Optimal Bounds for the Predecessor Problem

Total Page:16

File Type:pdf, Size:1020Kb

Optimal Bounds for the Predecessor Problem Optimal Bounds for the Predecessor Problem Paul Beame* Faith E. Ficht Computer Science and Engineering Department of Computer Science University of Washington University of Toronto Seattle, WA, USA 981952350 Toronto, Ontario, Canada M5S lA4 [email protected] [email protected] Abstract The static dictionary problem is to store a fixed set and perform membership queries on it; the static predecessor We obtain matching upper and lower bounds for the amount problem allows predecessor queries. If insertions and dele- of time to find the predecessor of a given element among the tions may also be performed on the set, we have the dynamic elements of a fixed efficiently stored set. Our algorithms are dictionary problem and the dynamic predecessor problem, for the unit-cost word-level RAM with multiplication and ex- respectively. tend to give optimal dynamic algorithms. The lower bounds are proved in a much stronger communication game model, The complexities of searching (for example, performing but they apply to the cell probe and RAM models and to both membership or predecessor queries) and sorting have been static and dynamic predecessor problems. long and well understood, under the assumption that ele- ments are abstract objects which may only be compared. But many efficient algorithms, including hashing, bucket sort, 1 Introduction and radix sort, perform word-level operations, such as indi- Many problems in computer science involve storing a set S of rect addressing using the elements themselves or values de- integers and performing queries on that set. The most basic rived from them. query is the membership query, which determines whether a Often, such algorithms are applied only when the number given integer x is in the set. A predecessor query returns the of bits to represent individual elements is very small in com- predecessor pred(x,S) of x in S, that is, the largest element parison with the number of elements in the set. Otherwise, of the set S that is less than x. If there is no predecessor those algorithms consume huge amounts of space. For ex- (which is the case when x is smaller than or equal to the ample, van Emde Boas trees [25,24] can be used to perform minimum element of S), then a default value, for example, 0, predecessor queries on any set of integers from a universe of is returned. size N in O(loglogN) time, but they require R(N) space. Predecessor queries can be used to efficiently perform However, there have been important algorithmic break range searches (i.e. find all elements of S between given throughs showing that such techniques have more general integers x and x’), They can also be used to obtain certain applicability. For example, with two level perfect hashing information about arbitrary integers (for example, their rank [16], any n element set can be stored in O(n) space and in S) that is only stored for the elements of S. Priority queues constant time membership queries can be performed. Fu- can be implemented using data structures that support inser- sion trees fully exploit unit-cost word-level operations and tion, deletion, and predecessor (or, equivalently, successor) the fact that data elements need to fit in words of memory to queries. store static sets of size n in O(n) space and perform prede- ‘Researchsupponed by the NationalScience Foundation under grants cessor queries in O(e) time 1181. CCR-9303017 and CCR-9800124 For the static predecessor problem, it has been widely conjectured that the time complexities achieved by van Emde Boas vees and fusion trees are optimal for any data structure using a reasonable amount of space. We prove that this is NOT the case. Specifically, we construct a new data struc- ture that stores n element sets of integers from a universe of size N in n’(1) space and performs predecessor queries in 0 (min{loglogN/logloglogN, Jlogn/loglogn}) time. Using recent generic transformations of Andersson and Tho- rap [4,6], the algorithm can be made dynamic and the space CopyTight ACM 1999 1.58113.067.8/99,05...$5.00 295 improved to O(n). Their original algorithm used multiplication and division of We also obtain matching lower bounds, improving Mil- log2N bit words to compute the hash functions. Recently it tersen’s n(m) and fi((logn)‘/‘) lower bounds in was shown that hash functions of the form the powerful communication game model [Zl, 221. The key to our improved lower bounds is to use a more compli- cqtted input distribution. Unfortunately, this leads to a more. for i- 5 [log2 n1 , suffice for implementing the two level per- complicated analysis. However, the understanding we ob- fect hashing data structure [ 11, 131. Notice that the eval- tained from identifying and working with a hard distribu- uation of such functions does not depend on constant time tion in the communication game model directly led to the division instructions; a right shift suffices. These algorithms davelopment of our algorithm. This approach has also been can be made dynamic with the same constant time for mem- used to obtain an Q(loglogd/logloglogd) lower bound for bership queries and with constant expected amortized update the approximate nearest neighbour problem over the universe time [ 13, 14, 121, by rehashing when necessary (using ran- 0% 1Y [91. domly chosen hash functions). For the static problem, Ra- man [23] proves that it is possible to choose such hash func- 2 Related Work tions deterministically in O(n’logN) time. Although hashing provides an optimal solution to the The simplest model in which the dictionary and predecessor static dictionary problem, it is not directly applicable to the problems have been considered is the comparison model in predecessor problem. Another data structure, van Emde which the only operations allowed that involve x are com- Boas (or stratified) trees [25, 241, is useful for both static parisons between x and elements of S. Using binary search, and dynamic versions of the predecessor problem. These predecessor and membership queries can be performed in trees support membership queries, predecessor queries, and O(logn) time on a static set of size II stored in a sorted array. updates in O(loglogN) time. The set is stored in a binary Balanced binary trees (for example, Red-Black trees, AVL trie and binary search is performed on the log*N bits used trees, or 2-3 trees) can be used in this model to solve the dy- to represent individual elements. The major drawback is the namic dictionary and predecessor problems in O(logn) time. use of an extremely large amount of space: R(N) words. A standard information theory argument proves that logzn Willard’s x-fast trie data structure [26] uses the same ap- comparisons are needed in the worst case even for perform proach, but reduces the space to O(nlogN) by using perfect ing membership queries in a static set. hashing to represent the nodes at each level of the trie. In y- One can obtain faster algorithms when x or some func- fast tries, the space is further reduced to O(n) by only storing tion computed from x can be used for indirect addressing. Q(n/logN) approximately evenly spaced elements of the set If S is a static set from a universe of size N, one can triv- Sin the x-fast trie. A binary search tree is used to represent ially perform predecessor queries using N words of memory the subset of O(logN) elements of S lying between each pair in constant time: Simply store the answer to each possible of consecutive elements in the trie. Both of Willard’s data qyery x in a separate location. This works for more gen- structores perform membership and predecessor queries in eral queries and if, as with membership queries, the number worst-case O(loglogN) time, but use randomization (for re- of bits, k, needed to represent each answer is smaller than hashing) to achieve expected O(loglogN) update time. the number of bits b in a memory word, the answers can be Fusion trees, introduced by Fredman and Willard [ 181 packed b/k to a word, for a total of O(Nk/b) words. When use packed B-trees with branching factor O(logn) to store the only queries are.membership queries, updates to the table approximately one out of every (logzn)4 elements of the set can also be performed in constant time. S. The effective universe size is reduced at each node of If the universe size N is significantly less than 2’, where the B-tree by using carefully selected bit positions to ob- b is the number of bits in a word, then packed B-trees [18, tain compressed keys representing the elements stored at 3,7,23] can be time and space efficient. Specifically, using the node. As above. binary search trees are. used to store branching factor B < b/(1 + log,N), insertions, deletions, the roughly equal-sized sets of intermediate elements and and membership and predecessor queries can be performed a total of O(n) space is used. Membership and prede- in O(logn/logB) steps using O(n/B) words. cessor queries take O(logn/loglogn) time. Updates take The most interesting data structures are those that O(logn/loglogn) amortized time. (The fact that this bound work for an arbitrary universe whose elements can fit in is amortized arises from the O((logn)4) time bound to up- a single word of memory and use a number of words that date a node in the B-tree.) This data structore forms the is polynomial in n, or ideally O(n).
Recommended publications
  • Persistent Predecessor Search and Orthogonal Point Location on the Word
    Persistent Predecessor Search and Orthogonal Point Location on the Word RAM∗ Timothy M. Chan† August 17, 2012 Abstract We answer a basic data structuring question (for example, raised by Dietz and Raman [1991]): can van Emde Boas trees be made persistent, without changing their asymptotic query/update time? We present a (partially) persistent data structure that supports predecessor search in a set of integers in 1,...,U under an arbitrary sequence of n insertions and deletions, with O(log log U) { } expected query time and expected amortized update time, and O(n) space. The query bound is optimal in U for linear-space structures and improves previous near-O((log log U)2) methods. The same method solves a fundamental problem from computational geometry: point location in orthogonal planar subdivisions (where edges are vertical or horizontal). We obtain the first static data structure achieving O(log log U) worst-case query time and linear space. This result is again optimal in U for linear-space structures and improves the previous O((log log U)2) method by de Berg, Snoeyink, and van Kreveld [1995]. The same result also holds for higher-dimensional subdivisions that are orthogonal binary space partitions, and for certain nonorthogonal planar subdivisions such as triangulations without small angles. Many geometric applications follow, including improved query times for orthogonal range reporting for dimensions 3 on the RAM. ≥ Our key technique is an interesting new van-Emde-Boas–style recursion that alternates be- tween two strategies, both quite simple. 1 Introduction Van Emde Boas trees [60, 61, 62] are fundamental data structures that support predecessor searches in O(log log U) time on the word RAM with O(n) space, when the n elements of the given set S come from a bounded integer universe 1,...,U (U n).
    [Show full text]
  • Lecture 1 — 24 January 2017 1 Overview 2 Administrivia 3 The
    CS 224: Advanced Algorithms Spring 2017 Lecture 1 | 24 January 2017 Prof. Jelani Nelson Scribe: Jerry Ma 1 Overview We introduce the word RAM model of computation, which features fixed-size storage blocks (\words") similar to modern integer data types. We also introduce the predecessor problem and demonstrate solutions to the problem that are faster than optimal comparison-based methods. 2 Administrivia • Personnel: Jelani Nelson (instructor) and Tom Morgan (TF) • Course site: people.seas.harvard.edu/~cs224 • Course staff email: [email protected] • Prerequisites: CS 124/125 and probability. • Coursework: lecture scribing, problem sets, and a final project. Students will also assist in grading problem sets. No coding. • Topics will include those from CS 124/125 at a deeper level of exposition, as well as entirely new topics. 3 The Predecessor Problem In the predecessor, we wish to maintain a ordered set S = fX1;X2; :::; Xng subject to the prede- cessor query: pred(z) = maxfx 2 Sjx < zg Usually, we do this by representing S in a data structure. In the static predecessor problem, S does not change between pred queries. In the dynamic predecessor problem, S may change through the operations: insert(z): S S [ fzg del(z): S S n fzg For the static predecessor problem, a good solution is to store S as a sorted array. pred can then be implemented via binary search. This requires Θ(n) space, Θ(log n) runtime for pred, and Θ(n log n) preprocessing time. 1 For the dynamic predecessor problem, we can maintain S in a balanced binary search tree, or BBST (e.g.
    [Show full text]
  • On Data Structures and Memory Models
    2006:24 DOCTORAL T H E SI S On Data Structures and Memory Models Johan Karlsson Luleå University of Technology Department of Computer Science and Electrical Engineering 2006:24|: 402-544|: - -- 06 ⁄24 -- On Data Structures and Memory Models by Johan Karlsson Department of Computer Science and Electrical Engineering Lule˚a University of Technology SE-971 87 Lule˚a, Sweden May 2006 Supervisor Andrej Brodnik, Ph.D., Lule˚a University of Technology, Sweden Abstract In this thesis we study the limitations of data structures and how they can be overcome through careful consideration of the used memory models. The word RAM model represents the memory as a finite set of registers consisting of a constant number of unique bits. From a hardware point of view it is not necessary to arrange the memory as in the word RAM memory model. However, it is the arrangement used in computer hardware today. Registers may in fact share bits, or overlap their bytes, as in the RAM with Byte Overlap (RAMBO) model. This actually means that a physical bit can appear in several registers or even in several positions within one regis- ter. The RAMBO model of computation gives us a huge variety of memory topologies/models depending on the appearance sets of the bits. We show that it is feasible to implement, in hardware, other memory models than the word RAM memory model. We do this by implementing a RAMBO variant on a memory board for the PC100 memory bus. When alternative memory models are allowed, it is possible to solve a number of problems more efficiently than under the word RAM memory model.
    [Show full text]
  • Predecessor Search
    Predecessor Search GONZALO NAVARRO and JAVIEL ROJAS-LEDESMA, Millennium Institute for Foundational Research on Data (IMFD), Department of Computer Science, University of Chile, Santiago, Chile. The predecessor problem is a key component of the fundamental sorting-and-searching core of algorithmic problems. While binary search is the optimal solution in the comparison model, more realistic machine models on integer sets open the door to a rich universe of data structures, algorithms, and lower bounds. In this article we review the evolution of the solutions to the predecessor problem, focusing on the important algorithmic ideas, from the famous data structure of van Emde Boas to the optimal results of Patrascu and Thorup. We also consider lower bounds, variants and special cases, as well as the remaining open questions. CCS Concepts: • Theory of computation → Predecessor queries; Sorting and searching. Additional Key Words and Phrases: Integer data structures, integer sorting, RAM model, cell-probe model ACM Reference Format: Gonzalo Navarro and Javiel Rojas-Ledesma. 2019. Predecessor Search. ACM Comput. Surv. 0, 0, Article 0 ( 2019), 37 pages. https://doi.org/0 1 INTRODUCTION Assume we have a set - of = keys from a universe * with a total order. In the predecessor problem, one is given a query element @ 2 * , and is asked to find the maximum ? 2 - such that ? ≤ @ (the predecessor of @). This is an extension of the more basic membership problem, which only aims to find whether @ 2 -. Both are fundamental algorithmic problems that compose the “sorting and searching” core, which lies at the base of virtually every other area and application in Computer Science (e.g., see [7, 22, 37, 58, 59, 65, 75]).
    [Show full text]
  • Advanced Data Structures 1 Introduction 2 Setting the Stage 3
    3 Van Emde Boas Trees Advanced Data Structures Anubhav Baweja May 19, 2020 1 Introduction Design of data structures is important for storing and retrieving information efficiently. All data structures have a set of operations that they support in some time bounds. For instance, balanced binary search trees such as AVL trees support find, insert, delete, and other operations in O(log n) time where n is the number of elements in the tree. In this report we will talk about 2 data structures that support the same operations but in different time complexities. This problem is called the fixed-universe predecessor problem and the two data structures we will be looking at are Van Emde Boas trees and Fusion trees. 2 Setting the stage For this problem, we will make the fixed-universe assumption. That is, the only elements that we care about are w-bit integers. Additionally, we will be working in the word RAM model: so we can assume that w ≥ O(log n) where n is the size of the problem, and we can do operations such as addition, subtraction etc. on w-bit words in O(1) time. These are fair assumptions to make, since these are restrictions and advantages that real computers offer. So now given the data structure T , we want to support the following operations: 1. insert(T, a): insert integer a into T . If it already exists, do not duplicate. 2. delete(T, a): delete integer a from T , if it exists. 3. predecessor(T, a): return the largest b in T such that b ≤ a, if one exists.
    [Show full text]
  • Dynamic Integer Sets with Optimal Rank, Select, and Predecessor
    Dynamic Integer Sets with Optimal Rank, Select, and Predecessor Search ∗ Mihai Pˇatra¸scu† Mikkel Thorup‡ University of Copenhagen Abstract We present a data structure representing a dynamic set S of w-bit integers on a w-bit word RAM. With S = n and w log n and space O(n), we support the following standard operations in O(log n/ log| |w) time: ≥ insert(x) sets S = S x . • ∪{ } delete(x) sets S = S x . • \{ } predecessor(x) returns max y S y < x . • { ∈ | } successor(x) returns min y S y x . • { ∈ | ≥ } rank(x) returns # y S y < x . • { ∈ | } select(i) returns y S with rank(y)= i, if any. • ∈ Our O(log n/ log w) bound is optimal for dynamic rank and select, matching a lower bound of Fredman and Saks [STOC’89]. When the word length is large, our time bound is also optimal for dynamic predecessor, matching a static lower bound of Beame and Fich [STOC’99] whenever log n/ log w = O(log w/ log log w). Technically, the most interesting aspect of our data structure is that it supports all operations in constant time for sets of size n = wO(1). This resolves a main open problem of Ajtai, Komlos, and Fredman [FOCS’83]. Ajtai et al. presented such a data structure in Yao’s abstract cell-probe model with w-bit cells/words, but pointed out that the functions used could not be implemented. As a partial solution to the problem, Fredman and Willard [STOC’90] introduced a fusion node that could handle queries in constant time, but used polynomial time on the updates.
    [Show full text]
  • MIT 6.851 Advanced Data Structures Prof
    MIT 6.851 Advanced Data Structures Prof. Erik Demaine Spring '12 Scribe Notes Collection TA: Tom Morgan, Justin Zhang Editing: Justin Zhang Contents 1 1. Temporal data structure 1 4 Scribers: Oscar Moll (2012), Aston Motes (2007), Kevin Wang (2007) 1.1 Overview . 4 1.2 Model and definitions . 4 1.3 Partial persistence . 6 1.4 Full persistence . 9 1.5 Confluent Persistence . 12 1.6 Functional persistence . 13 2 2. Temporal data structure 2 14 Scribers: Erek Speed (2012), Victor Jakubiuk (2012), Aston Motes (2007), Kevin Wang (2007) 2.1 Overview . 14 2.2 Retroactivity . 14 3 3. Geometric data structure 1 24 Scribers: Brian Hamrick (2012), Ben Lerner (2012), Keshav Puranmalka (2012) 3.1 Overview . 24 3.2 Planar Point Location . 24 3.3 Orthogonal range searching . 27 3.4 Fractional Cascading . 33 4 4. Geometric data structure 2 35 2 Scribers: Brandon Tran (2012), Nathan Pinsker (2012), Ishaan Chugh (2012), David Stein (2010), Jacob Steinhardt (2010) 4.1 Overview- Geometry II . 35 4.2 3D Orthogonal Range Search in O(lg n) Query Time . 35 4.3 Kinetic Data Structures . 38 5 5. Dynamic optimality 1 42 Scribers: Brian Basham (2012), Travis Hance (2012), Jayson Lynch (2012) 5.1 Overview . 42 5.2 Binary Search Trees . 42 5.3 Splay Trees . 45 5.4 Geometric View . 46 6 6. Dynamic optimality 2 50 Scribers: Aakanksha Sarda (2012), David Field (2012), Leonardo Urbina (2012), Prasant Gopal (2010), Hui Tang (2007), Mike Ebersol (2005) 6.1 Overview . 50 6.2 Independent Rectangle Bounds . 50 6.3 Lower Bounds .
    [Show full text]
  • Advanced Rank/Select Data Structures: Succinctness, Bounds, and Applications
    Universita` degli Studi di Pisa Dipartimento di Informatica Dottorato di Ricerca in Informatica Settore Scientifico Disciplinare: INF/01 Ph.D. Thesis Advanced rank/select data structures: succinctness, bounds, and applications Alessio Orlandi Supervisor Roberto Grossi Referee Referee Referee Veli M¨akinen Gonzalo Navarro Kunihiko Sadakane December 19, 2012 Acknowledgements This thesis is the end of a long, 4 year journey full of wonders, obstacles, aspirations and setbacks. From the person who cautiously set foot in Pisa to the guy who left his own country, none of these steps would have been possible without the right people at the right moment, supporting me through the dark moments of my life and being with me enjoying the bright ones. First of all, I need to thank Prof. Roberto Grossi, who decided that he could accept me as a Ph.D. Student. Little he knew of what was ahead :). Still, he bailed me out of trouble multiple times, provided invaluable support and insight, helping me grow both as a person and as a scientist. I also owe a lot to Prof. Rajeev Raman, who has been a valuable, patient and welcoming co-author. I also want to thank Proff. Sebastiano Vigna and Paolo Boldi, who nurtured my passion for computer science and introduced me to their branch of research. Also Prof. Degano, as head of the Ph.D. course, provided me with non-trivial help during these years. In Pisa, I met a lot of interesting people who were crucial for my happiness, was it when studying on a Sunday, on a boring the-proof-does-not-work-again day, in moments of real need, or on a Saturday night.
    [Show full text]
  • Computational Geometry Through the Information Lens Mihai Pdtracu
    Computational Geometry through the Information Lens by Mihai Pdtracu Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2007 © Massachusetts Institute of Technology 2007. All rights reserved. A uthor ........................................... L............... ........ Department of Electrical Engineering and Computer Science May 22, 2007 Certified by .......................... Erik D. Demaine Associate Professor Thesis Supervisor Accepted by.... .. .. .......... .. .......... ... ..-- - ............... Arthur C. Smith Chairman, Department Committee on Graduate Students BARKEfR MASSACHUSETTS INMTITUTE OF TECHNOLOGY AUG 16 2007 URRIEFS cl Computational Geometry through the Information Lens by Mihai Pdtra§cu Submitted to the Department of Electrical Engineering and Computer Science on May 22, 2007, in partial fulfillment of the requirements for the degree of Master of Science Abstract This thesis revisits classic problems in computational geometry from the modern algorithmic perspective of exploiting the bounded precision of the input. In one dimension, this viewpoint has taken over as the standard model of computation, and has led to a powerful suite of techniques that constitute a mature field of research. In two or more dimensions, we have seen great success in understanding orthogonal problems, which decompose naturally into one dimensional problems. However, problems of a nonorthogonal nature, the core of computational geometry, have remained uncracked for many years despite extensive effort. For example, Willard asked in SODA'92 for a o(n lg n) algorithm for Voronoi diagrams. Despite growing interest in the problem, it was not successfully solved until this thesis. Formally, let w be the number of bits in a computer word, and consider n points with O(w)-bit rational coordinates.
    [Show full text]
  • 26 January, 2017 1 Overview 2 Y-Fast Tries
    CS 224: Advanced Algorithms Spring 2017 Lecture 2 | 26 January, 2017 Prof. Jelani Nelson Scribe: Daniel Alabi Spring'17, David Liu Fall'14 1 Overview In the last lecture, we discussed the Word RAM model, Van Emde Boas trees, and X-fast tries which are the basis for Y-fast tries. In this lecture we complete our discussion of Y-fast tries and discuss Fusion trees. Fusion trees show just how powerful the Word RAM model is. We exploit word-level parallelism to perform operations (like masking, comparisons) in constant time. 2 Y-fast Tries Y-fast tries make use of both X-fast tries and balanced Binary Search Trees (BSTs) to improve the space usage to Θ(n) from Θ(nw) when using X-fast tries. 2.1 Use of X-fast Tries Recall that w is the number of bits in a machine word and u = 2w is the universe. In the base level, we have u bits where the 1 bits are connected together in a doubly-linked list, for use in identifying the predecessor of an element. Then we OR the bits recursively, starting from the base level, until we get to the top level. Then to find the predecessor of an element i 2 [u], if the i-th bit is a 1, we just use the doubly-linked list to find the predecessor element. Else, we go up the trie until we find the first 1 on our way up, then we go down again by the provenance OR path of this 1 bit.
    [Show full text]
  • Minimal Indices for Predecessor Search ∗ Sarel Cohen , Amos Fiat, Moshik Hershcovitch, Haim Kaplan
    Information and Computation 240 (2015) 12–30 Contents lists available at ScienceDirect Information and Computation www.elsevier.com/locate/yinco ✩ Minimal indices for predecessor search ∗ Sarel Cohen , Amos Fiat, Moshik Hershcovitch, Haim Kaplan Tel-Aviv University, Israel a r t i c l e i n f o a b s t r a c t Article history: We give a new predecessor data structure which improves upon the index size of the 4/5 Received 30 September 2013 Patraˇ scu–Thorup ¸ data structures, reducing the index size from O (nw ) bits to O (n log w) Available online 2 October 2014 bits, with optimal probe complexity. Alternatively, our new data structure can be viewed as matching the space complexity of the (probe-suboptimal) z-fast trie of Belazzougui et Keywords: al. Thus, we get the best of both approaches with respect to both probe count and index Successor search size. The penalty we pay is an extra O (log w) inter-register operations. Our data structure Predecessor search Succinct data structures can also be used to solve the weak prefix search problem, the index size of O (n log w) bits Cell probe model is known to be optimal for any such data structure. Fusion trees The technical contributions include highly efficient single word indices, with out-degree 1/5 Tries w/ log w (compared to w of a fusion tree node). To construct these indices we device Word RAM model highly efficient bit selectors which, we believe, are of independent interest. © 2014 Elsevier Inc. All rights reserved. 1.
    [Show full text]
  • Lower Bound Techniques for Data Structures Mihai
    Lower Bound Techniques for Data Structures by Mihai Pˇatra¸scu Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY September 2008 c Massachusetts Institute of Technology 2008. All rights reserved. Author.................................................................... Department of Electrical Engineering and Computer Science August 8, 2008 Certified by . Erik D. Demaine Associate Professor Thesis Supervisor Accepted by . Professor Terry P. Orlando Chair, Department Committee on Graduate Students 2 Lower Bound Techniques for Data Structures by Mihai Pˇatra¸scu Submitted to the Department of Electrical Engineering and Computer Science on August 8, 2008, in partial fulfillment of the requirements for the degree of Doctor of Philosophy Abstract We describe new techniques for proving lower bounds on data-structure problems, with the following broad consequences: • the first Ω(lg n) lower bound for any dynamic problem, improving on a bound that had been standing since 1989; • for static data structures, the first separation between linear and polynomial space. Specifically, for some problems that have constant query time when polynomial space is allowed, we can show Ω(lg n= lg lg n) bounds when the space is O(n · polylog n). Using these techniques, we analyze a variety of central data-structure problems, and obtain improved lower bounds for the following: • the partial-sums problem (a fundamental application of augmented binary search trees); • the predecessor problem (which is equivalent to IP lookup in Internet routers); • dynamic trees and dynamic connectivity; • orthogonal range stabbing. • orthogonal range counting, and orthogonal range reporting; • the partial match problem (searching with wild-cards); • (1 + )-approximate near neighbor on the hypercube; • approximate nearest neighbor in the `1 metric.
    [Show full text]