Show that the MST clustering technique of Section 9.4.2 produces the same clusters as single link. To avoid complications and special cases, assume that all the pairwise similarities are distinct.
What will be an ideal response?
In single link, we start with with clusters of individual points and then succes-
sively join two clusters that have the pair of points that are closest together.
Conceptually, we can view the merging of the clusters as putting an edge
between the two closest points of the two clusters. Note that if both clusters
are currently connected, then the resulting cluster will also be connected.
However, since the clusters are formed from disjoint sets of points, and edges
are only placed between points in different clusters, no cycle can be formed.
From these observations and by noting that we start with clusters (graphs)
of size one that are vacuously connected, we can deduce by induction that
at any stage in single link clustering process, each cluster consists of a con-
nected set of points without any cycles. Thus, when the last two clusters are
merged to form a cluster containing all the points, we also have a connected
graph of all the points that is a spanning tree of the graph. Furthermore,
since each point in the graph is connected to its nearest point, the spanning
tree must be a minimum spanning tree. All that remains to establish the
equivalence of MST and single link is to note that MST essentially reverses
the process by which single link built the minimum spanning tree; i.e., by
breaking edges beginning with the longest and proceeding until the smallest.
Thus, it generates the same clusters as single link, but in reverse order.
You might also like to view...
The header of a two-page letter includes the ____.
A. recipient's full name, Page 2, and the date B. recipient's full name, the date, and Page 2 C. the sender's full name, Page 2, and the date D. the sender's full name, the date, and Page 2
This term means to scramble, to mix up, to change data in such a way that the wrong people can't read it, but so the right people can unscramble it.
A. authentication B. authorization C. encryption D. nonrepudiation
Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
Answer the following statement true (T) or false (F)
?What certification program, sponsored by ISC2, requires knowledge of digital forensics, malware analysis, incident response, e-discovery, and other disciplines related to cyber investigations?
A. ?Certified Computer Crime Investigator B. ?Certified Forensic Computer Examiner C. ?Certified Cyber Forensics Professional D. ?EnCase Certified Examiner