(Continued from Part 1)
In Part 1, we wrote a dead-simple brute-force algorithm to solve the “string-product problem”. By comparing pretty much every word to every other word, we felt the brunt of the O(n²) complexity of our algorithm (read more about Big-O notation here).
But even before seeking out an algorithm with a better worst-case bound, which will require more critical thinking, we can apply some simple logic to the order of our if-statements to avoid unnecessary work.
A while back, I was approached by a peer of mine about an interesting problem they had recently attempted for an interview question. As their solution had already been submitted, and as they wanted to understand if they had missed a better or faster way to complete the challenge (restricted to Python 3), they asked me a to take a look at it.
It turned out to be a more nuanced and interesting problem than I expected.
The problem stated:
Given a file containing a list of English words, find a pair of words with no letters in common, such that the product of their lengths is maximized.
A list of CS-themed cocktails:
- Mersenne Twister
- The “Big O”
- Linked Fist
- Hex on the Beach
- Power Tower
- “Zero-Knowledge 100 Proof” (it’s just Scotch – probably 10-year cask-strength Laphroaig)
- The Zero Day
- Space-Time Tradeoff (it’s an unmarked soda bottle of homemade Slivovitz; also called “The Min/Max”)
- Stack Smasher
- Beer Stein Overflow (for more casual drinkers)
This paper is a formal literature review produced for one of my courses at Northeastern. The review discusses some recent surveys and studies concerning online banking authentication, and human interaction with those systems. Enjoy the PDF!
This is a paper I wrote for a final project as part of my CS/Cyber program. It discusses the modern pros and cons of encryption and how they affect the interests of individuals, companies and law enforcement. Enjoy! Cryptography in the 21st Century
Here is the complete research paper on anonymization services to which I contributed (my contribution is mostly the US & Tor section) : CyberLaw Midterm PDF
The United States in particular has a very complex relationship with anonymization services, and with Tor especially. The Tor project actually began as an offshoot of an Office of Naval Research project in 1995, which originated Continue reading