Algorithms {Fundamental Techniques} Contents

Total Page:16

File Type:pdf, Size:1020Kb

Algorithms {Fundamental Techniques} Contents Algorithms {fundamental techniques} Contents 1 Introduction 1 1.1 Prerequisites ............................................. 1 1.2 When is Efficiency Important? .................................... 1 1.3 Inventing an Algorithm ........................................ 2 1.4 Understanding an Algorithm ..................................... 3 1.5 Overview of the Techniques ..................................... 3 1.6 Algorithm and code example ..................................... 4 1.6.1 Level 1 (easiest) ........................................ 4 1.6.2 Level 2 ............................................ 4 1.6.3 Level 3 ............................................ 4 1.6.4 Level 4 ............................................ 4 1.6.5 Level 5 ............................................ 4 2 Mathematical Background 5 2.1 Asymptotic Notation ......................................... 5 2.1.1 Big Omega .......................................... 6 2.1.2 Big Theta ........................................... 6 2.1.3 Little-O and Omega ..................................... 6 2.1.4 Big-O with multiple variables ................................ 7 2.2 Algorithm Analysis: Solving Recurrence Equations ......................... 7 2.2.1 Substitution method ..................................... 7 2.2.2 Summations ......................................... 7 2.2.3 Draw the Tree and Table ................................... 7 2.2.4 The Master Theorem ..................................... 7 2.3 Amortized Analysis .......................................... 8 3 Divide and Conquer 9 3.1 Merge Sort .............................................. 9 3.1.1 Analysis ........................................... 9 3.1.2 Iterative Version ....................................... 10 3.1.3 space inefficiency ....................................... 10 3.2 Binary Search ............................................. 10 3.3 Integer Multiplication ......................................... 11 i ii CONTENTS 3.3.1 Grade School Multiplication ................................. 11 3.3.2 Divide and Conquer Multiplication .............................. 11 3.4 Base Conversion ........................................... 12 3.4.1 Recursive Implementation .................................. 13 3.4.2 Iterative Implementation ................................... 13 3.5 Closest Pair of Points ......................................... 14 3.6 Closest Pair: A Divide-and-Conquer Approach ........................... 14 3.6.1 Introduction ......................................... 14 3.6.2 Closest Pair in the Plane ................................... 14 3.6.3 Summary and Analysis of the 2-D Algorithm ........................ 14 3.6.4 Improving the Algorithm ................................... 15 3.7 Towers Of Hanoi Problem ...................................... 15 3.7.1 Rules ............................................. 15 3.7.2 Solution ............................................ 15 3.8 Footnotes ............................................... 15 4 Randomization 17 4.1 Ordered Statistics ........................................... 17 4.1.1 find-max ........................................... 17 4.1.2 find-min-max ......................................... 17 4.1.3 find-median .......................................... 18 4.2 Quicksort ............................................... 19 4.3 Shuffling an Array .......................................... 20 4.4 Equal Multivariate Polynomials .................................... 20 4.5 Hash tables .............................................. 20 4.6 Skip Lists ............................................... 21 4.6.1 a method of skip list implementation : implement lookahead single-linked linked list, then test , then transform to skip list implementation , then same test, then performance comparison 22 4.6.2 Role of Randomness ..................................... 22 4.6.3 concurrent access application ................................. 23 4.6.4 Idea for an exercise ...................................... 23 4.7 Treaps ................................................. 23 4.7.1 java example of treap implementation ............................ 23 4.7.2 Treaps compared and contrasted to Splay trees ....................... 23 4.8 Derandomization ........................................... 24 4.9 Exercises ............................................... 24 4.10 Supplementary Topic: skip lists and multiprocessor algorithms ................... 24 5 Backtracking 26 5.1 Longest Common Subsequence (exhaustive version) ......................... 26 5.2 Shortest Path Problem (exhaustive version) .............................. 27 5.3 Largest Independent Set ....................................... 27 CONTENTS iii 5.4 Bounding Searches .......................................... 27 5.5 Constrained 3-Coloring ........................................ 27 5.6 Traveling Salesperson Problem .................................... 27 6 Dynamic Programming 28 6.1 Fibonacci Numbers .......................................... 28 6.2 Longest Common Subsequence (DP version) ............................. 29 6.3 Matrix Chain Multiplication ..................................... 29 6.3.1 Forming a Recursive Solution ................................ 30 6.4 Parsing Any Context-Free Grammar ................................. 31 7 Greedy Algorithms 32 7.1 Event Scheduling Problem ...................................... 32 7.1.1 = Longest Path solution to critical path scheduling of jobs .................. 33 7.2 Dijkstra’s Shortest Path Algorithm .................................. 33 7.3 Minimum spanning tree ........................................ 35 7.4 Maximum Flow in weighted graphs .................................. 35 8 Hill Climbing 36 8.1 Newton’s Root Finding Method .................................... 36 8.2 Network Flow ............................................. 37 8.3 The Ford-Fulkerson Algorithm .................................... 38 9 Unweighted Graph Algorithms 40 9.1 Representation of Graph ........................................ 40 9.1.1 Adjacency Matrix ....................................... 40 9.1.2 Adjacency List ........................................ 40 9.1.3 Comparison .......................................... 40 9.2 Depth First Search ........................................... 40 9.2.1 Pseudocode .......................................... 40 9.2.2 Properties ........................................... 40 9.2.3 Classification of Edge ..................................... 40 9.3 Breadth First Search .......................................... 40 9.3.1 Pseudocode .......................................... 40 9.3.2 Example ............................................ 40 9.3.3 Correctness .......................................... 40 9.3.4 Analysis ............................................ 40 9.3.5 Usage ............................................. 40 9.4 Classical Graph Problems ....................................... 40 9.4.1 Directed graph cycle detection ................................ 41 9.4.2 Topological Sort of Directed Graph ............................. 41 9.4.3 Strongly Connected Components in Directed Graphs ..................... 41 9.4.4 Articulation Vertex ...................................... 41 iv CONTENTS 9.4.5 Bridge ............................................. 41 9.4.6 Diameter ........................................... 41 10 Distance approximations 42 10.1 You don't need a square root to compare distances .......................... 42 10.2 Approximations of Euclidean distance ................................ 42 10.2.1 Taxicab/Manhattan/L1 .................................... 42 10.2.2 Octagonal ........................................... 42 11 Appendix A: Ada Implementation 44 11.1 Introduction .............................................. 44 11.2 Chapter 1: Introduction ........................................ 44 11.2.1 To Lower ........................................... 44 11.2.2 Equal Ignore Case ...................................... 44 11.3 Chapter 6: Dynamic Programming .................................. 44 11.3.1 Fibonacci numbers ...................................... 44 11.4 Text and image sources, contributors, and licenses .......................... 46 11.4.1 Text .............................................. 46 11.4.2 Images ............................................ 46 11.4.3 Content license ........................................ 47 Chapter 1 Introduction Top, Chapters: 1, 2, 3, 4, 5, 6, 7, 8, 9, A 1.1 Prerequisites This book covers techniques for the design and analysis of algorithms. The algorithmic techniques covered in- To understand the material presented in this book you clude: divide and conquer, backtracking, dynamic pro- need to know a programming language well enough to gramming, greedy algorithms, and hill-climbing. translate the pseudocode in this book into a working solu- tion. You also need to know the basics about the follow- Any solvable problem generally has at least one algorithm ing data structures: arrays, stacks, queues, linked-lists, of each of the following types: trees, heaps (also called priority queues), disjoint sets, and graphs. 1. the obvious way; Additionally, you should know some basic algorithms like binary search, a sorting algorithm (merge sort, heap sort, insertion sort, or others), and breadth-first or depth-first 2. the methodical way; search. If you are unfamiliar with any of these prerequisites you 3. the clever way; and should review the material in the Data Structures book first. 4.
Recommended publications
  • Through the Concept of Data Structures, the Self- Balancing Binary Search Tree
    International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 01 | Jan 2019 www.irjet.net p-ISSN: 2395-0072 THROUGH THE CONCEPT OF DATA STRUCTURES, THE SELF- BALANCING BINARY SEARCH TREE Asniya Sadaf Syed Atiqur Rehman1, Avantika kishor Bakale2, Priyanka Patil3 1,2,3Department of Computer Science and Engineering, Prof Ram Meghe College of Engineering and Management, Badnera -------------------------------------------------------------------------***------------------------------------------------------------------------ ABSTRACT - In the word of computing tree is a known way of implementing balancing tree as binary hierarchical data structure which stores information tree they are originally discovered by Bayer and are naturally in the form of hierarchy style. Tree is a most nowadays extensively (diseased) in the standard powerful and advanced data structure. This paper is literature or algorithm Maintaining the invariant of red mainly focused on self -balancing binary search tree(BST) black tree through Haskell types system using the nested also known as height balanced BST. A BST is a type of data data types this give small list noticeable overhead. Many structure that adjust itself to provide the consistent level gives small list overhead can be removed by the use of of node access. This paper covers the different types of BST existential types [4]. their analysis, complexity and application. 3.1. AVL TREE Key words: AVL Tree, Splay Tree, Skip List, Red Black Tree, BST. AVL Tree is best example of self-balancing search tree; this means that AVL Tree is also binary search tree 1. INTRODUCTION which is also balancing tree. A binary tree is said to be Tree data structures are the similar like Maps and Sets, balanced if different between the height of left and right.
    [Show full text]
  • Binary Search Tree
    ADT Binary Search Tree! Ellen Walker! CPSC 201 Data Structures! Hiram College! Binary Search Tree! •" Value-based storage of information! –" Data is stored in order! –" Data can be retrieved by value efficiently! •" Is a binary tree! –" Everything in left subtree is < root! –" Everything in right subtree is >root! –" Both left and right subtrees are also BST#s! Operations on BST! •" Some can be inherited from binary tree! –" Constructor (for empty tree)! –" Inorder, Preorder, and Postorder traversal! •" Some must be defined ! –" Insert item! –" Delete item! –" Retrieve item! The Node<E> Class! •" Just as for a linked list, a node consists of a data part and links to successor nodes! •" The data part is a reference to type E! •" A binary tree node must have links to both its left and right subtrees! The BinaryTree<E> Class! The BinaryTree<E> Class (continued)! Overview of a Binary Search Tree! •" Binary search tree definition! –" A set of nodes T is a binary search tree if either of the following is true! •" T is empty! •" Its root has two subtrees such that each is a binary search tree and the value in the root is greater than all values of the left subtree but less than all values in the right subtree! Overview of a Binary Search Tree (continued)! Searching a Binary Tree! Class TreeSet and Interface Search Tree! BinarySearchTree Class! BST Algorithms! •" Search! •" Insert! •" Delete! •" Print values in order! –" We already know this, it#s inorder traversal! –" That#s why it#s called “in order”! Searching the Binary Tree! •" If the tree is
    [Show full text]
  • Binary Search Trees (BST)
    CSCI-UA 102 Joanna Klukowska Lecture 7: Binary Search Trees [email protected] Lecture 7: Binary Search Trees (BST) Reading materials Goodrich, Tamassia, Goldwasser: Chapter 8 OpenDSA: Chapter 18 and 12 Binary search trees visualizations: http://visualgo.net/bst.html http://www.cs.usfca.edu/~galles/visualization/BST.html Topics Covered 1 Binary Search Trees (BST) 2 2 Binary Search Tree Node 3 3 Searching for an Item in a Binary Search Tree3 3.1 Binary Search Algorithm..............................................4 3.1.1 Recursive Approach............................................4 3.1.2 Iterative Approach.............................................4 3.2 contains() Method for a Binary Search Tree..................................5 4 Inserting a Node into a Binary Search Tree5 4.1 Order of Insertions.................................................6 5 Removing a Node from a Binary Search Tree6 5.1 Removing a Leaf Node...............................................7 5.2 Removing a Node with One Child.........................................7 5.3 Removing a Node with Two Children.......................................8 5.4 Recursive Implementation.............................................9 6 Balanced Binary Search Trees 10 6.1 Adding a balance() Method........................................... 10 7 Self-Balancing Binary Search Trees 11 7.1 AVL Tree...................................................... 11 7.1.1 When balancing is necessary........................................ 12 7.2 Red-Black Trees.................................................. 15 1 CSCI-UA 102 Joanna Klukowska Lecture 7: Binary Search Trees [email protected] 1 Binary Search Trees (BST) A binary search tree is a binary tree with additional properties: • the value stored in a node is greater than or equal to the value stored in its left child and all its descendants (or left subtree), and • the value stored in a node is smaller than the value stored in its right child and all its descendants (or its right subtree).
    [Show full text]
  • A Set Intersection Algorithm Via X-Fast Trie
    Journal of Computers A Set Intersection Algorithm Via x-Fast Trie Bangyu Ye* National Engineering Laboratory for Information Security Technologies, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100091, China. * Corresponding author. Tel.:+86-10-82546714; email: [email protected] Manuscript submitted February 9, 2015; accepted May 10, 2015. doi: 10.17706/jcp.11.2.91-98 Abstract: This paper proposes a simple intersection algorithm for two sorted integer sequences . Our algorithm is designed based on x-fast trie since it provides efficient find and successor operators. We present that our algorithm outperforms skip list based algorithm when one of the sets to be intersected is relatively ‘dense’ while the other one is (relatively) ‘sparse’. Finally, we propose some possible approaches which may optimize our algorithm further. Key words: Set intersection, algorithm, x-fast trie. 1. Introduction Fast set intersection is a key operation in the context of several fields when it comes to big data era [1], [2]. For example, modern search engines use the set intersection for inverted posting list which is a standard data structure in information retrieval to return relevant documents. So it has been studied in many domains and fields [3]-[8]. One of the most typical situations is Boolean query which is required to retrieval the documents that contains all the terms in the query. Besides, set intersection is naturally a key component of calculating the Jaccard coefficient of two sets, which is defined by the fraction of size of intersection and union. In this paper, we propose a new algorithm via x-fast trie which is a kind of advanced data structure.
    [Show full text]
  • Objectives Objectives Searching a Simple Searching Problem A
    Python Programming: Objectives An Introduction to To understand the basic techniques for Computer Science analyzing the efficiency of algorithms. To know what searching is and understand the algorithms for linear and binary Chapter 13 search. Algorithm Design and Recursion To understand the basic principles of recursive definitions and functions and be able to write simple recursive functions. Python Programming, 1/e 1 Python Programming, 1/e 2 Objectives Searching To understand sorting in depth and Searching is the process of looking for a know the algorithms for selection sort particular value in a collection. and merge sort. For example, a program that maintains To appreciate how the analysis of a membership list for a club might need algorithms can demonstrate that some to look up information for a particular problems are intractable and others are member œ this involves some sort of unsolvable. search process. Python Programming, 1/e 3 Python Programming, 1/e 4 A simple Searching Problem A Simple Searching Problem Here is the specification of a simple In the first example, the function searching function: returns the index where 4 appears in def search(x, nums): the list. # nums is a list of numbers and x is a number # Returns the position in the list where x occurs # or -1 if x is not in the list. In the second example, the return value -1 indicates that 7 is not in the list. Here are some sample interactions: >>> search(4, [3, 1, 4, 2, 5]) 2 Python includes a number of built-in >>> search(7, [3, 1, 4, 2, 5]) -1 search-related methods! Python Programming, 1/e 5 Python Programming, 1/e 6 Python Programming, 1/e 1 A Simple Searching Problem A Simple Searching Problem We can test to see if a value appears in The only difference between our a sequence using in.
    [Show full text]
  • Prefix Hash Tree an Indexing Data Structure Over Distributed Hash
    Prefix Hash Tree An Indexing Data Structure over Distributed Hash Tables Sriram Ramabhadran ∗ Sylvia Ratnasamy University of California, San Diego Intel Research, Berkeley Joseph M. Hellerstein Scott Shenker University of California, Berkeley International Comp. Science Institute, Berkeley and and Intel Research, Berkeley University of California, Berkeley ABSTRACT this lookup interface has allowed a wide variety of Distributed Hash Tables are scalable, robust, and system to be built on top DHTs, including file sys- self-organizing peer-to-peer systems that support tems [9, 27], indirection services [30], event notifi- exact match lookups. This paper describes the de- cation [6], content distribution networks [10] and sign and implementation of a Prefix Hash Tree - many others. a distributed data structure that enables more so- phisticated queries over a DHT. The Prefix Hash DHTs were designed in the Internet style: scala- Tree uses the lookup interface of a DHT to con- bility and ease of deployment triumph over strict struct a trie-based structure that is both efficient semantics. In particular, DHTs are self-organizing, (updates are doubly logarithmic in the size of the requiring no centralized authority or manual con- domain being indexed), and resilient (the failure figuration. They are robust against node failures of any given node in the Prefix Hash Tree does and easily accommodate new nodes. Most impor- not affect the availability of data stored at other tantly, they are scalable in the sense that both la- nodes). tency (in terms of the number of hops per lookup) and the local state required typically grow loga- Categories and Subject Descriptors rithmically in the number of nodes; this is crucial since many of the envisioned scenarios for DHTs C.2.4 [Comp.
    [Show full text]
  • Chapter 13 Sorting & Searching
    13-1 Java Au Naturel by William C. Jones 13-1 13 Sorting and Searching Overview This chapter discusses several standard algorithms for sorting, i.e., putting a number of values in order. It also discusses the binary search algorithm for finding a particular value quickly in an array of sorted values. The algorithms described here can be useful in various situations. They should also help you become more comfortable with logic involving arrays. These methods would go in a utilities class of methods for Comparable objects, such as the CompOp class of Listing 7.2. For this chapter you need a solid understanding of arrays (Chapter Seven). · Sections 13.1-13.2 discuss two basic elementary algorithms for sorting, the SelectionSort and the InsertionSort. · Section 13.3 presents the binary search algorithm and big-oh analysis, which provides a way of comparing the speed of two algorithms. · Sections 13.4-13.5 introduce two recursive algorithms for sorting, the QuickSort and the MergeSort, which execute much faster than the elementary algorithms when you have more than a few hundred values to sort. · Sections 13.6 goes further with big-oh analysis. · Section 13.7 presents several additional sorting algorithms -- the bucket sort, the radix sort, and the shell sort. 13.1 The SelectionSort Algorithm For Comparable Objects When you have hundreds of Comparable values stored in an array, you will often find it useful to keep them in sorted order from lowest to highest, which is ascending order. To be precise, ascending order means that there is no case in which one element is larger than the one after it -- if y is listed after x, then x.CompareTo(y) <= 0.
    [Show full text]
  • P4 Sec 4.1.1, 4.1.2, 4.1.3) Abstraction, Algorithms and ADT's
    Computer Science 9608 P4 Sec 4.1.1, 4.1.2, 4.1.3) Abstraction, Algorithms and ADT’s with Majid Tahir Syllabus Content: 4.1.1 Abstraction show understanding of how to model a complex system by only including essential details, using: functions and procedures with suitable parameters (as in procedural programming, see Section 2.3) ADTs (see Section 4.1.3) classes (as used in object-oriented programming, see Section 4.3.1) facts, rules (as in declarative programming, see Section 4.3.1) 4.1.2 Algorithms write a binary search algorithm to solve a particular problem show understanding of the conditions necessary for the use of a binary search show understanding of how the performance of a binary search varies according to the number of data items write an algorithm to implement an insertion sort write an algorithm to implement a bubble sort show understanding that performance of a sort routine may depend on the initial order of the data and the number of data items write algorithms to find an item in each of the following: linked list, binary tree, hash table write algorithms to insert an item into each of the following: stack, queue, linked list, binary tree, hash table write algorithms to delete an item from each of the following: stack, queue, linked list show understanding that different algorithms which perform the same task can be compared by using criteria such as time taken to complete the task and memory used 4.1.3 Abstract Data Types (ADT) show understanding that an ADT is a collection of data and a set of operations on those data
    [Show full text]
  • Binary Search Algorithm This Article Is About Searching a Finite Sorted Array
    Binary search algorithm This article is about searching a finite sorted array. For searching continuous function values, see bisection method. This article may require cleanup to meet Wikipedia's quality standards. No cleanup reason has been specified. Please help improve this article if you can. (April 2011) Binary search algorithm Class Search algorithm Data structure Array Worst case performance O (log n ) Best case performance O (1) Average case performance O (log n ) Worst case space complexity O (1) In computer science, a binary search or half-interval search algorithm finds the position of a specified input value (the search "key") within an array sorted by key value.[1][2] For binary search, the array should be arranged in ascending or descending order. In each step, the algorithm compares the search key value with the key value of the middle element of the array. If the keys match, then a matching element has been found and its index, or position, is returned. Otherwise, if the search key is less than the middle element's key, then the algorithm repeats its action on the sub-array to the left of the middle element or, if the search key is greater, on the sub-array to the right. If the remaining array to be searched is empty, then the key cannot be found in the array and a special "not found" indication is returned. A binary search halves the number of items to check with each iteration, so locating an item (or determining its absence) takes logarithmic time. A binary search is a dichotomic divide and conquer search algorithm.
    [Show full text]
  • Balanced Binary Search Trees – AVL Trees, 2-3 Trees, B-Trees
    Balanced binary search trees – AVL trees, 2‐3 trees, B‐trees Professor Clark F. Olson (with edits by Carol Zander) AVL trees One potential problem with an ordinary binary search tree is that it can have a height that is O(n), where n is the number of items stored in the tree. This occurs when the items are inserted in (nearly) sorted order. We can fix this problem if we can enforce that the tree remains balanced while still inserting and deleting items in O(log n) time. The first (and simplest) data structure to be discovered for which this could be achieved is the AVL tree, which is names after the two Russians who discovered them, Georgy Adelson‐Velskii and Yevgeniy Landis. It takes longer (on average) to insert and delete in an AVL tree, since the tree must remain balanced, but it is faster (on average) to retrieve. An AVL tree must have the following properties: • It is a binary search tree. • For each node in the tree, the height of the left subtree and the height of the right subtree differ by at most one (the balance property). The height of each node is stored in the node to facilitate determining whether this is the case. The height of an AVL tree is logarithmic in the number of nodes. This allows insert/delete/retrieve to all be performed in O(log n) time. Here is an example of an AVL tree: 18 3 37 2 11 25 40 1 8 13 42 6 10 15 Inserting 0 or 5 or 16 or 43 would result in an unbalanced tree.
    [Show full text]
  • Binary Search Algorithm
    Binary search algorithm Definition Search a sorted array by repeatedly dividing the search interval in half. Begin with an interval covering the whole array. If the value of the search key is less than the item in the middle of the interval, narrow the interval to the lower half. Otherwise narrow it to the upper half. Repeatedly check until the value is found or the interval is empty. Generally, to find a value in unsorted array, we should look through elements of an array one by one, until searched value is found. In case of searched value is absent from array, we go through all elements. In average, complexity of such an algorithm is proportional to the length of the array. Divide in half A fast way to search a sorted array is to use a binary search. The idea is to look at the element in the middle. If the key is equal to that, the search is finished. If the key is less than the middle element, do a binary search on the first half. If it's greater, do a binary search of the second half. Performance The advantage of a binary search over a linear search is astounding for large numbers. For an array of a million elements, binary search, O(log N), will find the target element with a worst case of only 20 comparisons. Linear search, O(N), on average will take 500,000 comparisons to find the element. Algorithm Algorithm is quite simple. It can be done either recursively or iteratively: 1. get the middle element; 2.
    [Show full text]
  • A Speculation-Friendly Binary Search Tree Tyler Crain, Vincent Gramoli, Michel Raynal
    A Speculation-Friendly Binary Search Tree Tyler Crain, Vincent Gramoli, Michel Raynal To cite this version: Tyler Crain, Vincent Gramoli, Michel Raynal. A Speculation-Friendly Binary Search Tree. [Research Report] PI-1984, 2011, pp.21. inria-00618995v2 HAL Id: inria-00618995 https://hal.inria.fr/inria-00618995v2 Submitted on 5 Mar 2012 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Publications Internes de l’IRISA ISSN : 2102-6327 PI 1984 – septembre 2011 A Speculation-Friendly Binary Search Tree* Tyler Crain** , Vincent Gramoli*** Michel Raynal**** [email protected], vincent.gramoli@epfl.ch, [email protected] Abstract: We introduce the first binary search tree algorithm designed for speculative executions. Prior to this work, tree structures were mainly designed for their pessimistic (non-speculative) accesses to have a bounded complexity. Researchers tried to evaluate transactional memory using such tree structures whose prominent example is the red-black tree library developed by Oracle Labs that is part of multiple benchmark distributions. Although well-engineered, such structures remain badly suited for speculative accesses, whose step complexity might raise dramatically with contention. We show that our speculation-friendly tree outperforms the existing transaction-based version of the AVL and the red-black trees.
    [Show full text]