## Exercises
#### Section 6.1
1. Use [Algorithm 6.1](LiB0048.html#579) (The Breadth-First-Search with Branch-and-Bound Pruning algorithm for the 0–1 Knapsack problem) to maximize the profit for the following problem instance. Show the actions step by step.
![](https://box.kancloud.cn/edac44a4362acb76d7cbb1ec19d376a1_318x201.jpg)
2. Implement [Algorithm 6.1](LiB0048.html#579) on your system and run it on the problem instance of [Exercise 1](LiB0013.html#131).
3. Modify [Algorithm 6.1](LiB0048.html#579) to produce an optimal set of items. Compare the performance of your algorithm with that of [Algorithm 6.1](LiB0048.html#579).
4. Use [Algorithm 6.2](LiB0048.html#589) (The Best-First Search with Branch-and-Bound Pruning algorithm for the 0–1 Knapsack problem) to maximize the profit for the problem instance of Exercise I. Show the actions step by step.
5. Implement [Algorithm 6.2](LiB0048.html#589) on your system and run it on the problem instance of [Exercise 1](LiB0013.html#131).
6. Compare the performance of [Algorithm 6.1](LiB0048.html#579) with that of [Algorithm 6.2](LiB0048.html#589) for large instances of the problem.
#### Section 6.2
1. Use [Algorithm 6.3](LiB0049.html#603) (The Best-First Search with Branch-and-Bound Pruning Algorithm for the Traveling Salesperson problem) to find an optimal tour and the length of the optimal tour for the graph below.
[![Click To expand](https://box.kancloud.cn/832646fb0bddd1e08fe6863df1f059cf_350x214.jpg)](figu265_1_0.jpg)
Show the actions step by step.
2. Write functions *length* and *bound* used in [Algorithm 6.3](LiB0049.html#603).
3. Implement [Algorithm 6.3](LiB0049.html#603) on your system, and run it on the problem instance of Exercise 7. Use different bounding functions and study the results.
4. Compare the performance of your dynamic programming algorithm (see [Section 3.6](LiB0030.html#331), Exercise 27) for the Traveling Salesperson problem with that of [Algorithm 6.3](LiB0049.html#603) using large instances of the problem.
#### Section 6.3
1. Revise [Algorithm 6.4](LiB0050.html#618) (Cooper's Best-First Search with Branch-and-Bound Pruning algorithm for Abductive Inference) to produce the *m* most probable explanations, where *m* is any positive integer.
2. Show that if the diseases in [Example 6.4](LiB0050.html#610) were sorted in nonincreasing order according to their conditional probabilities, the number of nodes checked would be 23 instead of 15. Assume that *p*(*d*4) = 0.008 and *p*(*d*4, *d*1) = 0.007.
3. A set of explanations satisfies a comfort measure *p* if the sum of the probabilities of the explanations is greater than or equal to *p*. Revise [Algorithm 6.4](LiB0050.html#618) to produce a set of explanations that satisfies *p*, where 0 ≤ *p* ≤ 1. Do this with as few explanations as possible.
4. Implement [Algorithm 6.4](LiB0050.html#618) on your system. The user should be able to enter an integer *m*, as described in Exercise 11, or a comfort measure *p*, as described in Exercise 13.
#### Additional Exercise
1. Can the branch-and-bound design strategy be used to solve the problem discussed in Exercise 34 in [Chapter 3](LiB0024.html#252)? Justify your answer.
2. Write a branch-and-bound algorithm for the problem of scheduling with deadlines discussed in [Section 4.3.2](LiB0035.html#412)
3. Can the branch-and-bound design strategy be used to solve the problem discussed in Exercise 26 in [Chapter 4](LiB0032.html#359)? Justify your answer.
4. Can the branch-and-bound design strategy be used to solve the Chained Matrix Multiplication problem discussed in [Section 3.4](LiB0028.html#290)? Justify your answer.
5. List three more applications of the branch-and-bound design strategy.
- Table of Contents
- BackCover
- Foundations of Algorithms Using C++ Pseudocode, Third Edition
- Preface
- Chapter Contents
- Pedagogy
- Course Outlines
- Acknowledgments
- Errors
- Chapter 1: Algorithms - Efficiency, Analysis, and Order
- 1.2 The Importance of Developing Efficient Algorithms
- 1.3 Analysis of Algorithms
- 1.4 Order
- 1.5 Outline of This Book
- Exercises
- Chapter 2: Divide-and-Conquer
- 2.1 Binary Search
- 2.2 Mergesort
- 2.3 The Divide-and-Conquer Approach
- 2.4 Quicksort (Partition Exchange Sort)
- 2.5 Strassen's Matrix Multiplication Algorithm
- 2.6 Arithmetic with Large Integers
- 2.7 Determining Thresholds
- 2.8 When Not to Use Divide-and-Conquer
- Exercises
- Chapter 3: Dynamic Programming
- 3.1 The Binomial Coefficient
- 3.2 Floyd's Algorithm for Shortest Paths
- 3.3 Dynamic Programming and Optimization Problems
- 3.4 Chained Matrix Multiplication
- 3.5 Optimal Binary Search Trees
- 3.6 The Traveling Salesperson Problem
- Exercises
- Chapter 4: The Greedy Approach
- 4.1 Minimum Spanning Trees
- 4.2 Dijkstra's Algorithm for Single-Source Shortest Paths
- 4.3 Scheduling
- 4.4 Huffman Code
- 4.5 The Greedy Approach versus Dynamic Programming: The Knapsack Problem
- Exercises
- Chapter 5: Backtracking
- 5.2 The n-Queens Problem
- 5.3 Using a Monte Carlo Algorithm to Estimate the Efficiency of a Backtracking Algorithm
- 5.4 The Sum-of-Subsets Problem
- 5.5 Graph Coloring
- 5.6 The Hamiltonian Circuits Problem
- 5.7 The 0-1 Knapsack Problem
- Exercises
- Chapter 6: Branch-and-Bound
- 6.1 Illustrating Branch-and-Bound with the 0 - 1 Knapsack problem
- 6.2 The Traveling Salesperson Problem
- 6.3 Abductive Inference (Diagnosis)
- Exercises
- Chapter 7: Introduction to Computational Complexity - The Sorting Problem
- 7.2 Insertion Sort and Selection Sort
- 7.3 Lower Bounds for Algorithms that Remove at Most One Inversion per Comparison
- 7.4 Mergesort Revisited
- 7.5 Quicksort Revisited
- 7.6 Heapsort
- 7.6.1 Heaps and Basic Heap Routines
- 7.6.2 An Implementation of Heapsort
- 7.7 Comparison of Mergesort, Quicksort, and Heapsort
- 7.8 Lower Bounds for Sorting Only by Comparison of Keys
- 7.8.1 Decision Trees for Sorting Algorithms
- 7.8.2 Lower Bounds for Worst-Case Behavior
- 7.8.3 Lower Bounds for Average-Case Behavior
- 7.9 Sorting by Distribution (Radix Sort)
- Exercises
- Chapter 8: More Computational Complexity - The Searching Problem
- 8.1 Lower Bounds for Searching Only by Comparisons of Keys
- 8.2 Interpolation Search
- 8.3 Searching in Trees
- 8.4 Hashing
- 8.5 The Selection Problem: Introduction to Adversary Arguments
- Exercises
- Chapter 9: Computational Complexity and Interactability - An Introduction to the Theory of NP
- 9.2 Input Size Revisited
- 9.3 The Three General Problem Categories
- 9.4 The Theory of NP
- 9.5 Handling NP-Hard Problems
- Exercises
- Chapter 10: Number-Theoretic Algorithms
- 10.1 Number Theory Review
- 10.2 Computing the Greatest Common Divisor
- 10.3 Modular Arithmetic Review
- 10.4 Solving Modular Linear Equations
- 10.5 Computing Modular Powers
- 10.6 Finding Large Prime Numbers
- 10.7 The RSA Public-Key Cryptosystem
- Exercises
- Chapter 11: Introduction to Parallel Algorithms
- 11.1 Parallel Architectures
- 11.2 The PRAM Model
- Exercises
- Appendix A: Review of Necessary Mathematics
- A.2 Functions
- A.3 Mathematical Induction
- A.4 Theorems and Lemmas
- A.5 Logarithms
- A.6 Sets
- A.7 Permutations and Combinations
- A.8 Probability
- Exercises
- Appendix B: Solving Recurrence Equations - With Applications to Analysis of Recursive Algorithms
- B.2 Solving Recurrences Using the Characteristic Equation
- B.3 Solving Recurrences by Substitution
- B.4 Extending Results for n, a Power of a Positive Constant b, to n in General
- B.5 Proofs of Theorems
- Exercises
- Appendix C: Data Structures for Disjoint Sets
- References
- Index
- Index_B
- Index_C
- Index_D
- Index_E
- Index_F
- Index_G
- Index_H
- Index_I
- Index_J
- Index_K
- Index_L
- Index_M
- Index_N
- Index_O
- Index_P
- Index_Q
- Index_R
- Index_S
- Index_T
- Index_U
- Index_V
- Index_W-X
- Index_Y
- Index_Z
- List of Figures
- List of Tables
- List of Algorithms, Examples, and Theorems
- List of Sidebars