Solved

Wagner Whitin

Posted on 2009-04-14
6
1,284 Views
Last Modified: 2013-11-23
Hi guys,

Does anyone know Wagner Whitin algorithm and have code for that?

Algorithm is recursive. For example we have 5 nodes and there is a cost function of going from one node to another. We start from the end and find for each node the min cost that takes us from that node to the end. So we are finding the optimal cost...

Thank you,

Ozgur
0
Comment
Question by:Ozgurozmen
  • 3
  • 2
6 Comments
 
LVL 16

Expert Comment

by:ai_ja_nai
ID: 24146657
0
 

Author Comment

by:Ozgurozmen
ID: 24149499
I need Java Code for Wagner Whitin... Thank you for alternative solution algorithms though...
0
 
LVL 16

Expert Comment

by:ai_ja_nai
ID: 24149851
There's no such a thing around. You'll have to write your own code out of the pseudo :)
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Author Comment

by:Ozgurozmen
ID: 24149912
Yeah Thank you I know How to google it. I asked for anybody who coded before...
0
 
LVL 18

Accepted Solution

by:
JoseParrot earned 500 total points
ID: 24201159
This dynamic program source code has some value, as it is part of several commercial products.
There are several low price Excel implementations around, but no source code available.
The better you can find is the MATLAB code, by Sébastien Paris, available at Matlab Central:
http://www.mathworks.com/matlabcentral/fileexchange/17877
You may want to port it to Java. I think you can do it with few effort, as the core algorithm is very well made and all the code is extensively commented.
Jose
0
 

Author Closing Comment

by:Ozgurozmen
ID: 31570288
Thank you...
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

By the end of 1980s, object oriented programming using languages like C++, Simula69 and ObjectPascal gained momentum. It looked like programmers finally found the perfect language. C++ successfully combined the object oriented principles of Simula w…
Article by: Nadia
Suppose you use Uber application as a rider and you request a ride to go from one place to another. Your driver just arrived at the parking lot of your place. The only thing you know about the ride is the license plate number. How do you find your U…
Viewers learn about the “for” loop and how it works in Java. By comparing it to the while loop learned before, viewers can make the transition easily. You will learn about the formatting of the for loop as we write a program that prints even numbers…
Viewers will learn about the different types of variables in Java and how to declare them. Decide the type of variable desired: Put the keyword corresponding to the type of variable in front of the variable name: Use the equal sign to assign a v…

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now