This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Bonus 3: Attack of Panda Value: 4 Points Time Limit: 3 Second Memory Limit: 32768 KB In 2007, a computer virus spread across networks in China. The virus came with an icon of a lovely panda, hence the name Panda virus. What makes this virus difficult to handle is that it has many variations. Unfortunately, our network was also infected by the Panda virus. The computers in our network were connected in an array of M rows and N columns. Any one computer was connected directly to only the computers horizontally or vertically adjacent to it. At the beginning, T computers were infected with the Panda virus, each with a different variation, denoted by Type 1 , Type 2 , ... Type T . Given that each computer in the network had a specific integer defense level L (0 < L < 1000). The Panda virus could rapidly spread across the network according to the following rules: The virus could only spread across the network from the infected computers to the clean ones; If a computer had already been infected by one variation of the virus, it...
View Full Document