Solved

DFS & BFS

Posted on 2002-04-30
4
1,832 Views
Last Modified: 2011-10-03
I need programs for depth first search and breadth first search (of graph) implemented in 'C' language.
should be runable code(main(){}).
0
Comment
Question by:bhombal
  • 2
4 Comments
 
LVL 6

Expert Comment

by:snoegler
ID: 6979934
Search what? Files? B-Trees? etc.?
0
 
LVL 6

Accepted Solution

by:
snoegler earned 50 total points
ID: 6979981
The concept of depth-first:

void DF_search(what)
{
  for(each child in what;;child++)
  {
    if(child->hasChilds()) search(child);
  }

  for(each child in what;;child++)
  {
    if(!child->hasChilds()) doSomething();
  }
}

Vice versa, breadth first:
void BF_search(what)
{
  for(each child in what;;child++)
  {
    if(!child->hasChilds()) doSomething();
  }

  for(each child in what;;child++)
  {
    if(child->hasChilds()) search(child);
  }
}
0
 
LVL 11

Expert Comment

by:griessh
ID: 7122216
Dear bhombal

I think you forgot this question. I will ask Community Support to close it unless you finalize it within 7 days. You can always request to keep this question open. But remember, experts can only help you if you provide feedback to their questions.
Unless there is objection or further activity,  I will suggest to accept

     "snoegler"

comment(s) as an answer.

If you think your question was not answered at all, you can explain here why you want to do this and post a request in Community support (please include this link) to refund your points. The link to the Community Support area is: http://www.experts-exchange.com/commspt/


PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!
======
Werner
0
 
LVL 6

Expert Comment

by:Mindphaser
ID: 7138129
Force accepted

** Mindphaser - Community Support Moderator **
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

When writing generic code, using template meta-programming techniques, it is sometimes useful to know if a type is convertible to another type. A good example of when this might be is if you are writing diagnostic instrumentation for code to generat…
Written by John Humphreys C++ Threading and the POSIX Library This article will cover the basic information that you need to know in order to make use of the POSIX threading library available for C and C++ on UNIX and most Linux systems.   [s…
The viewer will learn how to use the return statement in functions in C++. The video will also teach the user how to pass data to a function and have the function return data back for further processing.
The viewer will be introduced to the member functions push_back and pop_back of the vector class. The video will teach the difference between the two as well as how to use each one along with its functionality.

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now