Digital search trees JASS

Size: px
Start display at page:

Download "Digital search trees JASS"

Transcription

1 Digital search trees Analysis of different digital trees with Rice s integrals. JASS Nicolai v. Hoyningen-Huene JASS 04 - Digital search trees 1

2 content Tree Digital search tree: Definition Average case analysis Tries: Definition Average case analysis General framework JASS 04 - Digital search trees 2

3 content Tree Digital search tree Tries General framework JASS 04 - Digital search trees 3

4 Tree JASS 04 - Digital search trees 4

5 Tree Definition 0.1 A tree is defined in several ways: 1. A connected, undirected, acyclic graph. It is rooted and ordered unless otherwise specified. 2. A data structure accessed beginning at the root node. Each node is either a leaf or an internal node. An internal node has one or more child nodes and is called the parent of its child nodes. All children of the same node are siblings. 3. A tree is either empty (no nodes), or a root and zero or more subtrees. The subtrees are ordered JASS 04 - Digital search trees 5

6 Search tree JASS 04 - Digital search trees 6

7 content Tree Digital search tree: Definition Average case analysis Tries General framework JASS 04 - Digital search trees 7

8 content Tree Digital search tree: Definition Average case analysis Tries General framework JASS 04 - Digital search trees 8

9 Digital search tree JASS 04 - Digital search trees 9

10 Digital search tree A digital search tree is a dictionary implemented as a digital tree which stores strings in internal nodes, so there is no need for extra leaf nodes to store the strings JASS 04 - Digital search trees 10

11 content Tree Digital search tree: Definition Average case analysis: Internal path length External internal nodes Tries General framework JASS 04 - Digital search trees 11

12 content Tree Digital search tree: Definition Average case analysis: Internal path length External internal nodes Tries General framework JASS 04 - Digital search trees 12

13 Internal path length The internal path length of a tree is the sum of the depth of every node of the tree JASS 04 - Digital search trees 13

14 Internal path length Fundamental recurrence relation A N = N 1+ with A 0 := 0. k=0 1 2 N 1 ( ) N 1 k (A k + A N 1 k ), N JASS 04 - Digital search trees 14

15 Internal path length Transformation N=1 A N z N 1 = ze z + 2 (N 1)! k! k=0 ( z A (z) = ze z + 2A 2) A k ( z 2 e z 2 ) k e z JASS 04 - Digital search trees 15

16 Internal path length A (z) = e z B (z) = Substitution by B(z) A N = ( N=0 N k=0 ) ( z N ) z N B N N! N! N=0 ( N k ) B k JASS 04 - Digital search trees 16

17 Internal path length Substitution by B(z) ( z A (z) = ze z + 2A e 2) z 2 ( z B (z) + B (z) = z + 2B 2) B N + B N 1 = 1 2 N 2 B N JASS 04 - Digital search trees 17

18 Internal path length Substitution by B(z) N 2 B N = ( 1) N j=1 (1 12 j ) JASS 04 - Digital search trees 18

19 Internal path length Introduction of Q N Q N = N j=1 (1 12 j ) JASS 04 - Digital search trees 19

20 Internal path length Introduction of Q(x) Q (x) = j=1 (1 x 2 j ) Q (1) = Q JASS 04 - Digital search trees 20

21 Internal path length Q(x) is used for a meromorphic function of Q N Q N = Q (1) Q (2 N ) JASS 04 - Digital search trees 21

22 Internal path length The function Q(x) 4 y x JASS 04 - Digital search trees 22

23 Internal path length Explicit formula for A N A N = N k=2 ( N k ) ( 1) k Q (1) Q (2 k+2 ) JASS 04 - Digital search trees 23

24 Internal path length Rice s method N k=0 ( N k ) ( 1) k f (k) = 1 2πi C B (N + 1, z) f (z) dz JASS 04 - Digital search trees 24

25 Internal path length Application of Rice s method A N = 1 2πi C B (N + 1, z) Q (1) Q (2 z+2 ) dz JASS 04 - Digital search trees 25

26 Internal path length Beta-Function B (p, q) = Γ (p) Γ (q) Γ (p + q) JASS 04 - Digital search trees 26

27 Internal path length Beta-Function 1e+11 5e+10 z e+10 1e JASS 04 - Digital search trees 27

28 Internal path length Gamma-Function y z JASS 04 - Digital search trees 28

29 Internal path length Cauchy s theorem If f(z) is analytic in C except final number of poles a 1, a 2,..., a n inside C, then 1 2πi C f (z) dz = n Res z=ak f (z) k= JASS 04 - Digital search trees 29

30 Internal path length Approximation with Rectangle R XY with ( 1 2 ± iy, X ± iy ) A N = 1 2πi R XY B (N + 1, z) Q (1) Q (2 z+2 ) dz Res R XY /C JASS 04 - Digital search trees 30

31 Internal path length Approximation of the integral 1 2πi R XY B (N + 1, z) Q (1) Q (2 z+2 ) dz = O ( Y Y ) Γ (N + 1) Γ ( N + 1 iy) dy 2 = O ( Y Y ) N 1 2 iy dy = O ( ) N JASS 04 - Digital search trees 31

32 Internal path length Residue at z = 1 B (N + 1, z) = N z 1 N (H N 1 1) + O (z 1) H N 1 = γ + ln N O B (N + 1, z) = N z 1 ( 1 N ) N (γ + ln N 1) + O (z 1) JASS 04 - Digital search trees 32

33 Internal path length Residue at z = 1 Q (1) Q (2 z+1 ) = 1 α ln 2 (z 1) + O ( (z 1) 2) JASS 04 - Digital search trees 33

34 Internal path length Residue at z = = 1 2 z+1 1 eln 2( z+1) 1 = ( z + 1) ln z = (z 1) ln O (z 1) 2 + O ( ( z + 1) 3) JASS 04 - Digital search trees 34

35 Internal path length Residue at z = 1 z=1 = N lg N N ( γ 1 ln 2 α + 1 ) 2 + O (1) JASS 04 - Digital search trees 35

36 Internal path length Residues at z = j ± 2πik ln 2 for Q(2 z+j ) where z=1± 2πIk ln 2 δ (N) = 1 ln 2 Γ k 0 = Nδ (N) + O (1) ( 1 2πik ) 2πik lg N e ln JASS 04 - Digital search trees 36

37 Internal path length Average case A N = N lg N + N ( γ 1 ln 2 α + 1 ) 2 + δ (N) + O ( ) N JASS 04 - Digital search trees 37

38 content Tree Digital search tree: Definition Average case analysis: Internal path length External internal nodes Multiway branching Tries General framework JASS 04 - Digital search trees 38

39 External internal nodes Definition External internal nodes are nodes with both links null JASS 04 - Digital search trees 39

40 External internal nodes Fundamental recurrence relation C N = k=0 1 2 N 1 with C 1 = 1 and C 0 = 0. ( ) N 1 k (C k + C N 1 k ), N JASS 04 - Digital search trees 40

41 External internal nodes Transformation C N z N C (z) = N! N=0 ( z C (z) = 1 + 2C 2) e z JASS 04 - Digital search trees 41

42 External internal nodes Substitution by D (z) = e z C (z) D (z) = N=0 D N z N N! D (z) + D (z) = e z + 2D ( z 2) JASS 04 - Digital search trees 42

43 External internal nodes Recurrence for D N D N + D N 1 = ( 1) N D N 2 N 1 ( D N = ( 1) N ) D 2 N 2 N 1, N 2 with D 1 = 1 and D 0 = JASS 04 - Digital search trees 43

44 External internal nodes Introduction of R N R N = Q N (1 + N k=1 1 Q k ) JASS 04 - Digital search trees 44

45 External internal nodes Explicit formula for C N C N = N k=2 ( N k ) ( 1) k R k JASS 04 - Digital search trees 45

46 External internal nodes Simpler coefficients R N R N = (N + 1 α) qn+1 1 q N q N+1 R N JASS 04 - Digital search trees 46

47 External internal nodes The meromorphic function R (z) R (z) = i=2 (z i α) q z+1+i i j=0 (1 qz+1+j ) JASS 04 - Digital search trees 47

48 External internal nodes The meromorphic function R (z) 4 y z JASS 04 - Digital search trees 48

49 External internal nodes Explicit formula for C N C N = (N 1) (α + 1) k=2 ( N k ) ( 1) k R k JASS 04 - Digital search trees 49

50 External internal nodes Applying Rice s method C N (N 1) (α + 1) = 1 2πi C B (N + 1, z) R (z 2) dz JASS 04 - Digital search trees 50

51 External internal nodes Approximation with Rectangle R XY C N (N 1) (α + 1) = 1 2πi R XY B (N + 1, z) R (z 2) dz R JASS 04 - Digital search trees 51

52 External internal nodes Approximation of the integral O ( Y Y ) Γ (N + 1) Γ ( N + 1 iy) dy 2 = O ( Y Y ) N 1 2 iy dy = O ( ) N JASS 04 - Digital search trees 52

53 External internal nodes Residue at z = 1 z=1 = N ( β Q ( α 2 α 1 )) ln q JASS 04 - Digital search trees 53

54 δ (N) = External internal nodes Residues at z = 1 ± 2πik ln q 2πik Q ln q k 0 ( 1 ln q Γ 1 2πik ) 2πik lg N e ln q JASS 04 - Digital search trees 54

55 External internal nodes Average case C N = N ( β Q ( ) 1 ln 2 + α2 α ) + δ (N) +O ( ) N JASS 04 - Digital search trees 55

56 content Tree Digital search tree: Definition Average case analysis: Internal path length External internal nodes Multiway branching Tries General framework JASS 04 - Digital search trees 56

57 Multiway branching Fundamental recurrence relation for external nodes C [M] N = k 1 +k k M =N 1 ( ) ( M ) 1 N 1 C [M] M N 1 k k 1, k 2,..., k i M i=1 with C [M] 1 = 1 and C [M] 0 = JASS 04 - Digital search trees 57

58 Multiway branching Fundamental recurrence relation for external nodes C [M] N = M k 1 +k k M =N 1 ( ) 1 N 1 C [M] M N 1 k k 1, k 2,..., k 1 M with C [M] 1 = 1 and C [M] 0 = JASS 04 - Digital search trees 58

59 Multiway branching Transformation C [M] (z) = N=0 C [M] (z) = 1 + MC [M] ( z M C [M] N zn N! ) ( e ( ) 1 1 M )z JASS 04 - Digital search trees 59

60 Multiway branching average case for external nodes C [M] N = N ( β [M] Nδ [M] (N) ( ) +O N 1 2 Q [M] ( ) ) 1 ln M + α[m]2 α [M] JASS 04 - Digital search trees 60

61 content Tree Digital search tree Tries Defintions Average case analysis General framework JASS 04 - Digital search trees 61

62 content Tree Digital search tree Tries: Defintion of Digital search trie Patricia trie Average case analysis General framework JASS 04 - Digital search trees 62

63 Digital search trie A digital search trie is a digital tree for storing a set of strings in which there is one node for every prefix of every string in the set JASS 04 - Digital search trees 63

64 Patricia trie A Patricia tree is defined as a compact representation of a digital search trie where all nodes with one child are merged with their parent JASS 04 - Digital search trees 64

65 content Tree Digital search tree: Tries: Defintions Average case analysis: External path length External internal nodes General framework JASS 04 - Digital search trees 65

66 content Tree Digital search tree Tries: Defintions Average case analysis: External path length External internal nodes General framework JASS 04 - Digital search trees 66

67 External path length for digital search trie Fundamental recurrence relation A [T ] N = N + k=0 with A [T ] 0 = A [T ] 1 = N ( N k ) ( ) A [T ] k + A [T ] N k, N JASS 04 - Digital search trees 67

68 External path length for digital search trie Transformation A [T ] (z) = z (e z 1) + 2A [T ] ( z 2 ) e z JASS 04 - Digital search trees 68

69 External path length for digital search trie Substitution by B (z) A (z) = e z B (z) B [T ] (z) = z ( 1 e z) + 2B [T ] ( z 2 ) JASS 04 - Digital search trees 69

70 External path length for digital search trie Explicit formula A [T ] N B [T ] (z) = = k=2 ( N k N ( 1)N ) N 1 1 ( 1 2 ) k ( 1) k 1 ( ) 1 k JASS 04 - Digital search trees 70

71 External path length for digital search trie average case A [T ] N ( γ = N lg N + N ln ) 2 + δ (N) + O(1) JASS 04 - Digital search trees 71

72 External path length for Patricia trie Fundamental recurrence relation ( A [P ] N = N 1 1 ) + 2 N 1 k=0 1 2 N ( N k ) ( ) A [P ] k + A [P ] N k, N JASS 04 - Digital search trees 72

73 External path length for Patricia trie Transformation A [P ] (z) = z ( ) e z e z 2 + 2A [P ] ( z 2) e z JASS 04 - Digital search trees 73

74 External path length for Patricia trie Substitution B [P ] (z) = z ( ) 1 e z 2 + 2B [P ] ( z 2) B [P ] (z) = N ( 1)N 2 N JASS 04 - Digital search trees 74

75 External path length for Patricia trie Explicit formula A [P ] N = k=2 ( N k ) k ( 1) k 2 k 1 1 = A[T ] N N JASS 04 - Digital search trees 75

76 content Tree Digital search tree Tries: Defintions Average case analysis: External path length External internal nodes General framework JASS 04 - Digital search trees 76

77 External internal nodes for Patricia trie Fundamental recurrence relation C [P ] N = 1 2 N ( N k with C [P ] 0 = C [P ] 1 = 0 and C [P ] 2 = 1 ) ( ) C [P ] k + C [P ] N k, N JASS 04 - Digital search trees 77

78 External internal nodes for Patricia trie Transformation C [P ] (z) = ( z 2 ) 2 + 2C [P ] ( z 2) e z JASS 04 - Digital search trees 78

79 External internal nodes for Patricia trie Substitution D [P ] (z) = ( z 2 ) 2 e z + 2D [P ] ( z 2) JASS 04 - Digital search trees 79

80 External internal nodes for Patricia trie Explicit formula C [P ] N = 1 4 N k=2 ( N k ) k (k 1) ( 1) k 1 1 k JASS 04 - Digital search trees 80

81 External internal nodes for Patricia trie average case ( ) C [P ] 1 N = N 4 ln 2 + δ[p ] (N) JASS 04 - Digital search trees 81

82 content Tree Digital search tree Trie General framework JASS 04 - Digital search trees 82

83 General Framework for digital search trees Fundamental recurrence relation X (T ) = subtrees T j of the root of T X (T j ) + x (T ) JASS 04 - Digital search trees 83

84 General Framework for digital search trees Transformation z N X (z) = X N N! N=0 ( z ) X (z) = MX e ( 1 1 M )z + x (z) M JASS 04 - Digital search trees 84

85 General Framework for digital search trees Substitution Y (z) = e z X (z) y (z) = e z x (z) ( z ) Y (z) + Y (z) = MY + y (z) + y (z) M JASS 04 - Digital search trees 85

86 General Framework for digital search trees Explicit formula X N = N k=0 ( N k ) Y k JASS 04 - Digital search trees 86

87 General Framework for digital search trees Find a function Y k which Asymptotic analysis of ( 1) k Y k (i) is simply related to Y k so that N k=0 ( N k easily evaluated, (ii) satisfies a recurrence of the form Y N+1 = (1 g (M, N)) Y N (iii) goes to zero quickly as N. + f (M, N), ) ( ) Y k ( 1) k Yk is JASS 04 - Digital search trees 87

88 General Framework for digital search trees Asymptotic analysis of ( 1) k Y k Turn the recurrence around to extend Y N Evaluate N k=0 ( N k sections. ) ( Y k ( 1) k Y k ) to the complex plane. as detailed in the previous JASS 04 - Digital search trees 88

89 General Framework for tries X (T ) = X (T j ) + x (T ) subtrees T j of the root of T X (z) = MX ( z M ) e z M + x (z) This can be solved by Rice s method or also by Mellin transform techniques JASS 04 - Digital search trees 89

90 Thank you for your attention! JASS 04 - Digital search trees 90

Suggested Homework Solutions

Suggested Homework Solutions Suggested Homework Solutions Chapter Fourteen Section #9: Real and Imaginary parts of /z: z = x + iy = x + iy x iy ( ) x iy = x #9: Real and Imaginary parts of ln z: + i ( y ) ln z = ln(re iθ ) = ln r

More information

Probabilistic analysis of the asymmetric digital search trees

Probabilistic analysis of the asymmetric digital search trees Int. J. Nonlinear Anal. Appl. 6 2015 No. 2, 161-173 ISSN: 2008-6822 electronic http://dx.doi.org/10.22075/ijnaa.2015.266 Probabilistic analysis of the asymmetric digital search trees R. Kazemi a,, M. Q.

More information

TTIC 31230, Fundamentals of Deep Learning David McAllester, April Information Theory and Distribution Modeling

TTIC 31230, Fundamentals of Deep Learning David McAllester, April Information Theory and Distribution Modeling TTIC 31230, Fundamentals of Deep Learning David McAllester, April 2017 Information Theory and Distribution Modeling Why do we model distributions and conditional distributions using the following objective

More information

MATH 311: COMPLEX ANALYSIS CONTOUR INTEGRALS LECTURE

MATH 311: COMPLEX ANALYSIS CONTOUR INTEGRALS LECTURE MATH 3: COMPLEX ANALYSIS CONTOUR INTEGRALS LECTURE Recall the Residue Theorem: Let be a simple closed loop, traversed counterclockwise. Let f be a function that is analytic on and meromorphic inside. Then

More information

ROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( )

ROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( ) ON PROTECTED NODES IN DIGITAL SEARCH TREES ROSENA R.X. DU AND HELMUT PRODINGER Dedicated to Philippe Flajolet (98 2) Abstract. Recently, 2-protected nodes were studied in the context of ordered trees and

More information

Complex Analysis Math 185A, Winter 2010 Final: Solutions

Complex Analysis Math 185A, Winter 2010 Final: Solutions Complex Analysis Math 85A, Winter 200 Final: Solutions. [25 pts] The Jacobian of two real-valued functions u(x, y), v(x, y) of (x, y) is defined by the determinant (u, v) J = (x, y) = u x u y v x v y.

More information

SOLUTIONS OF SELECTED PROBLEMS

SOLUTIONS OF SELECTED PROBLEMS SOLUTIONS OF SELECTED PROBLEMS Problem 36, p. 63 If µ(e n < and χ En f in L, then f is a.e. equal to a characteristic function of a measurable set. Solution: By Corollary.3, there esists a subsequence

More information

The variance for partial match retrievals in k-dimensional bucket digital trees

The variance for partial match retrievals in k-dimensional bucket digital trees The variance for partial match retrievals in k-dimensional ucket digital trees Michael FUCHS Department of Applied Mathematics National Chiao Tung University January 12, 21 Astract The variance of partial

More information

Binary Decision Diagrams. Graphs. Boolean Functions

Binary Decision Diagrams. Graphs. Boolean Functions Binary Decision Diagrams Graphs Binary Decision Diagrams (BDDs) are a class of graphs that can be used as data structure for compactly representing boolean functions. BDDs were introduced by R. Bryant

More information

Solutions to practice problems for the final

Solutions to practice problems for the final Solutions to practice problems for the final Holomorphicity, Cauchy-Riemann equations, and Cauchy-Goursat theorem 1. (a) Show that there is a holomorphic function on Ω = {z z > 2} whose derivative is z

More information

The Moments of the Profile in Random Binary Digital Trees

The Moments of the Profile in Random Binary Digital Trees Journal of mathematics and computer science 6(2013)176-190 The Moments of the Profile in Random Binary Digital Trees Ramin Kazemi and Saeid Delavar Department of Statistics, Imam Khomeini International

More information

Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility

Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility Tao Jiang, Ming Li, Brendan Lucier September 26, 2005 Abstract In this paper we study the Kolmogorov Complexity of a

More information

PROBLEM SET 3 FYS3140

PROBLEM SET 3 FYS3140 PROBLEM SET FYS40 Problem. (Cauchy s theorem and integral formula) Cauchy s integral formula f(a) = πi z a dz πi f(a) a in z a dz = 0 otherwise we solve the following problems by comparing the integrals

More information

Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.

Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements. Lecture: Hélène Barcelo Analytic Combinatorics ECCO 202, Bogotá Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.. Tuesday, June 2, 202 Combinatorics is the study of finite structures that

More information

Multiple Choice Tries and Distributed Hash Tables

Multiple Choice Tries and Distributed Hash Tables Multiple Choice Tries and Distributed Hash Tables Luc Devroye and Gabor Lugosi and Gahyun Park and W. Szpankowski January 3, 2007 McGill University, Montreal, Canada U. Pompeu Fabra, Barcelona, Spain U.

More information

E D I C T The internal extent formula for compacted tries

E D I C T The internal extent formula for compacted tries E D C T The internal extent formula for compacted tries Paolo Boldi Sebastiano Vigna Università degli Studi di Milano, taly Abstract t is well known [Knu97, pages 399 4] that in a binary tree the external

More information

7 Asymptotics for Meromorphic Functions

7 Asymptotics for Meromorphic Functions Lecture G jacques@ucsd.edu 7 Asymptotics for Meromorphic Functions Hadamard s Theorem gives a broad description of the exponential growth of coefficients in power series, but the notion of exponential

More information

Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018

Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 CS17 Integrated Introduction to Computer Science Klein Contents Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 1 Tree definitions 1 2 Analysis of mergesort using a binary tree 1 3 Analysis of

More information

CS60007 Algorithm Design and Analysis 2018 Assignment 1

CS60007 Algorithm Design and Analysis 2018 Assignment 1 CS60007 Algorithm Design and Analysis 2018 Assignment 1 Palash Dey and Swagato Sanyal Indian Institute of Technology, Kharagpur Please submit the solutions of the problems 6, 11, 12 and 13 (written in

More information

RENEWAL THEORY IN ANALYSIS OF TRIES AND STRINGS: EXTENDED ABSTRACT

RENEWAL THEORY IN ANALYSIS OF TRIES AND STRINGS: EXTENDED ABSTRACT RENEWAL THEORY IN ANALYSIS OF TRIES AND STRINGS: EXTENDED ABSTRACT SVANTE JANSON Abstract. We give a survey of a number of simple applications of renewal theory to problems on random strings, in particular

More information

Binary Decision Diagrams

Binary Decision Diagrams Binary Decision Diagrams Binary Decision Diagrams (BDDs) are a class of graphs that can be used as data structure for compactly representing boolean functions. BDDs were introduced by R. Bryant in 1986.

More information

Data Structures and Algorithms " Search Trees!!

Data Structures and Algorithms  Search Trees!! Data Structures and Algorithms " Search Trees!! Outline" Binary Search Trees! AVL Trees! (2,4) Trees! 2 Binary Search Trees! "! < 6 2 > 1 4 = 8 9 Ordered Dictionaries" Keys are assumed to come from a total

More information

Nearest Neighbor Search with Keywords

Nearest Neighbor Search with Keywords Nearest Neighbor Search with Keywords Yufei Tao KAIST June 3, 2013 In recent years, many search engines have started to support queries that combine keyword search with geography-related predicates (e.g.,

More information

Forty years of tree enumeration

Forty years of tree enumeration October 24, 206 Canada John Moon (Alberta) Counting labelled trees Canadian mathematical monographs What is our subject? Asymptotic enumeration or Probabilistic combinatorics? What is our subject? Asymptotic

More information

Dictionary: an abstract data type

Dictionary: an abstract data type 2-3 Trees 1 Dictionary: an abstract data type A container that maps keys to values Dictionary operations Insert Search Delete Several possible implementations Balanced search trees Hash tables 2 2-3 trees

More information

Dictionary: an abstract data type

Dictionary: an abstract data type 2-3 Trees 1 Dictionary: an abstract data type A container that maps keys to values Dictionary operations Insert Search Delete Several possible implementations Balanced search trees Hash tables 2 2-3 trees

More information

Combinatorial/probabilistic analysis of a class of search-tree functionals

Combinatorial/probabilistic analysis of a class of search-tree functionals Combinatorial/probabilistic analysis of a class of search-tree functionals Jim Fill jimfill@jhu.edu http://www.mts.jhu.edu/ fill/ Mathematical Sciences The Johns Hopkins University Joint Statistical Meetings;

More information

INF2220: algorithms and data structures Series 1

INF2220: algorithms and data structures Series 1 Universitetet i Oslo Institutt for Informatikk I. Yu, D. Karabeg INF2220: algorithms and data structures Series 1 Topic Function growth & estimation of running time, trees (Exercises with hints for solution)

More information

Information Theory and Statistics Lecture 2: Source coding

Information Theory and Statistics Lecture 2: Source coding Information Theory and Statistics Lecture 2: Source coding Łukasz Dębowski ldebowsk@ipipan.waw.pl Ph. D. Programme 2013/2014 Injections and codes Definition (injection) Function f is called an injection

More information

Asymptotic Enumeration of Compacted Binary Trees

Asymptotic Enumeration of Compacted Binary Trees Asymptotic Enumeration of Compacted Binary Trees Antoine Genitrini Bernhard Gittenberger Manuel Kauers Michael Wallner March 30, 207 Abstract A compacted tree is a graph created from a binary tree such

More information

Chapter 11. Min Cut Min Cut Problem Definition Some Definitions. By Sariel Har-Peled, December 10, Version: 1.

Chapter 11. Min Cut Min Cut Problem Definition Some Definitions. By Sariel Har-Peled, December 10, Version: 1. Chapter 11 Min Cut By Sariel Har-Peled, December 10, 013 1 Version: 1.0 I built on the sand And it tumbled down, I built on a rock And it tumbled down. Now when I build, I shall begin With the smoke from

More information

Chapter 5 Data Structures Algorithm Theory WS 2017/18 Fabian Kuhn

Chapter 5 Data Structures Algorithm Theory WS 2017/18 Fabian Kuhn Chapter 5 Data Structures Algorithm Theory WS 2017/18 Fabian Kuhn Priority Queue / Heap Stores (key,data) pairs (like dictionary) But, different set of operations: Initialize-Heap: creates new empty heap

More information

Math 213br HW 1 solutions

Math 213br HW 1 solutions Math 213br HW 1 solutions February 26, 2014 Problem 1 Let P (x) be a polynomial of degree d > 1 with P (x) > 0 for all x 0. For what values of α R does the integral I(α) = 0 x α P (x) dx converge? Give

More information

Understanding the Prime Number Theorem

Understanding the Prime Number Theorem Understanding the Prime Number Theorem Misunderstood Monster or Beautiful Theorem? Liam Fowl September 5, 2014 Liam Fowl Understanding the Prime Number Theorem 1/20 Outline 1 Introduction 2 Complex Plane

More information

Advanced Implementations of Tables: Balanced Search Trees and Hashing

Advanced Implementations of Tables: Balanced Search Trees and Hashing Advanced Implementations of Tables: Balanced Search Trees and Hashing Balanced Search Trees Binary search tree operations such as insert, delete, retrieve, etc. depend on the length of the path to the

More information

= F (b) F (a) F (x i ) F (x i+1 ). a x 0 x 1 x n b i

= F (b) F (a) F (x i ) F (x i+1 ). a x 0 x 1 x n b i Real Analysis Problem 1. If F : R R is a monotone function, show that F T V ([a,b]) = F (b) F (a) for any interval [a, b], and that F has bounded variation on R if and only if it is bounded. Here F T V

More information

MA 412 Complex Analysis Final Exam

MA 412 Complex Analysis Final Exam MA 4 Complex Analysis Final Exam Summer II Session, August 9, 00.. Find all the values of ( 8i) /3. Sketch the solutions. Answer: We start by writing 8i in polar form and then we ll compute the cubic root:

More information

16. Binary Search Trees. [Ottman/Widmayer, Kap. 5.1, Cormen et al, Kap ]

16. Binary Search Trees. [Ottman/Widmayer, Kap. 5.1, Cormen et al, Kap ] 418 16. Binary Search Trees [Ottman/Widmayer, Kap. 5.1, Cormen et al, Kap. 12.1-12.3] 419 Dictionary implementation Hashing: implementation of dictionaries with expected very fast access times. Disadvantages

More information

. Then g is holomorphic and bounded in U. So z 0 is a removable singularity of g. Since f(z) = w 0 + 1

. Then g is holomorphic and bounded in U. So z 0 is a removable singularity of g. Since f(z) = w 0 + 1 Now we describe the behavior of f near an isolated singularity of each kind. We will always assume that z 0 is a singularity of f, and f is holomorphic on D(z 0, r) \ {z 0 }. Theorem 4.2.. z 0 is a removable

More information

Each internal node v with d(v) children stores d 1 keys. k i 1 < key in i-th sub-tree k i, where we use k 0 = and k d =.

Each internal node v with d(v) children stores d 1 keys. k i 1 < key in i-th sub-tree k i, where we use k 0 = and k d =. 7.5 (a, b)-trees 7.5 (a, b)-trees Definition For b a an (a, b)-tree is a search tree with the following properties. all leaves have the same distance to the root. every internal non-root vertex v has at

More information

PART III. Outline. Codes and Cryptography. Sources. Optimal Codes (I) Jorge L. Villar. MAMME, Fall 2015

PART III. Outline. Codes and Cryptography. Sources. Optimal Codes (I) Jorge L. Villar. MAMME, Fall 2015 Outline Codes and Cryptography 1 Information Sources and Optimal Codes 2 Building Optimal Codes: Huffman Codes MAMME, Fall 2015 3 Shannon Entropy and Mutual Information PART III Sources Information source:

More information

16. Binary Search Trees. [Ottman/Widmayer, Kap. 5.1, Cormen et al, Kap ]

16. Binary Search Trees. [Ottman/Widmayer, Kap. 5.1, Cormen et al, Kap ] 423 16. Binary Search Trees [Ottman/Widmayer, Kap. 5.1, Cormen et al, Kap. 12.1-12.3] Dictionary implementation 424 Hashing: implementation of dictionaries with expected very fast access times. Disadvantages

More information

More Dynamic Programming

More Dynamic Programming CS 374: Algorithms & Models of Computation, Spring 2017 More Dynamic Programming Lecture 14 March 9, 2017 Chandra Chekuri (UIUC) CS374 1 Spring 2017 1 / 42 What is the running time of the following? Consider

More information

(z + n) 2. n=0. 2 (z + 2) (z + n). 2 We d like to compute this as an integral. To this end, we d like a function with residues

(z + n) 2. n=0. 2 (z + 2) (z + n). 2 We d like to compute this as an integral. To this end, we d like a function with residues 8. Stirling Formula Stirling s Formula is a classical formula to compute n! accurately when n is large. We will derive a version of Stirling s formula using complex analysis and residues. Recall the formula

More information

More Dynamic Programming

More Dynamic Programming Algorithms & Models of Computation CS/ECE 374, Fall 2017 More Dynamic Programming Lecture 14 Tuesday, October 17, 2017 Sariel Har-Peled (UIUC) CS374 1 Fall 2017 1 / 48 What is the running time of the following?

More information

Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas)

Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas) Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University

More information

Math Final Exam.

Math Final Exam. Math 106 - Final Exam. This is a closed book exam. No calculators are allowed. The exam consists of 8 questions worth 100 points. Good luck! Name: Acknowledgment and acceptance of honor code: Signature:

More information

ENS Lyon Camp. Day 2. Basic group. Cartesian Tree. 26 October

ENS Lyon Camp. Day 2. Basic group. Cartesian Tree. 26 October ENS Lyon Camp. Day 2. Basic group. Cartesian Tree. 26 October Contents 1 Cartesian Tree. Definition. 1 2 Cartesian Tree. Construction 1 3 Cartesian Tree. Operations. 2 3.1 Split............................................

More information

AVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES

AVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES J. Appl. Prob. 45, 888 9 (28) Printed in England Applied Probability Trust 28 AVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES HOSAM M. MAHMOUD, The George Washington University MARK DANIEL WARD, Purdue

More information

String Complexity. Dedicated to Svante Janson for his 60 Birthday

String Complexity. Dedicated to Svante Janson for his 60 Birthday String Complexity Wojciech Szpankowski Purdue University W. Lafayette, IN 47907 June 1, 2015 Dedicated to Svante Janson for his 60 Birthday Outline 1. Working with Svante 2. String Complexity 3. Joint

More information

Tree Decompositions and Tree-Width

Tree Decompositions and Tree-Width Tree Decompositions and Tree-Width CS 511 Iowa State University December 6, 2010 CS 511 (Iowa State University) Tree Decompositions and Tree-Width December 6, 2010 1 / 15 Tree Decompositions Definition

More information

Solution for Final Review Problems 1

Solution for Final Review Problems 1 Solution for Final Review Problems Final time and location: Dec. Gymnasium, Rows 23, 25 5, 2, Wednesday, 9-2am, Main ) Let fz) be the principal branch of z i. a) Find f + i). b) Show that fz )fz 2 ) λfz

More information

Part IB Complex Analysis

Part IB Complex Analysis Part IB Complex Analysis Theorems Based on lectures by I. Smith Notes taken by Dexter Chua Lent 2016 These notes are not endorsed by the lecturers, and I have modified them (often significantly) after

More information

Analysis of Algorithms. Outline 1 Introduction Basic Definitions Ordered Trees. Fibonacci Heaps. Andres Mendez-Vazquez. October 29, Notes.

Analysis of Algorithms. Outline 1 Introduction Basic Definitions Ordered Trees. Fibonacci Heaps. Andres Mendez-Vazquez. October 29, Notes. Analysis of Algorithms Fibonacci Heaps Andres Mendez-Vazquez October 29, 2015 1 / 119 Outline 1 Introduction Basic Definitions Ordered Trees 2 Binomial Trees Example 3 Fibonacci Heap Operations Fibonacci

More information

CS Data Structures and Algorithm Analysis

CS Data Structures and Algorithm Analysis CS 483 - Data Structures and Algorithm Analysis Lecture VII: Chapter 6, part 2 R. Paul Wiegand George Mason University, Department of Computer Science March 22, 2006 Outline 1 Balanced Trees 2 Heaps &

More information

HW #4. (mostly by) Salim Sarımurat. 1) Insert 6 2) Insert 8 3) Insert 30. 4) Insert S a.

HW #4. (mostly by) Salim Sarımurat. 1) Insert 6 2) Insert 8 3) Insert 30. 4) Insert S a. HW #4 (mostly by) Salim Sarımurat 04.12.2009 S. 1. 1. a. 1) Insert 6 2) Insert 8 3) Insert 30 4) Insert 40 2 5) Insert 50 6) Insert 61 7) Insert 70 1. b. 1) Insert 12 2) Insert 29 3) Insert 30 4) Insert

More information

MATH 452. SAMPLE 3 SOLUTIONS May 3, (10 pts) Let f(x + iy) = u(x, y) + iv(x, y) be an analytic function. Show that u(x, y) is harmonic.

MATH 452. SAMPLE 3 SOLUTIONS May 3, (10 pts) Let f(x + iy) = u(x, y) + iv(x, y) be an analytic function. Show that u(x, y) is harmonic. MATH 45 SAMPLE 3 SOLUTIONS May 3, 06. (0 pts) Let f(x + iy) = u(x, y) + iv(x, y) be an analytic function. Show that u(x, y) is harmonic. Because f is holomorphic, u and v satisfy the Cauchy-Riemann equations:

More information

Assignment 5: Solutions

Assignment 5: Solutions Comp 21: Algorithms and Data Structures Assignment : Solutions 1. Heaps. (a) First we remove the minimum key 1 (which we know is located at the root of the heap). We then replace it by the key in the position

More information

Lars Schmidt-Thieme, Information Systems and Machine Learning Lab (ISMLL), University of Hildesheim, Germany

Lars Schmidt-Thieme, Information Systems and Machine Learning Lab (ISMLL), University of Hildesheim, Germany Syllabus Fri. 21.10. (1) 0. Introduction A. Supervised Learning: Linear Models & Fundamentals Fri. 27.10. (2) A.1 Linear Regression Fri. 3.11. (3) A.2 Linear Classification Fri. 10.11. (4) A.3 Regularization

More information

Complex Analysis Math 205A, Winter 2014 Final: Solutions

Complex Analysis Math 205A, Winter 2014 Final: Solutions Part I: Short Questions Complex Analysis Math 205A, Winter 2014 Final: Solutions I.1 [5%] State the Cauchy-Riemann equations for a holomorphic function f(z) = u(x,y)+iv(x,y). The Cauchy-Riemann equations

More information

Reconstruction of certain phylogenetic networks from their tree-average distances

Reconstruction of certain phylogenetic networks from their tree-average distances Reconstruction of certain phylogenetic networks from their tree-average distances Stephen J. Willson Department of Mathematics Iowa State University Ames, IA 50011 USA swillson@iastate.edu October 10,

More information

On the Average Path Length of Complete m-ary Trees

On the Average Path Length of Complete m-ary Trees 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 17 2014, Article 14.6.3 On the Average Path Length of Complete m-ary Trees M. A. Nyblom School of Mathematics and Geospatial Science RMIT University

More information

Complex Analysis Important Concepts

Complex Analysis Important Concepts Complex Analysis Important Concepts Travis Askham April 1, 2012 Contents 1 Complex Differentiation 2 1.1 Definition and Characterization.............................. 2 1.2 Examples..........................................

More information

Computational Models - Lecture 5 1

Computational Models - Lecture 5 1 Computational Models - Lecture 5 1 Handout Mode Iftach Haitner. Tel Aviv University. November 28, 2016 1 Based on frames by Benny Chor, Tel Aviv University, modifying frames by Maurice Herlihy, Brown University.

More information

Algorithm Design CS 515 Fall 2015 Sample Final Exam Solutions

Algorithm Design CS 515 Fall 2015 Sample Final Exam Solutions Algorithm Design CS 515 Fall 2015 Sample Final Exam Solutions Copyright c 2015 Andrew Klapper. All rights reserved. 1. For the functions satisfying the following three recurrences, determine which is the

More information

6.1 The Pumping Lemma for CFLs 6.2 Intersections and Complements of CFLs

6.1 The Pumping Lemma for CFLs 6.2 Intersections and Complements of CFLs CSC4510/6510 AUTOMATA 6.1 The Pumping Lemma for CFLs 6.2 Intersections and Complements of CFLs The Pumping Lemma for Context Free Languages One way to prove AnBn is not regular is to use the pumping lemma

More information

Math Homework 2

Math Homework 2 Math 73 Homework Due: September 8, 6 Suppose that f is holomorphic in a region Ω, ie an open connected set Prove that in any of the following cases (a) R(f) is constant; (b) I(f) is constant; (c) f is

More information

1. Prove: A full m- ary tree with i internal vertices contains n = mi + 1 vertices.

1. Prove: A full m- ary tree with i internal vertices contains n = mi + 1 vertices. 1. Prove: A full m- ary tree with i internal vertices contains n = mi + 1 vertices. Proof: Every vertex, except the root, is the child of an internal vertex. Since there are i internal vertices, each of

More information

Lecture 4 : Adaptive source coding algorithms

Lecture 4 : Adaptive source coding algorithms Lecture 4 : Adaptive source coding algorithms February 2, 28 Information Theory Outline 1. Motivation ; 2. adaptive Huffman encoding ; 3. Gallager and Knuth s method ; 4. Dictionary methods : Lempel-Ziv

More information

Bayesian Networks and Markov Random Fields

Bayesian Networks and Markov Random Fields Bayesian Networks and Markov Random Fields 1 Bayesian Networks We will use capital letters for random variables and lower case letters for values of those variables. A Bayesian network is a triple V, G,

More information

Hierarchical Overlap Graph

Hierarchical Overlap Graph Hierarchical Overlap Graph B. Cazaux and E. Rivals LIRMM & IBC, Montpellier 8. Feb. 2018 arxiv:1802.04632 2018 B. Cazaux & E. Rivals 1 / 29 Overlap Graph for a set of words Consider the set P := {abaa,

More information

Disjoint Sets : ADT. Disjoint-Set : Find-Set

Disjoint Sets : ADT. Disjoint-Set : Find-Set Disjoint Sets : ADT Disjoint-Set Forests Make-Set( x ) Union( s, s ) Find-Set( x ) : π( ) : π( ) : ν( log * n ) amortized cost 6 9 {,, 9,, 6} set # {} set # 7 5 {5, 7, } set # Disjoint-Set : Find-Set Disjoint

More information

(1) Let f(z) be the principal branch of z 4i. (a) Find f(i). Solution. f(i) = exp(4i Log(i)) = exp(4i(π/2)) = e 2π. (b) Show that

(1) Let f(z) be the principal branch of z 4i. (a) Find f(i). Solution. f(i) = exp(4i Log(i)) = exp(4i(π/2)) = e 2π. (b) Show that Let fz be the principal branch of z 4i. a Find fi. Solution. fi = exp4i Logi = exp4iπ/2 = e 2π. b Show that fz fz 2 fz z 2 fz fz 2 = λfz z 2 for all z, z 2 0, where λ =, e 8π or e 8π. Proof. We have =

More information

Part IB. Further Analysis. Year

Part IB. Further Analysis. Year Year 2004 2003 2002 2001 10 2004 2/I/4E Let τ be the topology on N consisting of the empty set and all sets X N such that N \ X is finite. Let σ be the usual topology on R, and let ρ be the topology on

More information

Analytic Information Theory: From Shannon to Knuth and Back. Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth

Analytic Information Theory: From Shannon to Knuth and Back. Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth Analytic Information Theory: From Shannon to Knuth and Back Wojciech Szpankowski Center for Science of Information Purdue University January 7, 2018 Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth

More information

Analytic Depoissonization and Its Applications

Analytic Depoissonization and Its Applications Analytic Depoissonization and Its Applications W. Szpankowski Department of Computer Science Purdue University W. Lafayette, IN 47907 April 29, 2008 AofA and IT logos This research is supported by NSF

More information

Department of Mathematics, University of California, Berkeley. GRADUATE PRELIMINARY EXAMINATION, Part A Fall Semester 2014

Department of Mathematics, University of California, Berkeley. GRADUATE PRELIMINARY EXAMINATION, Part A Fall Semester 2014 Department of Mathematics, University of California, Berkeley YOUR 1 OR 2 DIGIT EXAM NUMBER GRADUATE PRELIMINARY EXAMINATION, Part A Fall Semester 2014 1. Please write your 1- or 2-digit exam number on

More information

Department of Mathematics, University of California, Berkeley. GRADUATE PRELIMINARY EXAMINATION, Part A Spring Semester 2015

Department of Mathematics, University of California, Berkeley. GRADUATE PRELIMINARY EXAMINATION, Part A Spring Semester 2015 Department of Mathematics, University of California, Berkeley YOUR OR 2 DIGIT EXAM NUMBER GRADUATE PRELIMINARY EXAMINATION, Part A Spring Semester 205. Please write your - or 2-digit exam number on this

More information

Binary Search Trees. Motivation

Binary Search Trees. Motivation Binary Search Trees Motivation Searching for a particular record in an unordered list takes O(n), too slow for large lists (databases) If the list is ordered, can use an array implementation and use binary

More information

Midterm 2 for CS 170

Midterm 2 for CS 170 UC Berkeley CS 170 Midterm 2 Lecturer: Gene Myers November 9 Midterm 2 for CS 170 Print your name:, (last) (first) Sign your name: Write your section number (e.g. 101): Write your sid: One page of notes

More information

Problem Set 7 Solution Set

Problem Set 7 Solution Set Problem Set 7 Solution Set Anthony Varilly Math 3: Complex Analysis, Fall 22 Let P (z be a polynomial Prove there exists a real positive number ɛ with the following property: for all non-zero complex numbers

More information

Evaluation of integrals

Evaluation of integrals Evaluation of certain contour integrals: Type I Type I: Integrals of the form 2π F (cos θ, sin θ) dθ If we take z = e iθ, then cos θ = 1 (z + 1 ), sin θ = 1 (z 1 dz ) and dθ = 2 z 2i z iz. Substituting

More information

Integer Sorting on the word-ram

Integer Sorting on the word-ram Integer Sorting on the word-rm Uri Zwick Tel viv University May 2015 Last updated: June 30, 2015 Integer sorting Memory is composed of w-bit words. rithmetical, logical and shift operations on w-bit words

More information

Chapter 10 Search Structures

Chapter 10 Search Structures Chapter 1 Search Structures 1 1.2 AVL Trees : 동기 Objective : maintain binary search tree structure for O(log n) access time with dynamic changes of identifiers (i.e., elements) in the tree. JULY APR AUG

More information

Lecture 18 April 26, 2012

Lecture 18 April 26, 2012 6.851: Advanced Data Structures Spring 2012 Prof. Erik Demaine Lecture 18 April 26, 2012 1 Overview In the last lecture we introduced the concept of implicit, succinct, and compact data structures, and

More information

Dynamic Ordered Sets with Exponential Search Trees

Dynamic Ordered Sets with Exponential Search Trees Dynamic Ordered Sets with Exponential Search Trees Arne Andersson Computing Science Department Information Technology, Uppsala University Box 311, SE - 751 05 Uppsala, Sweden arnea@csd.uu.se http://www.csd.uu.se/

More information

Enumerating Regular Expressions and Their Languages

Enumerating Regular Expressions and Their Languages Enumerating Regular Expressions and Their Languages Jonathan Lee and Jeffrey Shallit School of Computer Science, University of Waterloo, Waterloo, ON N2L 3G1, Canada jwlee@alumni.uwaterloo.ca shallit@graceland.uwaterloo.ca

More information

k-protected VERTICES IN BINARY SEARCH TREES

k-protected VERTICES IN BINARY SEARCH TREES k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from

More information

Theorem [Mean Value Theorem for Harmonic Functions] Let u be harmonic on D(z 0, R). Then for any r (0, R), u(z 0 ) = 1 z z 0 r

Theorem [Mean Value Theorem for Harmonic Functions] Let u be harmonic on D(z 0, R). Then for any r (0, R), u(z 0 ) = 1 z z 0 r 2. A harmonic conjugate always exists locally: if u is a harmonic function in an open set U, then for any disk D(z 0, r) U, there is f, which is analytic in D(z 0, r) and satisfies that Re f u. Since such

More information

MAT389 Fall 2016, Problem Set 11

MAT389 Fall 2016, Problem Set 11 MAT389 Fall 216, Problem Set 11 Improper integrals 11.1 In each of the following cases, establish the convergence of the given integral and calculate its value. i) x 2 x 2 + 1) 2 ii) x x 2 + 1)x 2 + 2x

More information

ECE750-TXB Lecture 8: Treaps, Tries, and. Hash Tables

ECE750-TXB Lecture 8: Treaps, Tries, and. Hash Tables , and, and Hash Electrical & Computer Engineering University of Waterloo Canada February 1, 2007 Recall that a binary search tree has keys drawn from a totally ordered structure K, An inorder traversal

More information

Graphical Indices and their Applications

Graphical Indices and their Applications Georgia Southern University Digital Commons@Georgia Southern Electronic Theses and Dissertations Graduate Studies, Jack N. Averitt College of Spring 2010 Graphical Indices and their Applications Daniel

More information

CMPSCI 311: Introduction to Algorithms Second Midterm Exam

CMPSCI 311: Introduction to Algorithms Second Midterm Exam CMPSCI 311: Introduction to Algorithms Second Midterm Exam April 11, 2018. Name: ID: Instructions: Answer the questions directly on the exam pages. Show all your work for each question. Providing more

More information

ICS141: Discrete Mathematics for Computer Science I

ICS141: Discrete Mathematics for Computer Science I ICS141: Discrete Mathematics for Computer Science I Dept. Information & Computer Sci., Jan Stelovsky based on slides by Dr. Baek and Dr. Still Originals by Dr. M. P. Frank and Dr. J.L. Gross Provided by

More information

Problem. Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26

Problem. Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26 Binary Search Introduction Problem Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26 Strategy 1: Random Search Randomly select a page until the page containing

More information

Basic Sampling Methods

Basic Sampling Methods Basic Sampling Methods Sargur Srihari srihari@cedar.buffalo.edu 1 1. Motivation Topics Intractability in ML How sampling can help 2. Ancestral Sampling Using BNs 3. Transforming a Uniform Distribution

More information

Graphs and Trees Binary Search Trees AVL-Trees (a,b)-trees Splay-Trees. Search Trees. Tobias Lieber. April 14, 2008

Graphs and Trees Binary Search Trees AVL-Trees (a,b)-trees Splay-Trees. Search Trees. Tobias Lieber. April 14, 2008 Search Trees Tobias Lieber April 14, 2008 Tobias Lieber Search Trees April 14, 2008 1 / 57 Graphs and Trees Binary Search Trees AVL-Trees (a,b)-trees Splay-Trees Tobias Lieber Search Trees April 14, 2008

More information

Space-Efficient Construction Algorithm for Circular Suffix Tree

Space-Efficient Construction Algorithm for Circular Suffix Tree Space-Efficient Construction Algorithm for Circular Suffix Tree Wing-Kai Hon, Tsung-Han Ku, Rahul Shah and Sharma Thankachan CPM2013 1 Outline Preliminaries and Motivation Circular Suffix Tree Our Indexes

More information

Mathematics of Physics and Engineering II: Homework problems

Mathematics of Physics and Engineering II: Homework problems Mathematics of Physics and Engineering II: Homework problems Homework. Problem. Consider four points in R 3 : P (,, ), Q(,, 2), R(,, ), S( + a,, 2a), where a is a real number. () Compute the coordinates

More information

A Master Theorem for Discrete Divide and Conquer Recurrences. Dedicated to PHILIPPE FLAJOLET

A Master Theorem for Discrete Divide and Conquer Recurrences. Dedicated to PHILIPPE FLAJOLET A Master Theorem for Discrete Divide and Conquer Recurrences Wojciech Szpankowski Department of Computer Science Purdue University U.S.A. September 6, 2012 Uniwersytet Jagieloński, Kraków, 2012 Dedicated

More information