Digital search trees JASS
|
|
- Lesley Wilkerson
- 5 years ago
- Views:
Transcription
1 Digital search trees Analysis of different digital trees with Rice s integrals. JASS Nicolai v. Hoyningen-Huene JASS 04 - Digital search trees 1
2 content Tree Digital search tree: Definition Average case analysis Tries: Definition Average case analysis General framework JASS 04 - Digital search trees 2
3 content Tree Digital search tree Tries General framework JASS 04 - Digital search trees 3
4 Tree JASS 04 - Digital search trees 4
5 Tree Definition 0.1 A tree is defined in several ways: 1. A connected, undirected, acyclic graph. It is rooted and ordered unless otherwise specified. 2. A data structure accessed beginning at the root node. Each node is either a leaf or an internal node. An internal node has one or more child nodes and is called the parent of its child nodes. All children of the same node are siblings. 3. A tree is either empty (no nodes), or a root and zero or more subtrees. The subtrees are ordered JASS 04 - Digital search trees 5
6 Search tree JASS 04 - Digital search trees 6
7 content Tree Digital search tree: Definition Average case analysis Tries General framework JASS 04 - Digital search trees 7
8 content Tree Digital search tree: Definition Average case analysis Tries General framework JASS 04 - Digital search trees 8
9 Digital search tree JASS 04 - Digital search trees 9
10 Digital search tree A digital search tree is a dictionary implemented as a digital tree which stores strings in internal nodes, so there is no need for extra leaf nodes to store the strings JASS 04 - Digital search trees 10
11 content Tree Digital search tree: Definition Average case analysis: Internal path length External internal nodes Tries General framework JASS 04 - Digital search trees 11
12 content Tree Digital search tree: Definition Average case analysis: Internal path length External internal nodes Tries General framework JASS 04 - Digital search trees 12
13 Internal path length The internal path length of a tree is the sum of the depth of every node of the tree JASS 04 - Digital search trees 13
14 Internal path length Fundamental recurrence relation A N = N 1+ with A 0 := 0. k=0 1 2 N 1 ( ) N 1 k (A k + A N 1 k ), N JASS 04 - Digital search trees 14
15 Internal path length Transformation N=1 A N z N 1 = ze z + 2 (N 1)! k! k=0 ( z A (z) = ze z + 2A 2) A k ( z 2 e z 2 ) k e z JASS 04 - Digital search trees 15
16 Internal path length A (z) = e z B (z) = Substitution by B(z) A N = ( N=0 N k=0 ) ( z N ) z N B N N! N! N=0 ( N k ) B k JASS 04 - Digital search trees 16
17 Internal path length Substitution by B(z) ( z A (z) = ze z + 2A e 2) z 2 ( z B (z) + B (z) = z + 2B 2) B N + B N 1 = 1 2 N 2 B N JASS 04 - Digital search trees 17
18 Internal path length Substitution by B(z) N 2 B N = ( 1) N j=1 (1 12 j ) JASS 04 - Digital search trees 18
19 Internal path length Introduction of Q N Q N = N j=1 (1 12 j ) JASS 04 - Digital search trees 19
20 Internal path length Introduction of Q(x) Q (x) = j=1 (1 x 2 j ) Q (1) = Q JASS 04 - Digital search trees 20
21 Internal path length Q(x) is used for a meromorphic function of Q N Q N = Q (1) Q (2 N ) JASS 04 - Digital search trees 21
22 Internal path length The function Q(x) 4 y x JASS 04 - Digital search trees 22
23 Internal path length Explicit formula for A N A N = N k=2 ( N k ) ( 1) k Q (1) Q (2 k+2 ) JASS 04 - Digital search trees 23
24 Internal path length Rice s method N k=0 ( N k ) ( 1) k f (k) = 1 2πi C B (N + 1, z) f (z) dz JASS 04 - Digital search trees 24
25 Internal path length Application of Rice s method A N = 1 2πi C B (N + 1, z) Q (1) Q (2 z+2 ) dz JASS 04 - Digital search trees 25
26 Internal path length Beta-Function B (p, q) = Γ (p) Γ (q) Γ (p + q) JASS 04 - Digital search trees 26
27 Internal path length Beta-Function 1e+11 5e+10 z e+10 1e JASS 04 - Digital search trees 27
28 Internal path length Gamma-Function y z JASS 04 - Digital search trees 28
29 Internal path length Cauchy s theorem If f(z) is analytic in C except final number of poles a 1, a 2,..., a n inside C, then 1 2πi C f (z) dz = n Res z=ak f (z) k= JASS 04 - Digital search trees 29
30 Internal path length Approximation with Rectangle R XY with ( 1 2 ± iy, X ± iy ) A N = 1 2πi R XY B (N + 1, z) Q (1) Q (2 z+2 ) dz Res R XY /C JASS 04 - Digital search trees 30
31 Internal path length Approximation of the integral 1 2πi R XY B (N + 1, z) Q (1) Q (2 z+2 ) dz = O ( Y Y ) Γ (N + 1) Γ ( N + 1 iy) dy 2 = O ( Y Y ) N 1 2 iy dy = O ( ) N JASS 04 - Digital search trees 31
32 Internal path length Residue at z = 1 B (N + 1, z) = N z 1 N (H N 1 1) + O (z 1) H N 1 = γ + ln N O B (N + 1, z) = N z 1 ( 1 N ) N (γ + ln N 1) + O (z 1) JASS 04 - Digital search trees 32
33 Internal path length Residue at z = 1 Q (1) Q (2 z+1 ) = 1 α ln 2 (z 1) + O ( (z 1) 2) JASS 04 - Digital search trees 33
34 Internal path length Residue at z = = 1 2 z+1 1 eln 2( z+1) 1 = ( z + 1) ln z = (z 1) ln O (z 1) 2 + O ( ( z + 1) 3) JASS 04 - Digital search trees 34
35 Internal path length Residue at z = 1 z=1 = N lg N N ( γ 1 ln 2 α + 1 ) 2 + O (1) JASS 04 - Digital search trees 35
36 Internal path length Residues at z = j ± 2πik ln 2 for Q(2 z+j ) where z=1± 2πIk ln 2 δ (N) = 1 ln 2 Γ k 0 = Nδ (N) + O (1) ( 1 2πik ) 2πik lg N e ln JASS 04 - Digital search trees 36
37 Internal path length Average case A N = N lg N + N ( γ 1 ln 2 α + 1 ) 2 + δ (N) + O ( ) N JASS 04 - Digital search trees 37
38 content Tree Digital search tree: Definition Average case analysis: Internal path length External internal nodes Multiway branching Tries General framework JASS 04 - Digital search trees 38
39 External internal nodes Definition External internal nodes are nodes with both links null JASS 04 - Digital search trees 39
40 External internal nodes Fundamental recurrence relation C N = k=0 1 2 N 1 with C 1 = 1 and C 0 = 0. ( ) N 1 k (C k + C N 1 k ), N JASS 04 - Digital search trees 40
41 External internal nodes Transformation C N z N C (z) = N! N=0 ( z C (z) = 1 + 2C 2) e z JASS 04 - Digital search trees 41
42 External internal nodes Substitution by D (z) = e z C (z) D (z) = N=0 D N z N N! D (z) + D (z) = e z + 2D ( z 2) JASS 04 - Digital search trees 42
43 External internal nodes Recurrence for D N D N + D N 1 = ( 1) N D N 2 N 1 ( D N = ( 1) N ) D 2 N 2 N 1, N 2 with D 1 = 1 and D 0 = JASS 04 - Digital search trees 43
44 External internal nodes Introduction of R N R N = Q N (1 + N k=1 1 Q k ) JASS 04 - Digital search trees 44
45 External internal nodes Explicit formula for C N C N = N k=2 ( N k ) ( 1) k R k JASS 04 - Digital search trees 45
46 External internal nodes Simpler coefficients R N R N = (N + 1 α) qn+1 1 q N q N+1 R N JASS 04 - Digital search trees 46
47 External internal nodes The meromorphic function R (z) R (z) = i=2 (z i α) q z+1+i i j=0 (1 qz+1+j ) JASS 04 - Digital search trees 47
48 External internal nodes The meromorphic function R (z) 4 y z JASS 04 - Digital search trees 48
49 External internal nodes Explicit formula for C N C N = (N 1) (α + 1) k=2 ( N k ) ( 1) k R k JASS 04 - Digital search trees 49
50 External internal nodes Applying Rice s method C N (N 1) (α + 1) = 1 2πi C B (N + 1, z) R (z 2) dz JASS 04 - Digital search trees 50
51 External internal nodes Approximation with Rectangle R XY C N (N 1) (α + 1) = 1 2πi R XY B (N + 1, z) R (z 2) dz R JASS 04 - Digital search trees 51
52 External internal nodes Approximation of the integral O ( Y Y ) Γ (N + 1) Γ ( N + 1 iy) dy 2 = O ( Y Y ) N 1 2 iy dy = O ( ) N JASS 04 - Digital search trees 52
53 External internal nodes Residue at z = 1 z=1 = N ( β Q ( α 2 α 1 )) ln q JASS 04 - Digital search trees 53
54 δ (N) = External internal nodes Residues at z = 1 ± 2πik ln q 2πik Q ln q k 0 ( 1 ln q Γ 1 2πik ) 2πik lg N e ln q JASS 04 - Digital search trees 54
55 External internal nodes Average case C N = N ( β Q ( ) 1 ln 2 + α2 α ) + δ (N) +O ( ) N JASS 04 - Digital search trees 55
56 content Tree Digital search tree: Definition Average case analysis: Internal path length External internal nodes Multiway branching Tries General framework JASS 04 - Digital search trees 56
57 Multiway branching Fundamental recurrence relation for external nodes C [M] N = k 1 +k k M =N 1 ( ) ( M ) 1 N 1 C [M] M N 1 k k 1, k 2,..., k i M i=1 with C [M] 1 = 1 and C [M] 0 = JASS 04 - Digital search trees 57
58 Multiway branching Fundamental recurrence relation for external nodes C [M] N = M k 1 +k k M =N 1 ( ) 1 N 1 C [M] M N 1 k k 1, k 2,..., k 1 M with C [M] 1 = 1 and C [M] 0 = JASS 04 - Digital search trees 58
59 Multiway branching Transformation C [M] (z) = N=0 C [M] (z) = 1 + MC [M] ( z M C [M] N zn N! ) ( e ( ) 1 1 M )z JASS 04 - Digital search trees 59
60 Multiway branching average case for external nodes C [M] N = N ( β [M] Nδ [M] (N) ( ) +O N 1 2 Q [M] ( ) ) 1 ln M + α[m]2 α [M] JASS 04 - Digital search trees 60
61 content Tree Digital search tree Tries Defintions Average case analysis General framework JASS 04 - Digital search trees 61
62 content Tree Digital search tree Tries: Defintion of Digital search trie Patricia trie Average case analysis General framework JASS 04 - Digital search trees 62
63 Digital search trie A digital search trie is a digital tree for storing a set of strings in which there is one node for every prefix of every string in the set JASS 04 - Digital search trees 63
64 Patricia trie A Patricia tree is defined as a compact representation of a digital search trie where all nodes with one child are merged with their parent JASS 04 - Digital search trees 64
65 content Tree Digital search tree: Tries: Defintions Average case analysis: External path length External internal nodes General framework JASS 04 - Digital search trees 65
66 content Tree Digital search tree Tries: Defintions Average case analysis: External path length External internal nodes General framework JASS 04 - Digital search trees 66
67 External path length for digital search trie Fundamental recurrence relation A [T ] N = N + k=0 with A [T ] 0 = A [T ] 1 = N ( N k ) ( ) A [T ] k + A [T ] N k, N JASS 04 - Digital search trees 67
68 External path length for digital search trie Transformation A [T ] (z) = z (e z 1) + 2A [T ] ( z 2 ) e z JASS 04 - Digital search trees 68
69 External path length for digital search trie Substitution by B (z) A (z) = e z B (z) B [T ] (z) = z ( 1 e z) + 2B [T ] ( z 2 ) JASS 04 - Digital search trees 69
70 External path length for digital search trie Explicit formula A [T ] N B [T ] (z) = = k=2 ( N k N ( 1)N ) N 1 1 ( 1 2 ) k ( 1) k 1 ( ) 1 k JASS 04 - Digital search trees 70
71 External path length for digital search trie average case A [T ] N ( γ = N lg N + N ln ) 2 + δ (N) + O(1) JASS 04 - Digital search trees 71
72 External path length for Patricia trie Fundamental recurrence relation ( A [P ] N = N 1 1 ) + 2 N 1 k=0 1 2 N ( N k ) ( ) A [P ] k + A [P ] N k, N JASS 04 - Digital search trees 72
73 External path length for Patricia trie Transformation A [P ] (z) = z ( ) e z e z 2 + 2A [P ] ( z 2) e z JASS 04 - Digital search trees 73
74 External path length for Patricia trie Substitution B [P ] (z) = z ( ) 1 e z 2 + 2B [P ] ( z 2) B [P ] (z) = N ( 1)N 2 N JASS 04 - Digital search trees 74
75 External path length for Patricia trie Explicit formula A [P ] N = k=2 ( N k ) k ( 1) k 2 k 1 1 = A[T ] N N JASS 04 - Digital search trees 75
76 content Tree Digital search tree Tries: Defintions Average case analysis: External path length External internal nodes General framework JASS 04 - Digital search trees 76
77 External internal nodes for Patricia trie Fundamental recurrence relation C [P ] N = 1 2 N ( N k with C [P ] 0 = C [P ] 1 = 0 and C [P ] 2 = 1 ) ( ) C [P ] k + C [P ] N k, N JASS 04 - Digital search trees 77
78 External internal nodes for Patricia trie Transformation C [P ] (z) = ( z 2 ) 2 + 2C [P ] ( z 2) e z JASS 04 - Digital search trees 78
79 External internal nodes for Patricia trie Substitution D [P ] (z) = ( z 2 ) 2 e z + 2D [P ] ( z 2) JASS 04 - Digital search trees 79
80 External internal nodes for Patricia trie Explicit formula C [P ] N = 1 4 N k=2 ( N k ) k (k 1) ( 1) k 1 1 k JASS 04 - Digital search trees 80
81 External internal nodes for Patricia trie average case ( ) C [P ] 1 N = N 4 ln 2 + δ[p ] (N) JASS 04 - Digital search trees 81
82 content Tree Digital search tree Trie General framework JASS 04 - Digital search trees 82
83 General Framework for digital search trees Fundamental recurrence relation X (T ) = subtrees T j of the root of T X (T j ) + x (T ) JASS 04 - Digital search trees 83
84 General Framework for digital search trees Transformation z N X (z) = X N N! N=0 ( z ) X (z) = MX e ( 1 1 M )z + x (z) M JASS 04 - Digital search trees 84
85 General Framework for digital search trees Substitution Y (z) = e z X (z) y (z) = e z x (z) ( z ) Y (z) + Y (z) = MY + y (z) + y (z) M JASS 04 - Digital search trees 85
86 General Framework for digital search trees Explicit formula X N = N k=0 ( N k ) Y k JASS 04 - Digital search trees 86
87 General Framework for digital search trees Find a function Y k which Asymptotic analysis of ( 1) k Y k (i) is simply related to Y k so that N k=0 ( N k easily evaluated, (ii) satisfies a recurrence of the form Y N+1 = (1 g (M, N)) Y N (iii) goes to zero quickly as N. + f (M, N), ) ( ) Y k ( 1) k Yk is JASS 04 - Digital search trees 87
88 General Framework for digital search trees Asymptotic analysis of ( 1) k Y k Turn the recurrence around to extend Y N Evaluate N k=0 ( N k sections. ) ( Y k ( 1) k Y k ) to the complex plane. as detailed in the previous JASS 04 - Digital search trees 88
89 General Framework for tries X (T ) = X (T j ) + x (T ) subtrees T j of the root of T X (z) = MX ( z M ) e z M + x (z) This can be solved by Rice s method or also by Mellin transform techniques JASS 04 - Digital search trees 89
90 Thank you for your attention! JASS 04 - Digital search trees 90
Suggested Homework Solutions
Suggested Homework Solutions Chapter Fourteen Section #9: Real and Imaginary parts of /z: z = x + iy = x + iy x iy ( ) x iy = x #9: Real and Imaginary parts of ln z: + i ( y ) ln z = ln(re iθ ) = ln r
More informationProbabilistic analysis of the asymmetric digital search trees
Int. J. Nonlinear Anal. Appl. 6 2015 No. 2, 161-173 ISSN: 2008-6822 electronic http://dx.doi.org/10.22075/ijnaa.2015.266 Probabilistic analysis of the asymmetric digital search trees R. Kazemi a,, M. Q.
More informationTTIC 31230, Fundamentals of Deep Learning David McAllester, April Information Theory and Distribution Modeling
TTIC 31230, Fundamentals of Deep Learning David McAllester, April 2017 Information Theory and Distribution Modeling Why do we model distributions and conditional distributions using the following objective
More informationMATH 311: COMPLEX ANALYSIS CONTOUR INTEGRALS LECTURE
MATH 3: COMPLEX ANALYSIS CONTOUR INTEGRALS LECTURE Recall the Residue Theorem: Let be a simple closed loop, traversed counterclockwise. Let f be a function that is analytic on and meromorphic inside. Then
More informationROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( )
ON PROTECTED NODES IN DIGITAL SEARCH TREES ROSENA R.X. DU AND HELMUT PRODINGER Dedicated to Philippe Flajolet (98 2) Abstract. Recently, 2-protected nodes were studied in the context of ordered trees and
More informationComplex Analysis Math 185A, Winter 2010 Final: Solutions
Complex Analysis Math 85A, Winter 200 Final: Solutions. [25 pts] The Jacobian of two real-valued functions u(x, y), v(x, y) of (x, y) is defined by the determinant (u, v) J = (x, y) = u x u y v x v y.
More informationSOLUTIONS OF SELECTED PROBLEMS
SOLUTIONS OF SELECTED PROBLEMS Problem 36, p. 63 If µ(e n < and χ En f in L, then f is a.e. equal to a characteristic function of a measurable set. Solution: By Corollary.3, there esists a subsequence
More informationThe variance for partial match retrievals in k-dimensional bucket digital trees
The variance for partial match retrievals in k-dimensional ucket digital trees Michael FUCHS Department of Applied Mathematics National Chiao Tung University January 12, 21 Astract The variance of partial
More informationBinary Decision Diagrams. Graphs. Boolean Functions
Binary Decision Diagrams Graphs Binary Decision Diagrams (BDDs) are a class of graphs that can be used as data structure for compactly representing boolean functions. BDDs were introduced by R. Bryant
More informationSolutions to practice problems for the final
Solutions to practice problems for the final Holomorphicity, Cauchy-Riemann equations, and Cauchy-Goursat theorem 1. (a) Show that there is a holomorphic function on Ω = {z z > 2} whose derivative is z
More informationThe Moments of the Profile in Random Binary Digital Trees
Journal of mathematics and computer science 6(2013)176-190 The Moments of the Profile in Random Binary Digital Trees Ramin Kazemi and Saeid Delavar Department of Statistics, Imam Khomeini International
More informationAverage Case Analysis of QuickSort and Insertion Tree Height using Incompressibility
Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility Tao Jiang, Ming Li, Brendan Lucier September 26, 2005 Abstract In this paper we study the Kolmogorov Complexity of a
More informationPROBLEM SET 3 FYS3140
PROBLEM SET FYS40 Problem. (Cauchy s theorem and integral formula) Cauchy s integral formula f(a) = πi z a dz πi f(a) a in z a dz = 0 otherwise we solve the following problems by comparing the integrals
More informationNotes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.
Lecture: Hélène Barcelo Analytic Combinatorics ECCO 202, Bogotá Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.. Tuesday, June 2, 202 Combinatorics is the study of finite structures that
More informationMultiple Choice Tries and Distributed Hash Tables
Multiple Choice Tries and Distributed Hash Tables Luc Devroye and Gabor Lugosi and Gahyun Park and W. Szpankowski January 3, 2007 McGill University, Montreal, Canada U. Pompeu Fabra, Barcelona, Spain U.
More informationE D I C T The internal extent formula for compacted tries
E D C T The internal extent formula for compacted tries Paolo Boldi Sebastiano Vigna Università degli Studi di Milano, taly Abstract t is well known [Knu97, pages 399 4] that in a binary tree the external
More information7 Asymptotics for Meromorphic Functions
Lecture G jacques@ucsd.edu 7 Asymptotics for Meromorphic Functions Hadamard s Theorem gives a broad description of the exponential growth of coefficients in power series, but the notion of exponential
More informationLecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018
CS17 Integrated Introduction to Computer Science Klein Contents Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 1 Tree definitions 1 2 Analysis of mergesort using a binary tree 1 3 Analysis of
More informationCS60007 Algorithm Design and Analysis 2018 Assignment 1
CS60007 Algorithm Design and Analysis 2018 Assignment 1 Palash Dey and Swagato Sanyal Indian Institute of Technology, Kharagpur Please submit the solutions of the problems 6, 11, 12 and 13 (written in
More informationRENEWAL THEORY IN ANALYSIS OF TRIES AND STRINGS: EXTENDED ABSTRACT
RENEWAL THEORY IN ANALYSIS OF TRIES AND STRINGS: EXTENDED ABSTRACT SVANTE JANSON Abstract. We give a survey of a number of simple applications of renewal theory to problems on random strings, in particular
More informationBinary Decision Diagrams
Binary Decision Diagrams Binary Decision Diagrams (BDDs) are a class of graphs that can be used as data structure for compactly representing boolean functions. BDDs were introduced by R. Bryant in 1986.
More informationData Structures and Algorithms " Search Trees!!
Data Structures and Algorithms " Search Trees!! Outline" Binary Search Trees! AVL Trees! (2,4) Trees! 2 Binary Search Trees! "! < 6 2 > 1 4 = 8 9 Ordered Dictionaries" Keys are assumed to come from a total
More informationNearest Neighbor Search with Keywords
Nearest Neighbor Search with Keywords Yufei Tao KAIST June 3, 2013 In recent years, many search engines have started to support queries that combine keyword search with geography-related predicates (e.g.,
More informationForty years of tree enumeration
October 24, 206 Canada John Moon (Alberta) Counting labelled trees Canadian mathematical monographs What is our subject? Asymptotic enumeration or Probabilistic combinatorics? What is our subject? Asymptotic
More informationDictionary: an abstract data type
2-3 Trees 1 Dictionary: an abstract data type A container that maps keys to values Dictionary operations Insert Search Delete Several possible implementations Balanced search trees Hash tables 2 2-3 trees
More informationDictionary: an abstract data type
2-3 Trees 1 Dictionary: an abstract data type A container that maps keys to values Dictionary operations Insert Search Delete Several possible implementations Balanced search trees Hash tables 2 2-3 trees
More informationCombinatorial/probabilistic analysis of a class of search-tree functionals
Combinatorial/probabilistic analysis of a class of search-tree functionals Jim Fill jimfill@jhu.edu http://www.mts.jhu.edu/ fill/ Mathematical Sciences The Johns Hopkins University Joint Statistical Meetings;
More informationINF2220: algorithms and data structures Series 1
Universitetet i Oslo Institutt for Informatikk I. Yu, D. Karabeg INF2220: algorithms and data structures Series 1 Topic Function growth & estimation of running time, trees (Exercises with hints for solution)
More informationInformation Theory and Statistics Lecture 2: Source coding
Information Theory and Statistics Lecture 2: Source coding Łukasz Dębowski ldebowsk@ipipan.waw.pl Ph. D. Programme 2013/2014 Injections and codes Definition (injection) Function f is called an injection
More informationAsymptotic Enumeration of Compacted Binary Trees
Asymptotic Enumeration of Compacted Binary Trees Antoine Genitrini Bernhard Gittenberger Manuel Kauers Michael Wallner March 30, 207 Abstract A compacted tree is a graph created from a binary tree such
More informationChapter 11. Min Cut Min Cut Problem Definition Some Definitions. By Sariel Har-Peled, December 10, Version: 1.
Chapter 11 Min Cut By Sariel Har-Peled, December 10, 013 1 Version: 1.0 I built on the sand And it tumbled down, I built on a rock And it tumbled down. Now when I build, I shall begin With the smoke from
More informationChapter 5 Data Structures Algorithm Theory WS 2017/18 Fabian Kuhn
Chapter 5 Data Structures Algorithm Theory WS 2017/18 Fabian Kuhn Priority Queue / Heap Stores (key,data) pairs (like dictionary) But, different set of operations: Initialize-Heap: creates new empty heap
More informationMath 213br HW 1 solutions
Math 213br HW 1 solutions February 26, 2014 Problem 1 Let P (x) be a polynomial of degree d > 1 with P (x) > 0 for all x 0. For what values of α R does the integral I(α) = 0 x α P (x) dx converge? Give
More informationUnderstanding the Prime Number Theorem
Understanding the Prime Number Theorem Misunderstood Monster or Beautiful Theorem? Liam Fowl September 5, 2014 Liam Fowl Understanding the Prime Number Theorem 1/20 Outline 1 Introduction 2 Complex Plane
More informationAdvanced Implementations of Tables: Balanced Search Trees and Hashing
Advanced Implementations of Tables: Balanced Search Trees and Hashing Balanced Search Trees Binary search tree operations such as insert, delete, retrieve, etc. depend on the length of the path to the
More information= F (b) F (a) F (x i ) F (x i+1 ). a x 0 x 1 x n b i
Real Analysis Problem 1. If F : R R is a monotone function, show that F T V ([a,b]) = F (b) F (a) for any interval [a, b], and that F has bounded variation on R if and only if it is bounded. Here F T V
More informationMA 412 Complex Analysis Final Exam
MA 4 Complex Analysis Final Exam Summer II Session, August 9, 00.. Find all the values of ( 8i) /3. Sketch the solutions. Answer: We start by writing 8i in polar form and then we ll compute the cubic root:
More information16. Binary Search Trees. [Ottman/Widmayer, Kap. 5.1, Cormen et al, Kap ]
418 16. Binary Search Trees [Ottman/Widmayer, Kap. 5.1, Cormen et al, Kap. 12.1-12.3] 419 Dictionary implementation Hashing: implementation of dictionaries with expected very fast access times. Disadvantages
More information. Then g is holomorphic and bounded in U. So z 0 is a removable singularity of g. Since f(z) = w 0 + 1
Now we describe the behavior of f near an isolated singularity of each kind. We will always assume that z 0 is a singularity of f, and f is holomorphic on D(z 0, r) \ {z 0 }. Theorem 4.2.. z 0 is a removable
More informationEach internal node v with d(v) children stores d 1 keys. k i 1 < key in i-th sub-tree k i, where we use k 0 = and k d =.
7.5 (a, b)-trees 7.5 (a, b)-trees Definition For b a an (a, b)-tree is a search tree with the following properties. all leaves have the same distance to the root. every internal non-root vertex v has at
More informationPART III. Outline. Codes and Cryptography. Sources. Optimal Codes (I) Jorge L. Villar. MAMME, Fall 2015
Outline Codes and Cryptography 1 Information Sources and Optimal Codes 2 Building Optimal Codes: Huffman Codes MAMME, Fall 2015 3 Shannon Entropy and Mutual Information PART III Sources Information source:
More information16. Binary Search Trees. [Ottman/Widmayer, Kap. 5.1, Cormen et al, Kap ]
423 16. Binary Search Trees [Ottman/Widmayer, Kap. 5.1, Cormen et al, Kap. 12.1-12.3] Dictionary implementation 424 Hashing: implementation of dictionaries with expected very fast access times. Disadvantages
More informationMore Dynamic Programming
CS 374: Algorithms & Models of Computation, Spring 2017 More Dynamic Programming Lecture 14 March 9, 2017 Chandra Chekuri (UIUC) CS374 1 Spring 2017 1 / 42 What is the running time of the following? Consider
More information(z + n) 2. n=0. 2 (z + 2) (z + n). 2 We d like to compute this as an integral. To this end, we d like a function with residues
8. Stirling Formula Stirling s Formula is a classical formula to compute n! accurately when n is large. We will derive a version of Stirling s formula using complex analysis and residues. Recall the formula
More informationMore Dynamic Programming
Algorithms & Models of Computation CS/ECE 374, Fall 2017 More Dynamic Programming Lecture 14 Tuesday, October 17, 2017 Sariel Har-Peled (UIUC) CS374 1 Fall 2017 1 / 48 What is the running time of the following?
More informationAsymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas)
Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University
More informationMath Final Exam.
Math 106 - Final Exam. This is a closed book exam. No calculators are allowed. The exam consists of 8 questions worth 100 points. Good luck! Name: Acknowledgment and acceptance of honor code: Signature:
More informationENS Lyon Camp. Day 2. Basic group. Cartesian Tree. 26 October
ENS Lyon Camp. Day 2. Basic group. Cartesian Tree. 26 October Contents 1 Cartesian Tree. Definition. 1 2 Cartesian Tree. Construction 1 3 Cartesian Tree. Operations. 2 3.1 Split............................................
More informationAVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES
J. Appl. Prob. 45, 888 9 (28) Printed in England Applied Probability Trust 28 AVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES HOSAM M. MAHMOUD, The George Washington University MARK DANIEL WARD, Purdue
More informationString Complexity. Dedicated to Svante Janson for his 60 Birthday
String Complexity Wojciech Szpankowski Purdue University W. Lafayette, IN 47907 June 1, 2015 Dedicated to Svante Janson for his 60 Birthday Outline 1. Working with Svante 2. String Complexity 3. Joint
More informationTree Decompositions and Tree-Width
Tree Decompositions and Tree-Width CS 511 Iowa State University December 6, 2010 CS 511 (Iowa State University) Tree Decompositions and Tree-Width December 6, 2010 1 / 15 Tree Decompositions Definition
More informationSolution for Final Review Problems 1
Solution for Final Review Problems Final time and location: Dec. Gymnasium, Rows 23, 25 5, 2, Wednesday, 9-2am, Main ) Let fz) be the principal branch of z i. a) Find f + i). b) Show that fz )fz 2 ) λfz
More informationPart IB Complex Analysis
Part IB Complex Analysis Theorems Based on lectures by I. Smith Notes taken by Dexter Chua Lent 2016 These notes are not endorsed by the lecturers, and I have modified them (often significantly) after
More informationAnalysis of Algorithms. Outline 1 Introduction Basic Definitions Ordered Trees. Fibonacci Heaps. Andres Mendez-Vazquez. October 29, Notes.
Analysis of Algorithms Fibonacci Heaps Andres Mendez-Vazquez October 29, 2015 1 / 119 Outline 1 Introduction Basic Definitions Ordered Trees 2 Binomial Trees Example 3 Fibonacci Heap Operations Fibonacci
More informationCS Data Structures and Algorithm Analysis
CS 483 - Data Structures and Algorithm Analysis Lecture VII: Chapter 6, part 2 R. Paul Wiegand George Mason University, Department of Computer Science March 22, 2006 Outline 1 Balanced Trees 2 Heaps &
More informationHW #4. (mostly by) Salim Sarımurat. 1) Insert 6 2) Insert 8 3) Insert 30. 4) Insert S a.
HW #4 (mostly by) Salim Sarımurat 04.12.2009 S. 1. 1. a. 1) Insert 6 2) Insert 8 3) Insert 30 4) Insert 40 2 5) Insert 50 6) Insert 61 7) Insert 70 1. b. 1) Insert 12 2) Insert 29 3) Insert 30 4) Insert
More informationMATH 452. SAMPLE 3 SOLUTIONS May 3, (10 pts) Let f(x + iy) = u(x, y) + iv(x, y) be an analytic function. Show that u(x, y) is harmonic.
MATH 45 SAMPLE 3 SOLUTIONS May 3, 06. (0 pts) Let f(x + iy) = u(x, y) + iv(x, y) be an analytic function. Show that u(x, y) is harmonic. Because f is holomorphic, u and v satisfy the Cauchy-Riemann equations:
More informationAssignment 5: Solutions
Comp 21: Algorithms and Data Structures Assignment : Solutions 1. Heaps. (a) First we remove the minimum key 1 (which we know is located at the root of the heap). We then replace it by the key in the position
More informationLars Schmidt-Thieme, Information Systems and Machine Learning Lab (ISMLL), University of Hildesheim, Germany
Syllabus Fri. 21.10. (1) 0. Introduction A. Supervised Learning: Linear Models & Fundamentals Fri. 27.10. (2) A.1 Linear Regression Fri. 3.11. (3) A.2 Linear Classification Fri. 10.11. (4) A.3 Regularization
More informationComplex Analysis Math 205A, Winter 2014 Final: Solutions
Part I: Short Questions Complex Analysis Math 205A, Winter 2014 Final: Solutions I.1 [5%] State the Cauchy-Riemann equations for a holomorphic function f(z) = u(x,y)+iv(x,y). The Cauchy-Riemann equations
More informationReconstruction of certain phylogenetic networks from their tree-average distances
Reconstruction of certain phylogenetic networks from their tree-average distances Stephen J. Willson Department of Mathematics Iowa State University Ames, IA 50011 USA swillson@iastate.edu October 10,
More informationOn the Average Path Length of Complete m-ary Trees
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 17 2014, Article 14.6.3 On the Average Path Length of Complete m-ary Trees M. A. Nyblom School of Mathematics and Geospatial Science RMIT University
More informationComplex Analysis Important Concepts
Complex Analysis Important Concepts Travis Askham April 1, 2012 Contents 1 Complex Differentiation 2 1.1 Definition and Characterization.............................. 2 1.2 Examples..........................................
More informationComputational Models - Lecture 5 1
Computational Models - Lecture 5 1 Handout Mode Iftach Haitner. Tel Aviv University. November 28, 2016 1 Based on frames by Benny Chor, Tel Aviv University, modifying frames by Maurice Herlihy, Brown University.
More informationAlgorithm Design CS 515 Fall 2015 Sample Final Exam Solutions
Algorithm Design CS 515 Fall 2015 Sample Final Exam Solutions Copyright c 2015 Andrew Klapper. All rights reserved. 1. For the functions satisfying the following three recurrences, determine which is the
More information6.1 The Pumping Lemma for CFLs 6.2 Intersections and Complements of CFLs
CSC4510/6510 AUTOMATA 6.1 The Pumping Lemma for CFLs 6.2 Intersections and Complements of CFLs The Pumping Lemma for Context Free Languages One way to prove AnBn is not regular is to use the pumping lemma
More informationMath Homework 2
Math 73 Homework Due: September 8, 6 Suppose that f is holomorphic in a region Ω, ie an open connected set Prove that in any of the following cases (a) R(f) is constant; (b) I(f) is constant; (c) f is
More information1. Prove: A full m- ary tree with i internal vertices contains n = mi + 1 vertices.
1. Prove: A full m- ary tree with i internal vertices contains n = mi + 1 vertices. Proof: Every vertex, except the root, is the child of an internal vertex. Since there are i internal vertices, each of
More informationLecture 4 : Adaptive source coding algorithms
Lecture 4 : Adaptive source coding algorithms February 2, 28 Information Theory Outline 1. Motivation ; 2. adaptive Huffman encoding ; 3. Gallager and Knuth s method ; 4. Dictionary methods : Lempel-Ziv
More informationBayesian Networks and Markov Random Fields
Bayesian Networks and Markov Random Fields 1 Bayesian Networks We will use capital letters for random variables and lower case letters for values of those variables. A Bayesian network is a triple V, G,
More informationHierarchical Overlap Graph
Hierarchical Overlap Graph B. Cazaux and E. Rivals LIRMM & IBC, Montpellier 8. Feb. 2018 arxiv:1802.04632 2018 B. Cazaux & E. Rivals 1 / 29 Overlap Graph for a set of words Consider the set P := {abaa,
More informationDisjoint Sets : ADT. Disjoint-Set : Find-Set
Disjoint Sets : ADT Disjoint-Set Forests Make-Set( x ) Union( s, s ) Find-Set( x ) : π( ) : π( ) : ν( log * n ) amortized cost 6 9 {,, 9,, 6} set # {} set # 7 5 {5, 7, } set # Disjoint-Set : Find-Set Disjoint
More information(1) Let f(z) be the principal branch of z 4i. (a) Find f(i). Solution. f(i) = exp(4i Log(i)) = exp(4i(π/2)) = e 2π. (b) Show that
Let fz be the principal branch of z 4i. a Find fi. Solution. fi = exp4i Logi = exp4iπ/2 = e 2π. b Show that fz fz 2 fz z 2 fz fz 2 = λfz z 2 for all z, z 2 0, where λ =, e 8π or e 8π. Proof. We have =
More informationPart IB. Further Analysis. Year
Year 2004 2003 2002 2001 10 2004 2/I/4E Let τ be the topology on N consisting of the empty set and all sets X N such that N \ X is finite. Let σ be the usual topology on R, and let ρ be the topology on
More informationAnalytic Information Theory: From Shannon to Knuth and Back. Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth
Analytic Information Theory: From Shannon to Knuth and Back Wojciech Szpankowski Center for Science of Information Purdue University January 7, 2018 Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth
More informationAnalytic Depoissonization and Its Applications
Analytic Depoissonization and Its Applications W. Szpankowski Department of Computer Science Purdue University W. Lafayette, IN 47907 April 29, 2008 AofA and IT logos This research is supported by NSF
More informationDepartment of Mathematics, University of California, Berkeley. GRADUATE PRELIMINARY EXAMINATION, Part A Fall Semester 2014
Department of Mathematics, University of California, Berkeley YOUR 1 OR 2 DIGIT EXAM NUMBER GRADUATE PRELIMINARY EXAMINATION, Part A Fall Semester 2014 1. Please write your 1- or 2-digit exam number on
More informationDepartment of Mathematics, University of California, Berkeley. GRADUATE PRELIMINARY EXAMINATION, Part A Spring Semester 2015
Department of Mathematics, University of California, Berkeley YOUR OR 2 DIGIT EXAM NUMBER GRADUATE PRELIMINARY EXAMINATION, Part A Spring Semester 205. Please write your - or 2-digit exam number on this
More informationBinary Search Trees. Motivation
Binary Search Trees Motivation Searching for a particular record in an unordered list takes O(n), too slow for large lists (databases) If the list is ordered, can use an array implementation and use binary
More informationMidterm 2 for CS 170
UC Berkeley CS 170 Midterm 2 Lecturer: Gene Myers November 9 Midterm 2 for CS 170 Print your name:, (last) (first) Sign your name: Write your section number (e.g. 101): Write your sid: One page of notes
More informationProblem Set 7 Solution Set
Problem Set 7 Solution Set Anthony Varilly Math 3: Complex Analysis, Fall 22 Let P (z be a polynomial Prove there exists a real positive number ɛ with the following property: for all non-zero complex numbers
More informationEvaluation of integrals
Evaluation of certain contour integrals: Type I Type I: Integrals of the form 2π F (cos θ, sin θ) dθ If we take z = e iθ, then cos θ = 1 (z + 1 ), sin θ = 1 (z 1 dz ) and dθ = 2 z 2i z iz. Substituting
More informationInteger Sorting on the word-ram
Integer Sorting on the word-rm Uri Zwick Tel viv University May 2015 Last updated: June 30, 2015 Integer sorting Memory is composed of w-bit words. rithmetical, logical and shift operations on w-bit words
More informationChapter 10 Search Structures
Chapter 1 Search Structures 1 1.2 AVL Trees : 동기 Objective : maintain binary search tree structure for O(log n) access time with dynamic changes of identifiers (i.e., elements) in the tree. JULY APR AUG
More informationLecture 18 April 26, 2012
6.851: Advanced Data Structures Spring 2012 Prof. Erik Demaine Lecture 18 April 26, 2012 1 Overview In the last lecture we introduced the concept of implicit, succinct, and compact data structures, and
More informationDynamic Ordered Sets with Exponential Search Trees
Dynamic Ordered Sets with Exponential Search Trees Arne Andersson Computing Science Department Information Technology, Uppsala University Box 311, SE - 751 05 Uppsala, Sweden arnea@csd.uu.se http://www.csd.uu.se/
More informationEnumerating Regular Expressions and Their Languages
Enumerating Regular Expressions and Their Languages Jonathan Lee and Jeffrey Shallit School of Computer Science, University of Waterloo, Waterloo, ON N2L 3G1, Canada jwlee@alumni.uwaterloo.ca shallit@graceland.uwaterloo.ca
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More informationTheorem [Mean Value Theorem for Harmonic Functions] Let u be harmonic on D(z 0, R). Then for any r (0, R), u(z 0 ) = 1 z z 0 r
2. A harmonic conjugate always exists locally: if u is a harmonic function in an open set U, then for any disk D(z 0, r) U, there is f, which is analytic in D(z 0, r) and satisfies that Re f u. Since such
More informationMAT389 Fall 2016, Problem Set 11
MAT389 Fall 216, Problem Set 11 Improper integrals 11.1 In each of the following cases, establish the convergence of the given integral and calculate its value. i) x 2 x 2 + 1) 2 ii) x x 2 + 1)x 2 + 2x
More informationECE750-TXB Lecture 8: Treaps, Tries, and. Hash Tables
, and, and Hash Electrical & Computer Engineering University of Waterloo Canada February 1, 2007 Recall that a binary search tree has keys drawn from a totally ordered structure K, An inorder traversal
More informationGraphical Indices and their Applications
Georgia Southern University Digital Commons@Georgia Southern Electronic Theses and Dissertations Graduate Studies, Jack N. Averitt College of Spring 2010 Graphical Indices and their Applications Daniel
More informationCMPSCI 311: Introduction to Algorithms Second Midterm Exam
CMPSCI 311: Introduction to Algorithms Second Midterm Exam April 11, 2018. Name: ID: Instructions: Answer the questions directly on the exam pages. Show all your work for each question. Providing more
More informationICS141: Discrete Mathematics for Computer Science I
ICS141: Discrete Mathematics for Computer Science I Dept. Information & Computer Sci., Jan Stelovsky based on slides by Dr. Baek and Dr. Still Originals by Dr. M. P. Frank and Dr. J.L. Gross Provided by
More informationProblem. Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26
Binary Search Introduction Problem Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26 Strategy 1: Random Search Randomly select a page until the page containing
More informationBasic Sampling Methods
Basic Sampling Methods Sargur Srihari srihari@cedar.buffalo.edu 1 1. Motivation Topics Intractability in ML How sampling can help 2. Ancestral Sampling Using BNs 3. Transforming a Uniform Distribution
More informationGraphs and Trees Binary Search Trees AVL-Trees (a,b)-trees Splay-Trees. Search Trees. Tobias Lieber. April 14, 2008
Search Trees Tobias Lieber April 14, 2008 Tobias Lieber Search Trees April 14, 2008 1 / 57 Graphs and Trees Binary Search Trees AVL-Trees (a,b)-trees Splay-Trees Tobias Lieber Search Trees April 14, 2008
More informationSpace-Efficient Construction Algorithm for Circular Suffix Tree
Space-Efficient Construction Algorithm for Circular Suffix Tree Wing-Kai Hon, Tsung-Han Ku, Rahul Shah and Sharma Thankachan CPM2013 1 Outline Preliminaries and Motivation Circular Suffix Tree Our Indexes
More informationMathematics of Physics and Engineering II: Homework problems
Mathematics of Physics and Engineering II: Homework problems Homework. Problem. Consider four points in R 3 : P (,, ), Q(,, 2), R(,, ), S( + a,, 2a), where a is a real number. () Compute the coordinates
More informationA Master Theorem for Discrete Divide and Conquer Recurrences. Dedicated to PHILIPPE FLAJOLET
A Master Theorem for Discrete Divide and Conquer Recurrences Wojciech Szpankowski Department of Computer Science Purdue University U.S.A. September 6, 2012 Uniwersytet Jagieloński, Kraków, 2012 Dedicated
More information