Lecture 10 — March 20 , 2012
نویسنده
چکیده
In the last lecture, we finished up talking about memory hierarchies and linked cache-oblivious data structures with geometric data structures. In this lecture we talk about different approaches to hashing. First, we talk about different hash functions and their properties, from basic universality to k-wise independence to a simple but effective hash function called simple tabulation. Then, we talk about different approaches to using these hash functions in a data structure. The approaches we cover are basic chaining, perfect hashing, linear probing, and cuckoo hashing. The goal of hashing is to provide a solution that is faster than binary trees. We want to be able to store our information in less than O(u lg u) space and perform operations in less than O(lg u) time. In particular, FKS hashing achieves O(1) worst-case query time with O(n) expected space and takes O(n) construction time for the static dictionary problem. Cuckoo Hashing achieves O(n) space, O(1) worst-case query and deletion time, and O(1) amortized insertion time for the dynamic dictionary problem.
منابع مشابه
A Very Long Lecture on the Physical Approach to Donaldson and Seiberg-Witten Invariants of Four-Manifolds
These are lecture notes for a lecture at the Simons Center for Geometry and Physics School on Mathematical Applications of Supersymmetric Yang Mills Theory, March 8, 2012
متن کاملLecture 16 - March 22 , 2012
In the last lecture we talked about how to support dynamic graphs with respect to operations which included insertion and deletion of edges and looking for existence of path between two vertices. In this lecture we will talk about supporting all pair shortest paths along with addition, deletion and updation of edges in O(n2 log n) amortized time on the graphs with non negative real-valued edge ...
متن کاملLecture 6 — March 6 , 2012
In the last lecture we discussed representing executions of binary search trees as point sets. A BST execution is represented as the point set of all nodes touched during the execution of the algorithm. A point set represents a valid BST execution if and only if it is arborally satistified. A point set is arborally satisfied iff any rectange spanned by two points not on a horizonal or vertical ...
متن کاملS 6840 – Algorithmic Game Theory March 28 , 2012 Lecture 28 : Greedy Algorithm in General Combinatorial Auctions
Recall the definition of a combinatorial auction. Set S of items on sale. n bidders, each bidder i has vi(A) ≥ 0 for any subset A ⊆ S. In the previous lecture, we introduced single-minded valuations vi which meant, each bidder had a desired set Ai and vi(A) = vi if Ai ⊆ A and 0 otherwise. We generalize this assumption for today: we merely assert that vi is a monotone non-decreasing set function...
متن کاملLecture 5 — March 1 , 2012
In the next two lectures we study the question of dynamic optimality, or whether there exists a binary search tree algorithm that performs ”as well” as all other algorithms on any input string. In this lecture we will define a binary search tree as a formal model of computation, show some analytic bounds that a dynamically optimal binary search tree needs to satisfy, and show two search trees t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012