Lecture 10 — March 20 , 2012

نویسنده

  • Erik Demaine
چکیده

In the last lecture, we finished up talking about memory hierarchies and linked cache-oblivious data structures with geometric data structures. In this lecture we talk about different approaches to hashing. First, we talk about different hash functions and their properties, from basic universality to k-wise independence to a simple but effective hash function called simple tabulation. Then, we talk about different approaches to using these hash functions in a data structure. The approaches we cover are basic chaining, perfect hashing, linear probing, and cuckoo hashing. The goal of hashing is to provide a solution that is faster than binary trees. We want to be able to store our information in less than O(u lg u) space and perform operations in less than O(lg u) time. In particular, FKS hashing achieves O(1) worst-case query time with O(n) expected space and takes O(n) construction time for the static dictionary problem. Cuckoo Hashing achieves O(n) space, O(1) worst-case query and deletion time, and O(1) amortized insertion time for the dynamic dictionary problem.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Very Long Lecture on the Physical Approach to Donaldson and Seiberg-Witten Invariants of Four-Manifolds

These are lecture notes for a lecture at the Simons Center for Geometry and Physics School on Mathematical Applications of Supersymmetric Yang Mills Theory, March 8, 2012

متن کامل

Lecture 16 - March 22 , 2012

In the last lecture we talked about how to support dynamic graphs with respect to operations which included insertion and deletion of edges and looking for existence of path between two vertices. In this lecture we will talk about supporting all pair shortest paths along with addition, deletion and updation of edges in O(n2 log n) amortized time on the graphs with non negative real-valued edge ...

متن کامل

Lecture 6 — March 6 , 2012

In the last lecture we discussed representing executions of binary search trees as point sets. A BST execution is represented as the point set of all nodes touched during the execution of the algorithm. A point set represents a valid BST execution if and only if it is arborally satistified. A point set is arborally satisfied iff any rectange spanned by two points not on a horizonal or vertical ...

متن کامل

S 6840 – Algorithmic Game Theory March 28 , 2012 Lecture 28 : Greedy Algorithm in General Combinatorial Auctions

Recall the definition of a combinatorial auction. Set S of items on sale. n bidders, each bidder i has vi(A) ≥ 0 for any subset A ⊆ S. In the previous lecture, we introduced single-minded valuations vi which meant, each bidder had a desired set Ai and vi(A) = vi if Ai ⊆ A and 0 otherwise. We generalize this assumption for today: we merely assert that vi is a monotone non-decreasing set function...

متن کامل

Lecture 5 — March 1 , 2012

In the next two lectures we study the question of dynamic optimality, or whether there exists a binary search tree algorithm that performs ”as well” as all other algorithms on any input string. In this lecture we will define a binary search tree as a formal model of computation, show some analytic bounds that a dynamically optimal binary search tree needs to satisfy, and show two search trees t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012