 2 2 2 3 3 2 3 3 3 4 2 3 3 3 4 2 3 3 4 4 2 3 3 4 4

Day 26 L15.12

**Dynamic-programming algorithm
**

IDEA: Compute the table bottom-up. Time = Θ(mn). Reconstruct LCS by tracing backwards. Space = Θ(mn). Exercise: O(min{m, n}).

© 2001 by Charles E. Leiserson

A B C B D 0 0 0 0 0 0 0 0 0 0 0 0 B 0 0 1 1 1 1 0 0 1 1 1 1 D 0 0 1 1 1 2 0 0 1 1 1 2 C 0 0 1 0 0 1 A 0 1 1 0 1 1 B 0 1 2 0 1 2 A 0 1 2 0 1 2

Introduction to Algorithms

A B 0 0 0 0 1 1 1 1

2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 3 3 2 2 2 3 3 2 3 3 3 4 2 3 3 3 4 2 3 3 4 4 2 3 3 4 4

Day 26 L15.13

- Assignment 1uploaded byAnung Grahito
- Bip8 Modeluploaded byEmy Zaninka
- spectogram hata.pdfuploaded byahmetygt
- transformations of functions and their graphsuploaded byapi-235719295
- Least-Cost Scheduling Method of Project Time Crashing_October_9uploaded byAli Arsalan
- Petri Netsuploaded byarefk
- Algorithmic Sketchbookuploaded byEduardo Mendoza
- Latex Presentation Sampleuploaded byMarco André Argenta
- Atlas Slam Bosseetalijrr2004uploaded byMatt Rabinovitch
- Test2 - Solutionuploaded byRyan Harris
- Lotka Voklterrauploaded byqwerty
- Aqa Md02 Wre Jun13uploaded byprsara1975
- 10 Programsuploaded byAakash Kansal
- 4-Algorithmic-Complexity-II.pdfuploaded byharry_i3t
- Pantaz d. Vadimuploaded byLaura Colun
- 22. viterbi V1.32 (2).pptuploaded bymd sahidulla ayon
- Clarke Wrightuploaded byYusiana Kartikasari
- Chapter 1 - Linear Programminguploaded byizun
- Routing 32 34uploaded byNeha Pachauri
- Ai Mtech Lab 3uploaded bySaikat Bose
- Lesson Plan-Soft Computing- 8th Sem B. Tech -Dr. Debahuti Mishra_0uploaded byLowry Guetta
- Diagramuploaded bysare
- Exercise 1uploaded byMohammed Said
- art04.pdfuploaded byharry_i3t
- TowersHanoiuploaded byAlfonso Mérida García
- UndergraduateGuide_019uploaded byjuan jose
- Root Locus Techniqueuploaded byTammanurRavi
- Kakurouploaded byRafael Acosta
- STS3001.slno.30.File.1uploaded byshubham
- Presentation_2.pptxuploaded byCse akash

- lecture11uploaded byvv
- TACTICAL COMMUNICATIONS PROTOCOL 2uploaded byvv
- DesignOfSWforEmbeddedSystemsuploaded byvv
- lecture13uploaded byvv
- Lecture 14uploaded byvv
- lecture09uploaded byvv
- Planning Algorithmuploaded byvv
- lecture12uploaded byvv
- lecture08uploaded byvv
- lecture06uploaded byvv
- lecture01uploaded byvv
- lecture04uploaded byvv
- Algorithmsuploaded byvv
- lecture03uploaded byvv
- lecture05uploaded byvv
- HSM Design principles v5 1uploaded byvv
- lecture07uploaded byvv
- lecture02uploaded byvv

Read Free for 30 Days

Cancel anytime.

Close Dialog## Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

Loading