Predecessor Search
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Persistent Predecessor Search and Orthogonal Point Location on the Word
Persistent Predecessor Search and Orthogonal Point Location on the Word RAM∗ Timothy M. Chan† August 17, 2012 Abstract We answer a basic data structuring question (for example, raised by Dietz and Raman [1991]): can van Emde Boas trees be made persistent, without changing their asymptotic query/update time? We present a (partially) persistent data structure that supports predecessor search in a set of integers in 1,...,U under an arbitrary sequence of n insertions and deletions, with O(log log U) { } expected query time and expected amortized update time, and O(n) space. The query bound is optimal in U for linear-space structures and improves previous near-O((log log U)2) methods. The same method solves a fundamental problem from computational geometry: point location in orthogonal planar subdivisions (where edges are vertical or horizontal). We obtain the first static data structure achieving O(log log U) worst-case query time and linear space. This result is again optimal in U for linear-space structures and improves the previous O((log log U)2) method by de Berg, Snoeyink, and van Kreveld [1995]. The same result also holds for higher-dimensional subdivisions that are orthogonal binary space partitions, and for certain nonorthogonal planar subdivisions such as triangulations without small angles. Many geometric applications follow, including improved query times for orthogonal range reporting for dimensions 3 on the RAM. ≥ Our key technique is an interesting new van-Emde-Boas–style recursion that alternates be- tween two strategies, both quite simple. 1 Introduction Van Emde Boas trees [60, 61, 62] are fundamental data structures that support predecessor searches in O(log log U) time on the word RAM with O(n) space, when the n elements of the given set S come from a bounded integer universe 1,...,U (U n). -
X-Fast and Y-Fast Tries
x-Fast and y-Fast Tries Outline for Today ● Bitwise Tries ● A simple ordered dictionary for integers. ● x-Fast Tries ● Tries + Hashing ● y-Fast Tries ● Tries + Hashing + Subdivision + Balanced Trees + Amortization Recap from Last Time Ordered Dictionaries ● An ordered dictionary is a data structure that maintains a set S of elements drawn from an ordered universe � and supports these operations: ● insert(x), which adds x to S. ● is-empty(), which returns whether S = Ø. ● lookup(x), which returns whether x ∈ S. ● delete(x), which removes x from S. ● max() / min(), which returns the maximum or minimum element of S. ● successor(x), which returns the smallest element of S greater than x, and ● predecessor(x), which returns the largest element of S smaller than x. Integer Ordered Dictionaries ● Suppose that � = [U] = {0, 1, …, U – 1}. ● A van Emde Boas tree is an ordered dictionary for [U] where ● min, max, and is-empty run in time O(1). ● All other operations run in time O(log log U). ● Space usage is Θ(U) if implemented deterministically, and O(n) if implemented using hash tables. ● Question: Is there a simpler data structure meeting these bounds? The Machine Model ● We assume a transdichotomous machine model: ● Memory is composed of words of w bits each. ● Basic arithmetic and bitwise operations on words take time O(1) each. ● w = Ω(log n). A Start: Bitwise Tries Tries Revisited ● Recall: A trie is a simple data 0 1 structure for storing strings. 0 1 0 1 ● Integers can be thought of as strings of bits. 1 0 1 1 0 ● Idea: Store integers in a bitwise trie. -
Lecture 1 — 24 January 2017 1 Overview 2 Administrivia 3 The
CS 224: Advanced Algorithms Spring 2017 Lecture 1 | 24 January 2017 Prof. Jelani Nelson Scribe: Jerry Ma 1 Overview We introduce the word RAM model of computation, which features fixed-size storage blocks (\words") similar to modern integer data types. We also introduce the predecessor problem and demonstrate solutions to the problem that are faster than optimal comparison-based methods. 2 Administrivia • Personnel: Jelani Nelson (instructor) and Tom Morgan (TF) • Course site: people.seas.harvard.edu/~cs224 • Course staff email: [email protected] • Prerequisites: CS 124/125 and probability. • Coursework: lecture scribing, problem sets, and a final project. Students will also assist in grading problem sets. No coding. • Topics will include those from CS 124/125 at a deeper level of exposition, as well as entirely new topics. 3 The Predecessor Problem In the predecessor, we wish to maintain a ordered set S = fX1;X2; :::; Xng subject to the prede- cessor query: pred(z) = maxfx 2 Sjx < zg Usually, we do this by representing S in a data structure. In the static predecessor problem, S does not change between pred queries. In the dynamic predecessor problem, S may change through the operations: insert(z): S S [ fzg del(z): S S n fzg For the static predecessor problem, a good solution is to store S as a sorted array. pred can then be implemented via binary search. This requires Θ(n) space, Θ(log n) runtime for pred, and Θ(n log n) preprocessing time. 1 For the dynamic predecessor problem, we can maintain S in a balanced binary search tree, or BBST (e.g. -
Lock-Free Concurrent Van Emde Boas Array
Lock-free concurrent van Emde Boas Array Ziyuan Guo Reiji Suda (Adviser) [email protected] [email protected] The University of Tokyo Graduate School of Information Science and Technology Tokyo, Japan ABSTRACT To unleash the power of modern multi-core processors, concur- Lock-based data structures have some potential issues such as dead- rent data structures are needed in many cases. Comparing to lock- lock, livelock, and priority inversion, and the progress can be de- based data structures, lock-free data structures can avoid some po- layed indefinitely if the thread that is holding locks cannot acquire tential issues such as deadlock, livelock, and priority inversion, and a timeslice from the scheduler. Lock-free data structures, which guarantees the progress [5]. guarantees the progress of some method call, can be used to avoid these problems. This poster introduces the first lock-free concur- 2 OBJECTIVES rent van Emde Boas Array which is a variant of van Emde Boas • Create a lock-free search tree based on van Emde Boas Tree. Tree. It’s linearizable and the benchmark shows significant per- • Get better performance and scalability. formance improvement comparing to other lock-free search trees • Linearizability, i.e., each method call should appear to take when the date set is large and dense enough. effect at some instant between its invocation and response [5]. CCS CONCEPTS • Computing methodologies → Concurrent algorithms. 3 RELATED WORK The base of our data structure is van Emde Boas Tree, whichis KEYWORDS named after P. van Emde Boas, the inventor of this data structure [7]. -
Integer Sorting in O ( N //Spl Root/Log Log N/ ) Expected Time and Linear Space
p (n log log n) Integer Sorting in O Expected Time and Linear Space Yijie Han Mikkel Thorup School of Interdisciplinary Computing and Engineering AT&T Labs— Research University of Missouri at Kansas City Shannon Laboratory 5100 Rockhill Road 180 Park Avenue Kansas City, MO 64110 Florham Park, NJ 07932 [email protected] [email protected] http://welcome.to/yijiehan Abstract of the input integers. The assumption that each integer fits in a machine word implies that integers can be operated on We present a randomized algorithm sorting n integers with single instructions. A similar assumption is made for p (n log log n) O (n log n) in O expected time and linear space. This comparison based sorting in that an time bound (n log log n) improves the previous O bound by Anderson et requires constant time comparisons. However, for integer al. from STOC’95. sorting, besides comparisons, we can use all the other in- As an immediate consequence, if the integers are structions available on integers in standard imperative pro- p O (n log log U ) bounded by U , we can sort them in gramming languages such as C [26]. It is important that the expected time. This is the first improvement over the word-size W is finite, for otherwise, we can sort in linear (n log log U ) O bound obtained with van Emde Boas’ data time by a clever coding of a huge vector-processor dealing structure from FOCS’75. with n input integers at the time [30, 27]. At the heart of our construction, is a technical determin- Concretely, Fredman and Willard [17] showed that we n (n log n= log log n) istic lemma of independent interest; namely, that we split can sort deterministically in O time and p p n (n log n) integers into subsets of size at most in linear time and linear space and randomized in O expected time space. -
Introduction to Algorithms, 3Rd
Thomas H. Cormen Charles E. Leiserson Ronald L. Rivest Clifford Stein Introduction to Algorithms Third Edition The MIT Press Cambridge, Massachusetts London, England c 2009 Massachusetts Institute of Technology All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. For information about special quantity discounts, please email special [email protected]. This book was set in Times Roman and Mathtime Pro 2 by the authors. Printed and bound in the United States of America. Library of Congress Cataloging-in-Publication Data Introduction to algorithms / Thomas H. Cormen ...[etal.].—3rded. p. cm. Includes bibliographical references and index. ISBN 978-0-262-03384-8 (hardcover : alk. paper)—ISBN 978-0-262-53305-8 (pbk. : alk. paper) 1. Computer programming. 2. Computer algorithms. I. Cormen, Thomas H. QA76.6.I5858 2009 005.1—dc22 2009008593 10987654321 Index This index uses the following conventions. Numbers are alphabetized as if spelled out; for example, “2-3-4 tree” is indexed as if it were “two-three-four tree.” When an entry refers to a place other than the main text, the page number is followed by a tag: ex. for exercise, pr. for problem, fig. for figure, and n. for footnote. A tagged page number often indicates the first page of an exercise or problem, which is not necessarily the page on which the reference actually appears. ˛.n/, 574 (set difference), 1159 (golden ratio), 59, 108 pr. jj y (conjugate of the golden ratio), 59 (flow value), 710 .n/ (Euler’s phi function), 943 (length of a string), 986 .n/-approximation algorithm, 1106, 1123 (set cardinality), 1161 o-notation, 50–51, 64 O-notation, 45 fig., 47–48, 64 (Cartesian product), 1162 O0-notation, 62 pr. -
On Data Structures and Memory Models
2006:24 DOCTORAL T H E SI S On Data Structures and Memory Models Johan Karlsson Luleå University of Technology Department of Computer Science and Electrical Engineering 2006:24|: 402-544|: - -- 06 ⁄24 -- On Data Structures and Memory Models by Johan Karlsson Department of Computer Science and Electrical Engineering Lule˚a University of Technology SE-971 87 Lule˚a, Sweden May 2006 Supervisor Andrej Brodnik, Ph.D., Lule˚a University of Technology, Sweden Abstract In this thesis we study the limitations of data structures and how they can be overcome through careful consideration of the used memory models. The word RAM model represents the memory as a finite set of registers consisting of a constant number of unique bits. From a hardware point of view it is not necessary to arrange the memory as in the word RAM memory model. However, it is the arrangement used in computer hardware today. Registers may in fact share bits, or overlap their bytes, as in the RAM with Byte Overlap (RAMBO) model. This actually means that a physical bit can appear in several registers or even in several positions within one regis- ter. The RAMBO model of computation gives us a huge variety of memory topologies/models depending on the appearance sets of the bits. We show that it is feasible to implement, in hardware, other memory models than the word RAM memory model. We do this by implementing a RAMBO variant on a memory board for the PC100 memory bus. When alternative memory models are allowed, it is possible to solve a number of problems more efficiently than under the word RAM memory model. -
Lock-Free Van Emde Boas Array Lock-Free Van Emde Boas
Lock-free van Emde Boas Array Ziyuan Guo, Reiji Suda (Adviser) Graduate School of Information Science and Technology, The University of Tokyo Introduction Structure Insert Insert operation will put a descriptor on the first node Results that it should modify to effectively lock the entire path of This poster introduces the first lock-free concurrent van Emde The original plan was to implement a van Emde Boas Tree by the modification. Then help itself to finish the work by We compared the thoughput of our implementation with the Boas Array which is a variant of van Emde Boas Tree (vEB effectively using the cooperate technique as locks. However, execute CAS operations stored in the descriptor. lock-free binary search tree and skip-lists implemented by K. 1 bool insert(x) { tree). It's linearizable and the benchmark shows significant a vEB tree stores maximum and minimum elements on the 2 if (not leaf) { Fraser. performance improvement comparing to other lock-free search root node of each sub-tree, which create a severe scalability 3 do { Benchmark Environment 4 start_over: trees when the date set is large and dense enough. bottleneck. Thus, we choose to not store the maximum and 5 summary_snap = summary; • Intel Xeon E7-8890 v4 @ 2.2GHz Although van Emde Boas tree is not considered to be practical minimum element on each node, and use a fixed degree (64 6 if (summary_snap & (1 << HIGH(x))) 7 if (cluster[HIGH(x)].insert(LOW(x))) • 32GB DDR4 2133MHz before, it still can outperform traditional search trees in many on modern 64bit CPUs) for every node, then use a bit vec- 8 return true; 9 else • qemu-kvm 0.12.1.2-2.506.el6 10.1 situations, and there is no lock-free concurrent implementation tor summary to store whether the corresponding sub-tree is 10 goto start_over; 11 if (needs_help(summary_snap)) { • Kernel 5.1.15-300.fc30.x86 64 yet. -
Memory Optimization
Memory Optimization Some slides from Christer Ericson Sony Computer Entertainment, Santa Monica Overview ► We have seen how to reorganize matrix computations to improve temporal and spatial locality § Improving spatial locality required knowing the layout of the matrix in memory ► Orthogonal approach § Change the representation of the data structure in memory to improve locality for a given pattern of data accesses from the computation § Less theory exists for this but some nice results are available for trees: van Emde Boas tree layout ► Similar ideas can be used for graph algorithms as well § However there is usually not as much locality in graph algorithms Data cache optimization ► Compressing data ► Prefetching data into cache ► Cache-conscious data structure layout § Tree data structures ► Linearization caching Prefetching ► Software prefetching § Not too early – data may be evicted before use § Not too late – data not fetched in time for use § Greedy ► Instructions § iA-64: lfetch (line prefetch) ► Options: § Intend to write: begins invalidations in other caches § Which level of cache to prefetch into § Compilers and programmers can access through intrinsics Software prefetching // Loop through and process all 4n elements for (int i = 0; i < 4 * n; i++) Process(elem[i]); const int kLookAhead = 4; // Some elements ahead for (int i = 0; i < 4 * n; i += 4) { Prefetch(elem[i + kLookAhead]); Process(elem[i + 0]); Process(elem[i + 1]); Process(elem[i + 2]); Process(elem[i + 3]); } Greedy prefetching void PreorderTraversal(Node *pNode) -
Cache-Friendly Search Trees; Or, in Which Everything Beats Std::Set
Cache-Friendly Search Trees; or, In Which Everything Beats std::set Jeffrey Barratt Brian Zhang jbarratt bhz July 4, 2019 1 Introduction While a lot of work in theoretical computer science has gone into optimizing the runtime and space usage of data structures, such work very often neglects a very important component of modern computers: the cache. In doing so, very often, data structures are developed that achieve theoretically-good runtimes but are slow in practice due to a large number of cache misses. In 1999, Frigo et al. [1999] introduced the notion of a cache-oblivious algorithm: an algorithm that uses the cache to its advantage, regardless of the size or structure of said cache. Since then, various authors have designed cache-oblivious algorithms and data structures for problems from matrix multiplication to array sorting [Demaine, 2002]. We focus in this work on cache-oblivious search trees; i.e. implementing an ordered dictionary in a cache-friendly manner. We will start by presenting an overview of cache-oblivious data structures, especially cache-oblivious search trees. We then give practical results using these cache-oblivious structures on modern-day machinery, comparing them to the standard std::set and other cache-friendly dictionaries such as B-trees. arXiv:1907.01631v1 [cs.DS] 2 Jul 2019 2 The Ideal-Cache Model To discuss caches theoretically, we first need to give a theoretical model that makes use of a cache. The ideal-cache model was first introduced by Frigo et al. [1999]. In this model, a computer's memory is modeled as a two-level hierarchy with a disk and a cache. -
Advanced Data Structures 1 Introduction 2 Setting the Stage 3
3 Van Emde Boas Trees Advanced Data Structures Anubhav Baweja May 19, 2020 1 Introduction Design of data structures is important for storing and retrieving information efficiently. All data structures have a set of operations that they support in some time bounds. For instance, balanced binary search trees such as AVL trees support find, insert, delete, and other operations in O(log n) time where n is the number of elements in the tree. In this report we will talk about 2 data structures that support the same operations but in different time complexities. This problem is called the fixed-universe predecessor problem and the two data structures we will be looking at are Van Emde Boas trees and Fusion trees. 2 Setting the stage For this problem, we will make the fixed-universe assumption. That is, the only elements that we care about are w-bit integers. Additionally, we will be working in the word RAM model: so we can assume that w ≥ O(log n) where n is the size of the problem, and we can do operations such as addition, subtraction etc. on w-bit words in O(1) time. These are fair assumptions to make, since these are restrictions and advantages that real computers offer. So now given the data structure T , we want to support the following operations: 1. insert(T, a): insert integer a into T . If it already exists, do not duplicate. 2. delete(T, a): delete integer a from T , if it exists. 3. predecessor(T, a): return the largest b in T such that b ≤ a, if one exists. -
6.854 Lecture Notes
6.854 Lecture Notes Thanadol Chomphoochan Fall 2020 This file contains all the raw notes I took when I was taking 6.854 Advanced Algorithms in Fall 2020, taught by Karger. I barely edited anything before compiling it as this file, so there may be factual or typographical errors. Please use this at your own risk. Please email [email protected] if you wish to provide feedback. (Last updated: December 6th, 2020) Contents 1 Fibonacci Heaps5 1.1 Inventing Fibonacci Heap .......................... 5 1.2 Potential function............................... 7 1.3 Analyzing the tree (\Saving Private Ryan")................ 7 1.3.1 Step 1: Analyze mark bits ..................... 8 1.3.2 Step 2: Understanding tree size .................. 8 1.4 Summary of Fibonacci Heap......................... 8 1.5 Fast Minimum Spanning Tree........................ 9 1.6 Persistent Data Structures.......................... 9 2 Persistent Data Structures 11 2.1 Fat node and the copy method ....................... 11 2.2 Path copying ................................. 11 2.3 Lazier path copying by Sarnak & Tarjan.................. 11 2.4 Application: Planar point location ..................... 12 3 Splay Trees 13 3.1 Analysis.................................... 13 4 Multi-level bucketing and van Emde Boas trees 16 4.1 Dial's algorithm for SSSP .......................... 16 4.2 Tries...................................... 16 4.2.1 Denardo & Fox............................ 17 4.2.2 Cherkassky, Goldberg, Silverstein ................. 17 4.3 van Emde Boas Tree (1977) ......................... 18 4.3.1 Insert(x; Q).............................. 18 4.3.2 Delete-min(x; Q)........................... 18 4.3.3 Analyzing the space complexity .................. 19 1 Thanadol Chomphoochan (Fall 2020) 6.854 Lecture Notes 5 Hashing 20 5.1 2-universal hash family by Carter and Wegman.............