Bonus3

Bonus3 - Bonus 3: Attack of Panda Value: 4 Points Time...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Bonus 3: Attack of Panda Value: 4 Points Time Limit: 3 Second Memory Limit: 32768 KB In 2007, a computer virus spread across networks in China. The virus came with an icon of a lovely panda, hence the name Panda virus. What makes this virus difficult to handle is that it has many variations. Unfortunately, our network was also infected by the Panda virus. The computers in our network were connected in an array of M rows and N columns. Any one computer was connected directly to only the computers horizontally or vertically adjacent to it. At the beginning, T computers were infected with the Panda virus, each with a different variation, denoted by Type 1 , Type 2 , ... Type T . Given that each computer in the network had a specific integer defense level L (0 < L < 1000). The Panda virus could rapidly spread across the network according to the following rules: The virus could only spread across the network from the infected computers to the clean ones; If a computer had already been infected by one variation of the virus, it...
View Full Document

This note was uploaded on 01/23/2012 for the course CS 130a taught by Professor Staff during the Spring '08 term at UCSB.

Page1 / 3

Bonus3 - Bonus 3: Attack of Panda Value: 4 Points Time...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online