Handbook of Data Structures and Applications

Handbook of Data Structures and Applications

出版信息

Dinesh P. Mehta / Chapman and Hall/CRC / 2004-10-28 / USD 135.95

内容简介

In the late sixties, Donald Knuth, winner of the 1974Turing Award, published his landmark

book The Art of Computer Programming: Fundamental Algorithms. This book brought to-

gether a body of knowledge that defined the data structures area. The term data structure,

itself, was defined in this book to be A table of data including structural relationships.

Niklaus Wirth, the inventor of the Pascal language and winner of the 1984 Turing award,

stated that “Algorithms + Data Structures = Programs”. The importance of algorithms

and data structures has been recognized by the community and consequently, every under-

graduate Computer Science curriculum has classes on data structures and algorithms. Both

of these related areas have seen tremendous advances in the decades since the appearance

of the books by Knuth and Wirth. Although there are several advanced and specialized

texts and handbooks on algorithms (and related data structures), there is, to the best of

our knowledge, no text or handbook that focuses exclusively on the wide variety of data

structures that have been reported in the literature. The goalof this handbook is to provide

a comprehensive survey of data structures of di?erent types that are in existence today.

To this end, we have subdivided this handbook into seven parts, each of which addresses

a di?erent facet of data structures. Part I is a review of introductory material. Although

this material is covered in all standard data structures texts, it was included to make the

handbook self-containedand in recognitionofthe factthatthere aremany practitionersand

programmers who may not have had a formal education in Computer Science. Parts II, III,

and IV discuss Priority Queues, Dictionary Structures, and Multidimensional structures,

respectively. These are all well-known classes of data structures. Part V is a catch-all used

for well-known data structures that eluded easy classification. Parts I through V are largely

theoretical in nature: they discuss the data structures, their operations and their complex-

ities. Part VI addresses mechanisms and tools that have been developed to facilitate the

use of data structures in real programs. Many of the data structures discussed in previous

parts are very intricate and take some e?ort to program. The developmentof data structure

libraries and visualization tools by skilled programmers are of critical importance in reduc-

ing the gap between theory and practice. Finally, Part VII examines applications of data

structures. The deployment of many data structures from Parts I through V in a variety

of applications is discussed. Some of the data structures discussed here have been invented

solely in the context of these applications and are not well-known to the broader commu-

nity. Some of the applications discussed include Internet Routing, Web Search Engines,

Databases, Data Mining, Scientific Computing, Geographical Information Systems, Com-

putational Geometry, Computational Biology, VLSI Floorplanning and Layout, Computer

Graphics and Image Processing.

Bookmarks

Handbook of DATA STRUCTURES and APPLICATIONS

Dedication

Preface

About the Editors

Contributors

Contents

Part I: Fundamentals

Chapter 1: Analysis of Algorithms

1.1 Introduction

1.2 Operation Counts

1.3 Step Counts

1.4 Counting Cache Misses

1.4.1 A Simple Computer Model

1.4.2 Effect of Cache Misses on Run Time

1.4.3 Matrix Multiplication

1.5 Asymptotic Complexity

1.5.1 Big Oh Notation (O)

1.5.2 Omega (omega) and Theta (theta) Notations

1.5.3 Little Oh Notation (o)

1.6 Recurrence Equations

1.6.1 Substitution Method

1.6.2 Table-Lookup Method

1.7 Amortized Complexity

1.7.1 What is Amortized Complexity?

1.7.2 Maintenance Contract

Problem Definition

Worst-Case Method

Aggregate Method

Accounting Method

Potential Method

1.7.3 The McWidget Company

Problem Definition

Worst-Case Method

Aggregate Method

Accounting Method

Potential Method

1.7.4 Subset Generation

Problem Definition

Worst-Case Method

Aggregate Method

Accounting Method

Potential Method

1.8 Practical Complexities

Acknowledgment

References

Chapter 2: Basic Structures

2.1 Introduction

2.2 Arrays

2.2.1 Operations on an Array

2.2.2 Sorted Arrays

2.2.3 Array Doubling

2.2.4 Multiple Lists in a Single Array

2.2.5 Heterogeneous Arrays

2.2.6 Multidimensional Arrays

Row- or Column Major Representation

Array of Arrays Representation

Irregular Arrays

2.2.7 Sparse Matrices

2.3 Linked Lists

2.3.1 Chains

2.3.2 Circular Lists

2.3.3 Doubly Linked Circular Lists

2.3.4 Generalized Lists

2.4 Stacks and Queues

2.4.1 Stack Implementation

2.4.2 Queue Implementation

Acknowledgments

References

Chapter 3: Trees

3.1 Introduction

3.2 Tree Representation

3.2.1 List Representation

3.2.2 Left Child-Right Sibling Representation

3.2.3 Binary Tree Representation

3.3 Binary Trees and Properties

3.3.1 Properties

3.3.2 Binary Tree Representation

3.4 Binary Tree Traversals

3.4.1 Inorder Traversal

3.4.2 Preorder Traversal

3.4.3 Postorder Traversal

3.4.4 Level Order Traversal

3.5 Threaded Binary Trees

3.5.1 Threads

3.5.2 Inorder Traversal of a Threaded Binary Tree

3.6 Binary Search Trees

3.6.1 Definition

3.6.2 Search

3.6.3 Insert

3.6.4 Delete

3.6.5 Miscellaneous

3.7 Heaps

3.7.1 Priority Queues

3.7.2 Definition of a Max-Heap

3.7.3 Insertion

3.7.4 Deletion

3.8 Tournament Trees

3.8.1 Winner Trees

3.8.2 Loser Trees

Acknowledgments

References

Chapter 4: Graphs

4.1 Introduction

4.2 Graph Representations

4.2.1 Weighted Graph Representation

4.3 Connectivity, Distance, and Spanning Trees

4.3.1 Spanning Trees

4.4 Searching a Graph

4.4.1 Depth-First Search

4.4.2 Breadth-First Search

4.5 Simple Applications of DFS and BFS

4.5.1 Depth-First Search on a Digraph

4.5.2 Topological Sorting

4.6 Minimum Spanning Tree

4.6.1 Kruskal’s MST Algorithm

4.6.2 Prim’s MST Algorithm

4.6.3 Boruvka’s MST Algorithm

4.6.4 Constrained MST

4.7 Shortest Paths

4.7.1 Single-Source Shortest Paths, Nonnegative Weights

4.7.2 Single-Source Shortest Paths, Arbitrary Weights

4.7.3 All-Pairs Shortest Paths

4.8 Eulerian and Hamiltonian Graphs

Acknowledgment

References

Part II: Priority Queues

Chapter 5: Leftist Trees

5.1 Introduction

5.2 Height-Biased Leftist Trees

5.2.1 Definition

5.2.2 Insertion into a Max HBLT

5.2.3 Deletion of Max Element from a Max HBLT

5.2.4 Melding Two Max HBLTs

5.2.5 Initialization

5.2.6 Deletion of Arbitrary Element from a Max HBLT

5.3 Weight-Biased Leftist Trees

5.3.1 Definition

5.3.2 Max WBLT Operations

Acknowledgment

References

Chapter 6: Skew Heaps

6.1 Introduction

6.2 Basics of Amortized Analysis

6.3 Meldable Priority Queues and Skew Heaps

6.3.1 Meldable Priority Queue Operations

6.3.2 Amortized Cost of Meld Operation

6.4 Bibliographic Remarks

References

Chapter 7: Binomial, Fibonacci, and Pairing Heaps

7.1 Introduction

7.2 Binomial Heaps

7.3 Fibonacci Heaps

7.4 Pairing Heaps

7.5 Pseudocode Summaries of the Algorithms

7.5.1 Link and Insertion Algorithms

7.5.2 Binomial Heap-Specific Algorithms

7.5.3 Fibonacci Heap-Specific Algorithms

7.5.4 Pairing Heap-Specific Algorithms

7.6 Related Developments

Skew-Pairing Heaps

Adaptive Properties of Pairing Heaps

Soft Heaps

References

Chapter 8: Double-Ended Priority Queues

8.1 Definition and an Application

8.2 Symmetric Min-Max Heaps

8.3 Interval Heaps

8.3.1 Inserting an Element

8.3.2 Removing the Min Element

8.3.3 Initializing an Interval Heap

8.3.4 Complexity of Interval Heap Operations

8.3.5 The Complementary Range Search Problem

8.4 Min-Max Heaps

8.4.1 Inserting an Element

8.4.2 Removing the Min Element

8.5 Deaps

8.5.1 Inserting an Element

8.5.2 Removing the Min Element

8.6 Generic Methods for DEPQs

8.6.1 Dual Priority Queues

8.6.2 Total Correspondence

8.6.3 Leaf Correspondence

8.7 Meldable DEPQs

Acknowledgment

References

Part III: Dictionary Structures

Chapter 9: Hash Tables

9.1 Introduction

9.2 Hash Tables for Integer Keys

9.2.1 Hashing by Division

9.2.2 Hashing by Multiplication

9.2.3 Universal Hashing

9.2.4 Static Perfect Hashing

9.2.5 Dynamic Perfect Hashing

9.3 Random Probing

9.3.1 Hashing with Chaining

9.3.2 Hashing with Open Addressing

9.3.3 Linear Probing

9.3.4 Quadratic Probing

9.3.5 Double Hashing

9.3.6 Brent’s Method

9.3.7 Multiple-Choice Hashing

9.3.8 Asymmetric Hashing

9.3.9 LCFS Hashing

9.3.10 Robin-Hood Hashing

9.3.11 Cuckoo Hashing

9.4 Historical Notes

9.5 Other Developments

Acknowledgment

References

Chapter 10: Balanced Binary Search Trees

10.1 Introduction

10.2 Basic Definitions

10.2.1 Trees

10.2.2 Binary Trees as Dictionaries

Simple Searching

Simple Updates

More Searching Procedures

Operations Involving More Trees

10.2.3 Implementation of Binary Search Trees

10.3 Generic Discussion of Balancing

10.3.1 Balance Definitions

10.3.2 Rebalancing Algorithms

10.3.3 Complexity Results

10.4 Classic Balancing Schemes

10.4.1 AVL-Trees

10.4.2 Weight-Balanced Trees

10.4.3 Balanced Binary Trees Based on Multi-Way Trees

10.5 Rebalancing a Tree to Perfect Balance

10.6 Schemes with no Balance Information

10.6.1 Implicit Representation of Balance Information

Using Empty Pointers

Swapping Pointers

10.6.2 General Balanced Trees

10.6.3 Application to Multi-Dimensional Search Trees

10.7 Low Height Schemes

10.8 Relaxed Balance

10.8.1 Red-Black Trees

10.8.2 AVL-Trees

10.8.3 Multi-Way Trees

10.8.4 Other Results

References

Chapter 11: Finger Search Trees

11.1 Finger Searching

11.2 Dynamic Finger Search Trees

11.3 Level Linked (2,4)-Trees

11.4 Randomized Finger Search Trees

11.4.1 Treaps

11.4.2 Skip Lists

11.5 Applications

11.5.1 Optimal Merging and Set Operations

11.5.2 Arbitrary Merging Order

11.5.3 List Splitting

11.5.4 Adaptive Merging and Sorting

Acknowledgment

References

Chapter 12: Splay Trees

12.1 Introduction

12.2 Splay Trees

12.3 Analysis

12.3.1 Access and Update Operations

12.4 Optimality of Splay Trees

12.4.1 Static Optimality

12.4.2 Static Finger Theorem

12.4.3 Working Set Theorem

12.4.4 Other Properties and Conjectures

12.5 Linking and Cutting Trees

12.5.1 Data Structure

12.5.2 Solid Trees

12.5.3 Rotation

12.5.4 Splicing

12.5.5 Splay in Virtual Tree

12.5.6 Analysis of Splay in Virtual Tree

12.5.7 Implementation of Primitives for Linking and Cutting Trees

12.6 Case Study: Application to Network Flows

Push(v,w)

Relabel(v)

Preflow-Push Algorithms

12.7 Implementation Without Linking and Cutting Trees

Push/Relabel(v)

Discharge(v)

FIFO/Queue

12.8 FIFO: Dynamic Tree Implementation

Tree-Push(v)

Analysis

12.9 Variants of Splay Trees and Top-Down Splaying

Acknowledgment

References

Chapter 13: Randomized Dictionary Structures

13.1 Introduction

13.2 Preliminaries

13.2.1 Randomized Algorithms

13.2.2 Basics of Probability Theory

13.2.3 Conditional Probability

13.2.4 Some Basic Distributions

Bernoulli Distribution

Binomial Distribution

Geometric Distribution

Negative Binomial distribution

13.2.5 Tail Estimates

13.3 Skip Lists

13.4 Structural Properties of Skip Lists

13.4.1 Number of Levels in Skip List

13.4.2 Space Complexity

13.5 Dictionary Operations

13.6 Analysis of Dictionary Operations

13.7 Randomized Binary Search Trees

13.7.1 Insertion in RBST

13.7.2 Deletion in RBST

13.8 Bibliographic Remarks

References

Chapter 14: Trees with Minimum Weighted Path Length

14.1 Introduction

14.2 Huffman Trees

14.2.1 O(n log n) Time Algorithm

14.2.2 Linear Time Algorithm for Presorted Sequence of Items

14.2.3 Relation between General Uniquely Decipherable Codes and Prefix-free Codes

14.2.4 Huffman Codes and Entropy

14.2.5 Huffman Algorithm for t-ary Trees

14.3 Height Limited Huffman Trees

14.3.1 Reduction to the Coin Collector Problem

14.3.2 The Algorithm for the Coin Collector Problem

14.4 Optimal Binary Search Trees

14.4.1 Approximately Optimal Binary Search Trees

14.5 Optimal Alphabetic Tree Problem

14.5.1 Computing the Cost of Optimal Alphabetic Tree

14.5.2 Construction of Optimal Alphabetic Tree

14.5.3 Optimal Alphabetic Trees for Presorted Items

14.6 Optimal Lopsided Trees

14.7 Parallel Algorithms

References

Chapter 15: B Trees

15.1 Introduction

15.2 The Disk-Based Environment

15.3 The B-tree

15.3.1 B-tree Definition

15.3.2 B-tree Query

15.3.3 B-tree Insertion

15.3.4 B-tree Deletion

15.4 The B+-tree

15.4.1 Copy-up and Push-up

15.4.2 B+-tree Query

15.4.3 B+-tree Insertion

15.4.4 B+-tree Deletion

15.5 Further Discussions

15.5.1 Eficiency Analysis

15.5.2 Why is the B+-tree Widely Accepted?

15.5.3 Bulk-Loading a B+-tree

15.5.4 Aggregation Query in a B+-tree

References

Part IV: Multidimensional and Spatial Structures

Chapter 16: Multidimensional Spatial Data Structures

16.1 Introduction

16.2 Point Data

16.3 Bucketing Methods

16.4 Region Data

16.5 Rectangle Data

16.6 Line Data and Boundaries of Regions

16.7 Research Issues and Summary

Acknowledgment

References

Chapter 17: Planar Straight Line Graphs

17.1 Introduction

17.2 Features of PSLGs

17.3 Operations on PSLGs

Edge insertion and deletion

Vertex split and edge contraction

17.4 Winged-Edge

17.5 Halfedge

Access functions

Edge insertion and deletion

Vertex split and edge contraction

17.6 Quadedge

17.7 Further Remarks

17.8 Glossary

Acknowledgment

References

Chapter 18: Interval, Segment, Range, and Priority Search Trees

18.1 Introduction

18.2 Interval Trees

18.2.1 Construction of Interval Trees

18.2.2 Example and Its Applications

18.3 Segment Trees

18.3.1 Construction of Segment Trees

18.3.2 Examples and Its Applications

18.4 Range Trees

18.4.1 Construction of Range Trees

18.4.2 Examples and Its Applications

18.5 Priority Search Trees

18.5.1 Construction of Priority Search Trees

18.5.2 Examples and Its Applications

Acknowledgment

References

Chapter 19: Quadtrees and Octrees

19.1 Introduction

19.2 Quadtrees for Point Data

19.2.1 Point Quadtrees

19.2.2 Region Quadtrees

19.2.3 Compressed Quadtrees and Octrees

19.2.4 Cell Orderings and Space-Filling Curves

19.2.5 Construction of Compressed Quadtrees

A Divide-and-Conquer Construction Algorithm

Bottom-up Construction

19.2.6 Basic Operations

Point and Cell Queries

Insertions and Deletions

Cell Insertion

Cell Deletion

19.2.7 Practical Considerations

19.3 Spatial Queries with Region Quadtrees

19.3.1 Range Query

19.3.2 Spherical Region Queries

19.3.3 k-Nearest Neighbors

19.4 Image Processing Applications

19.4.1 Construction of Image Quadtrees

19.4.2 Union and Intersection of Images

19.4.3 Rotation and Scaling

19.4.4 Connected Component Labeling

19.5 Scientific Computing Applications

19.5.1 The N-body Problem

Acknowledgment

References

Chapter 20: Binary Space Partitioning Trees

20.1 Introduction

20.2 BSP Trees as a Multi-Dimensional Search Structure

20.3 Visibility Orderings

20.3.1 Total Ordering of a Collection of Objects

20.3.2 Visibility Ordering as Tree Traversal

20.3.3 Intra-Object Visibility

20.4 BSP Tree as a Hierarchy of Regions

20.4.1 Tree Merging

20.4.2 Good BSP Trees

20.4.3 Converting B-reps to Trees

20.4.4 Boundary Representations vs. BSP Trees

Bibliography

Chapter 21: R-trees

21.1 Introduction

21.2 Basic Concepts

Intersection queries

Updating the tree

21.3 Improving Performance

21.3.1 R* Tree

21.3.2 Hilbert Tree

21.3.3 Bulk Loading

General Algorithm

Nearest-X (NX)

Hilbert Sort (HS)

Sort-Tile-Recursive (STR)

21.4 Advanced Operations

21.4.1 Nearest Neighbor Queries

21.4.2 Spatial Joins

21.5 Analytical Models

Acknowledgment

References

Chapter 22: Managing Spatio-Temporal Data

22.1 Introduction and Background

22.2 Overlapping Linear Quadtree

22.2.1 Insertion of an Object in MVLQ

22.2.2 Deletion of an Object in MVLQ

22.2.3 Updating an Object in MVLQ

22.3 3D R-tree

22.3.1 Answering Spatio-Temporal Queries Using the Unified Schema

22.3.2 Performance Analysis of 3D R-trees

22.3.3 Handling Queries with Open Transaction-Times

22.4 2+3 R-tree

22.5 HR-tree

22.6 MV3R-tree

22.7 Indexing Structures for Continuously Moving Objects

22.7.1 TPR-tree

22.7.2 REXP -tree

22.7.3 STAR-tree

22.7.4 TPR*-tree

References

Chapter 23: Kinetic Data Structures

23.1 Introduction

23.2 Motion in Computational Geometry

23.3 Motion Models

23.4 Kinetic Data Structures

23.4.1 Convex Hull Example

23.4.2 Performance Measures for KDS

23.4.3 The Convex Hull, Revisited

23.5 A KDS Application Survey

23.5.1 Extent Problems

23.5.2 Proximity Problems

23.5.3 Triangulations and Tilings

23.5.4 Collision Detection

23.5.5 Connectivity and Clustering

23.5.6 Visibility

23.5.7 Result Summary

23.5.8 Open Problems

Recovery after multiple certificate failures

Hierarchical motion descriptions

Motion sensitivity

Non-canonical structures

23.6 Querying Moving Objects

23.7 Sources and Related Materials

References

Chapter 24: Online Dictionary Structures

24.1 Introduction

24.2 Trie Implementations

24.3 Binary Search Tree Implementations

24.4 Balanced BST Implementation

24.5 Additional Operations

24.6 Discussion

References

Chapter 25: Cuttings

25.1 Introduction

25.2 The Cutting Construction

25.2.1 Geometric Sampling

25.2.2 Optimal Cuttings

25.3 Applications

25.3.1 Point Location

25.3.2 Hopcroft’s problem

25.3.3 Convex Hulls and Voronoi Diagrams

25.3.4 Range Searching

Acknowledgments

References

Chapter 26: Approximate Geometric Query Structures

26.1 Introduction

26.2 General Terminology

26.3 Approximate Queries

26.4 Quasi-BAR Bounds

26.5 BBD Trees

26.6 BAR Trees

26.7 Maximum-Spread k-d Trees

Acknowledgment

References

Chapter 27: Geometric and Spatial Data Structures in External Memory

27.1 Introduction

27.1.1 Disk Model

27.1.2 Design Criteria for External Memory Data Structures

27.1.3 Overview of Chapter

27.2 EM Algorithms for Batched Geometric Problems

27.3 External Memory Tree Data Structures

27.3.1 B-trees and Variants

27.3.2 Weight-Balanced B-trees

27.3.3 Parent Pointers and Level-Balanced B-trees

27.3.4 Buffer Trees

27.4 Spatial Data Structures and Range Search

27.4.1 Linear-Space Spatial Structures

27.4.2 R-trees

27.4.3 Bootstrapping for 2-D Diagonal Corner and Stabbing Queries

27.4.4 Bootstrapping for Three-Sided Orthogonal 2-D Range Search

27.4.5 General Orthogonal 2-D Range Search

27.4.6 Lower Bounds for Orthogonal Range Search

27.5 Related Problems

27.6 Dynamic and Kinetic Data Structures

27.6.1 Logarithmic Method for Decomposable Search Problems

27.6.2 Continuously Moving Items

27.7 Conclusions

Acknowledgment

References

Part V: Miscellaneous Data Structures

Chapter 28: Tries

28.1 What Is a Trie?

28.2 Searching a Trie

28.3 Keys with Different Length

28.4 Height of a Trie

28.5 Space Required and Alternative Node Structures

28.6 Inserting into a Trie

28.7 Removing an Element

28.8 Prefix Search and Applications

Criminology

Automatic Command Completion

28.9 Compressed Tries

28.9.1 Compressed Tries with Digit Numbers

Searching a Compressed Trie with Digit Numbers

Inserting into a Compressed Trie with Digit Numbers

Removing an Element from a Compressed Trie with Digit Numbers

28.9.2 Compressed Tries with Skip Fields

28.9.3 Compressed Tries with Edge Information

Searching a Compressed Trie with Edge Information

Inserting into a Compressed Trie with Edge Information

Removing an Element from a Compressed Trie with Edge Information

28.9.4 Space Required by a Compressed Trie

28.10 Patricia

28.10.1 Searching

28.10.2 Inserting an Element

28.10.3 Removing an Element

Acknowledgment

References

Chapter 29: Suffix Trees and Suffix Arrays

29.1 Basic Definitions and Properties

29.2 Linear Time Construction Algorithms

29.2.1 Suffix Trees vs. Suffix Arrays

29.2.2 Linear Time Construction of Suffix Trees

McCreight’s Algorithm

Generalized Suffix Trees

29.2.3 Linear Time Construction of Suffix Arrays

K?r?kkanen and Sanders’ Algorithm

29.2.4 Space Issues

29.3 Applications

29.3.1 Pattern Matching

Pattern Matching using Suffix Trees

Pattern Matching using Suffix Arrays

29.3.2 Longest Common Substrings

29.3.3 Text Compression

29.3.4 String Containment

29.3.5 Suffix-Prefix Overlaps

29.4 Lowest Common Ancestors

Bender and Farach’s lca algorithm

29.5 Advanced Applications

29.5.1 Suffix Links from Lowest Common Ancestors

29.5.2 Approximate Pattern Matching

29.5.3 Maximal Palindromes

Acknowledgment

References

Chapter 30: String Searching

30.1 Introduction

30.2 Preliminaries

30.3 The DAWG

30.3.1 A Simple Algorithm for Constructing the DAWG

30.3.2 Constructing the DAWG in Linear Time

30.4 The Compact DAWG

30.4.1 Using the Compact DAWG to Find the Locations of a String in the Text

30.4.2 Variations and Applications

30.5 The Position Heap

30.5.1 Building the Position Heap

30.5.2 Querying the Position Heap

30.5.3 Time Bounds

30.5.4 Improvements to the Time Bounds

References

Chapter 31: Persistent Data Structures

31.1 Introduction

31.2 Algorithmic Applications of Persistent Data Structures

31.3 General Techniques for Making Data Structures Persistent

31.3.1 The Fat Node Method

31.3.2 Node Copying and Node Splitting

31.3.3 Handling Arrays

31.3.4 Making Data Structures Confluently Persistent

31.4 Making Specific Data Structures More Efficient

31.4.1 Redundant Binary Counters

31.4.2 Persistent Deques

31.5 Concluding Remarks and Open Questions

Acknowledgment

References

Chapter 32: PQ Trees, PC Trees, and Planar Graphs

32.1 Introduction

32.2 The Consecutive-Ones Problem

32.2.1 A Data Structure for Representing the PC Tree

32.2.2 Finding the Terminal Path Efficiently

32.2.3 Performing the Update Step on the Terminal Path Efficiently

32.2.4 The Linear Time Bound

32.3 Planar Graphs

32.3.1 Preliminaries

32.3.2 The Strategy

32.3.3 Implementing the Recursive Step

The Terminal Path

Finding the Terminal Path

The Linear Time Bound

32.3.4 Difierences between the Original PQ-Tree and the New PC-Tree Approaches

32.3.5 Returning a Kuratowski Subgraph when G is Non-Planar

32.4 Acknowledgment

References

Chapter 33: Data Structures for Sets

33.1 Introduction

33.1.1 Models of Computation

33.2 Simple Randomized Set Representations

33.2.1 The Hash Trie

33.2.2 Some Remarks on Unique Representations

33.3 Equality Testing

33.4 Extremal Sets and Subset Testing

33.4.1 Static Extremal Sets

33.4.2 Dynamic Set Intersections and Subset Testing

33.5 The Disjoint Set Union-Find Problem

33.5.1 The Classical Union-Find Problem and Variants

33.6 Partition Maintenance Algorithms

33.7 Conclusions

References

Chapter 34: Cache-Oblivious Data Structures

34.1 The Cache-Oblivious Model

34.2 Fundamental Primitives

34.2.1 Van Emde Boas Layout

Layout

Search

Range query

34.2.2 k-Merger

Binary mergers and merge trees

k-merger

Funnelsort

34.3 Dynamic B-Trees

34.3.1 Density Based

Structure

Updates

Range queries

34.3.2 Exponential Tree Based

Structure

Search

Updates

Reducing space usage

34.4 Priority Queues

34.4.1 Merge Based Priority Queue: Funnel Heap

Structure

Layout

Operations

Analysis

34.4.2 Exponential Level Based Priority Queue

Structure

Layout

Operations

34.5 2d Orthogonal Range Searching

34.5.1 Cache-Oblivious kd-Tree

Structure

Query

Construction

Updates

34.5.2 Cache-Oblivious Range Tree

Three-Sided Queries

Structure

Layout

Query

Four-sided queries

Acknowledgments

References

Chapter 35: Dynamic Trees

35.1 Introduction

35.2 Linking and Cutting Trees

35.2.1 Using Operations on Vertex-Disjoint Paths

35.2.2 Implementing Operations on Vertex-Disjoint Paths

35.3 Topology Trees

35.3.1 Construction

35.3.2 Updates

35.3.3 Applications

35.4 Top Trees

35.4.1 Updates

35.4.2 Representation and Applications

35.5 ET Trees

35.5.1 Updates

35.5.2 Applications

35.6 Reachability Trees

35.7 Conclusions

Acknowledgments

References

Chapter 36: Dynamic Graphs

36.1 Introduction

36.2 Techniques for Undirected Graphs

36.2.1 Clustering

36.2.2 Sparsification

36.2.3 Randomization

Maintaining Spanning Forests

Random Sampling

Graph Decomposition

36.3 Techniques for Directed Graphs

36.3.1 Kleene Closures

Logarithmic Decomposition

Recursive Decomposition

36.3.2 Long Paths

36.3.3 Locality

36.3.4 Matrices

36.4 Connectivity

36.4.1 Updates in O(log2 n) Time

36.5 Minimum Spanning Tree

36.5.1 Deletions in O(log2 n) Time

36.5.2 Updates in O(log4 n) Time

36.6 Transitive Closure

36.6.1 Updates in O( n2 log n) Time

36.6.2 Updates in O(n2) Time

36.7 All-Pairs Shortest Paths

36.7.1 Updates in O(n2.5...) Time

36.7.2 Updates in O(n2 log3 n) Time

36.8 Conclusions

Acknowledgment

References

Chapter 37: Succinct Representation of Data Structures

37.1 Introduction

37.2 Bitvector

37.3 Succinct Dictionaries

37.3.1 Indexable Dictionary

37.3.2 Fully Indexable Dictionary

37.3.3 Dynamic Dictionary

37.4 Tree Representations

37.4.1 Binary Trees

37.4.2 Ordinal Trees

37.4.3 Cardinal Trees

37.4.4 Dynamic Binary Trees

37.5 Graph Representations

37.6 Succinct Structures for Indexing

37.7 Permutations and Functions

37.7.1 Permutations

37.7.2 Functions

37.8 Partial Sums

37.9 Arrays

37.9.1 Resizable Arrays

37.9.2 Dynamic Arrays

37.10 Conclusions

References

Chapter 38: Randomized Graph Data-Structures for Approximate Shortest Paths

38.1 Introduction

38.2 A Randomized Data-Structure for Static APASP : Approximate Distance Oracles

38.2.1 3-Approximate Distance Oracle

38.2.2 Preliminaries

38.2.3 (2k – 1)-Approximate Distance Oracle

Reporting distance with stretch at-most (2k – 1)

Size of the (2k – 1)-approximate distance oracle

38.2.4 Computing Approximate Distance Oracles

Computing Balli(u) efficiently

38.3 A Randomized Data-Structure for Decremental APASP

38.3.1 Main Idea

38.3.2 Notations

38.3.3 Hierarchical Distance Maintaining Data-Structure

38.3.4 Bounding the Size of … under Edge-Deletions

Maintaining the BFS tree … under edge deletions

Some technical details

38.3.5 Improved Decremental Algorithm for APASP up to Distance d

38.4 Further Reading and Bibliography

Acknowledgment

References

Chapter 39: Searching and Priority Queues in o(log n) Time

39.1 Introduction

39.2 Model of Computation

39.3 Overview

39.4 Achieving Sub-Logarithmic Time per Element by Simple Means

39.4.1 Range Reduction

39.4.2 Packing Keys

39.4.3 Combining

39.5 Deterministic Algorithms and Linear Space

39.5.1 Fusion Trees

39.5.2 Exponential Search Trees

39.6 From Amortized Update Cost to Worst-Case

39.7 Sorting and Priority Queues

39.7.1 Range Reduction

39.7.2 Packed Sorting

39.7.3 Combining the Techniques

39.7.4 Further Techniques and Faster Randomized Algorithms

References

Part VI: Data Structures in Languages and Libraries

Chapter 40: Functional Data Structures

40.1 Introduction

40.1.1 Data Structures in Functional Languages

Immutability

Recursion

Garbage Collection

Pattern Matching

40.1.2 Functional Data Structures in Mainstream Languages

Fewer Bugs

Increased Sharing

Decreased Synchronization

40.2 Stacks: A Simple Example

40.3 Binary Search Trees: Path Copying

40.4 Skew Heaps: Amortization and Lazy Evaluation

40.4.1 Analysis of Lazy Skew Heaps

40.5 Difficulties

40.6 Further Reading

Acknowledgments

References

Chapter 41: LEDA, a Platform for Combinatorial and Geometric Computing

41.1 Introduction

41.1.1 Ease of Use

41.1.2 Extensibility

41.1.3 Correctness

41.1.4 Availability and Usage

41.2 The Structure of LEDA

41.3 Data Structures and Data Types

41.3.1 Basic Data Types

41.3.2 Numbers and Matrices

41.3.3 Advanced Data Types

41.3.4 Graph Data Structures

41.3.5 Geometry Kernels

41.3.6 Advanced Geometric Data Structures

41.4 Algorithms

41.5 Visualization

41.5.1 GraphWin

41.5.2 GeoWin

41.6 Example Programs

41.6.1 Word Count

41.6.2 Shortest Paths

41.6.3 Curve Reconstruction

41.6.4 Upper Convex Hull

41.6.5 Delaunay Flipping

41.6.6 Discussion

41.7 Projects Enabled by LEDA

References

Chapter 42: Data Structures in C++

42.1 Introduction

42.2 Basic Containers

42.2.1 Sequence Containers

42.2.2 Sorted Associative Containers

Sets and Multisets

Maps and Multimaps

42.2.3 Container Adapters

42.3 Iterators

42.3.1 Basics

42.3.2 Reverse Iterators

42.4 Additional Components of the STL

42.4.1 Sorting, Searching, and Selection

Sorting

Selection

Searching

42.4.2 Non-Standard Extensions

42.5 Sample Code

Acknowledgment

References

Chapter 43: Data Structures in JDSL

43.1 Introduction

43.2 Design Concepts in JDSL

43.2.1 Containers and Accessors

43.2.2 Iterators

43.2.3 Decorations

43.2.4 Comparators

43.2.5 Algorithms

43.3 The Architecture of JDSL

43.3.1 Packages

43.3.2 Positional Containers

Sequences

Trees

Graphs

43.3.3 Key-Based Containers

Priority queues

Dictionaries

43.3.4 Algorithms

Sequence sorting

Iterator-based tree traversals

Euler tour tree traversal

Graph traversals

Topological numbering

Dijkstra’s algorithm

The Prim-Jarník algorithm

43.4 A Sample Application

43.4.1 Minimum-Time Flight Itineraries

43.4.2 Class IntegerDijkstraTemplate

43.4.3 Class IntegerDijkstraPathfinder

43.4.4 Class FlightDijkstra

Acknowledgments

References

Chapter 44: Data Structure Visualization

44.1 Introduction

44.2 Value of Data Structure Rendering

44.3 Issues in Data Structure Visualization Systems

44.3.1 Purpose and Environment

44.3.2 Data Structure Views

44.3.3 Interacting with a System

44.4 Existing Research and Systems

44.4.1 Incense

44.4.2 VIPS

44.4.3 GELO

44.4.4 DDD

44.4.5 Other Systems

44.5 Summary and Open Problems

References

Chapter 45: Drawing Trees

45.1 Introduction

45.2 Preliminaries

45.3 Level Layout for Binary Trees

45.4 Level Layout for n-ary Trees

45.4.1 PrePosition

45.4.2 Combining a Subtree and Its Left Subforest

45.4.3 Ancestor

45.4.4 Apportion

45.4.5 Shifting the Smaller Subtrees

45.5 Radial Layout

45.6 HV-Layout

Acknowledgment

References

Chapter 46: Drawing Graphs

46.1 Introduction

46.2 Preliminaries

46.3 Convex Drawing

46.3.1 Barycenter Algorithm

46.3.2 Divide and Conquer Algorithm

46.3.3 Algorithm Using Canonical Ordering

46.4 Symmetric Drawing

46.4.1 Displaying Rotational Symmetry

46.4.2 Displaying Axial Symmetry

46.4.3 Displaying Dihedral Symmetry

46.5 Visibility Drawing

46.5.1 Planar st-Graphs

46.5.2 The Bar Visibility Algorithm

46.5.3 Bar Visibility Representations and Layered Drawings

46.5.4 Bar Visibility Representations for Orthogonal Drawings

46.6 Conclusion

References

Chapter 47: Concurrent Data Structures

47.1 Designing Concurrent Data Structures

47.1.1 Performance

47.1.2 Blocking Techniques

47.1.3 Nonblocking Techniques

47.1.4 Complexity Measures

47.1.5 Correctness

47.1.6 Verification Techniques

47.1.7 Tools of the Trade

Locks

Barriers

Transactional Synchronization Mechanisms

47.2 Shared Counters and Fetch-and-phi Structures

Combining

Counting Networks

47.3 Stacks and Queues

Stacks

Queues

Deques

47.4 Pools

47.5 Linked Lists

47.6 Hash Tables

47.7 Search Trees

47.8 Priority Queues

Heap-Based Priority Queues

Tree-Based Priority Pools

47.9 Summary

References

Part VII: Applications

Chapter 48: IP Router Tables

48.1 Introduction

48.2 Longest Matching-Prefix

48.2.1 Linear List

48.2.2 End-Point Array

48.2.3 Sets of Equal-Length Prefixes

48.2.4 Tries

1-Bit Tries

Fixed-Stride Tries

Variable-Stride Tries

48.2.5 Binary Search Trees

48.2.6 Priority Search Trees

48.3 Highest-Priority Matching

48.3.1 The Data Structure BOB

48.3.2 Search for the Highest-Priority Matching Range

48.4 Most-Specific-Range Matching

48.4.1 Nonintersecting Ranges

48.4.2 Conflict-Free Ranges

Acknowledgment

References

Chapter 49: Multi-Dimensional Packet Classification

49.1 Introduction

49.1.1 Problem Statement

49.2 Performance Metrics for Classification Algorithms

49.3 Classification Algorithms

49.3.1 Background

Bounds from Computational Geometry

Range lookups

49.3.2 Taxonomy of Classification Algorithms

49.3.3 Basic Data Structures

Linear search

Hierarchical tries

Set-pruning tries

49.3.4 Geometric Algorithms

Grid-of-tries

Cross-producting

A 2-dimensional classification scheme

Area-based quadtree

Fat Inverted Segment tree (FIS-tree)

Dynamic multi-level tree algorithms

49.3.5 Heuristics

Recursive Flow Classification (RFC)

Hierarchical Intelligent Cuttings (HiCuts)

Tuple Space Search

49.3.6 Hardware-Based Algorithms

Ternary CAMs

Bitmap-intersection

49.4 Summary

References

Chapter 50: Data Structures in Web Information Retrieval

50.1 Introduction

50.2 Inverted Indices

50.2.1 Index Compression

50.2.2 Index Granularity

50.3 Fingerprints

50.4 Finding Near-Duplicate Documents

50.5 Conclusions

References

Chapter 51: The Web as a Dynamic Graph

51.1 Introduction

51.2 Experimental Observations

51.3 Theoretical Growth Models

51.4 Properties of Web Graphs and Web Algorithmics

51.4.1 Generating Function Framework

51.4.2 Average Path Length

51.4.3 Emergence of Giant Components

51.4.4 Search on Web Graphs

51.4.5 Crawling and Trawling

51.5 Conclusions

References

Chapter 52: Layout Data Structures

52.1 Introduction

52.2 VLSI Technology

52.3 Layout Data Structures: an Overview

52.4 Corner Stitching

52.4.1 Point Finding

52.4.2 Tile Insertion

52.4.3 Storage Requirements of the Corner Stitching Data Structure

52.5 Corner Stitching Extensions

52.5.1 Expanded Rectangles

52.5.2 Trapezoidal Tiles

52.5.3 Curved Tiles

52.5.4 L-shaped Tiles

Rectilinear Polygons

Parallel Corner Stitching

Comments about Corner Stitching

52.6 Quad Trees and Variants

52.6.1 Bisector List Quad Trees

52.6.2 k-d Trees

52.6.3 Multiple Storage Quad Trees

52.6.4 Quad List Quad Trees

52.6.5 Bounded Quad Trees

52.6.6 HV Trees

52.6.7 Hinted Quad Trees

52.7 Concluding Remarks

Acknowledgment

References

Chapter 53: Floorplan Representation in VLSI

53.1 Introduction

53.1.1 Statement of Floorplanning Problem

53.1.2 Motivation of the Representation

53.1.3 Combinations and Complexities of the Various Representations

53.1.4 Slicing, Mosaic, LB Compact, and General Floorplans

53.2 Graph Based Representations

53.2.1 Constraint Graphs

The generation of constraint graphs

Triangulation

Tutte’s duality

53.2.2 Corner Stitching

53.2.3 Twin Binary Tree

53.2.4 Single Tree Representations

53.3 Placement Based Representations

53.3.1 Sequence-Pair

53.3.2 Bounded-Sliceline Grid

53.3.3 Corner Block List

53.3.4 Slicing Tree

53.4 Relationships of the Representations

53.4.1 Summary of the Relationships

53.4.2 A Mosaic Floorplan Example

53.4.3 A General Floorplan Example

53.5 Rectilinear Shape Handling

53.6 Conclusions

53.7 Acknowledgment

References

Chapter 54: Computer Graphics

54.1 Introduction

54.1.1 Hardware and Pipeline

54.2 Basic Applications

54.2.1 Meshes

54.2.2 CAD/CAM Drawings

54.2.3 Fonts

54.2.4 Bitmaps

54.2.5 Texture Mapping

54.3 Data Structures

54.3.1 Vertices, Edges, and Faces

54.3.2 Vertex, Normal, and Face Lists

54.3.3 Winged Edge

54.3.4 Tiled, Multidimensional Array

54.3.5 Linear Interpolation and Bezier Curves

54.4 Applications of Previously Discussed Structures

54.4.1 Hidden Surface Removal: An Application of the BSP Tree

54.4.2 Proximity and Collision: Other Applications of the BSP Tree

54.4.3 More With Trees: CSG Modeling

References

Chapter 55: Geographic Information Systems

55.1 Geographic Information Systems: What They Are All About

55.1.1 Geometric Objects

55.1.2 Topological versus Metric Data

55.1.3 Geometric Operations

55.1.4 Geometric Data Structures

55.1.5 Applications of Geographic Information

Map Overlay

Map Labeling

Cartographic Generalization

Road Maps

Spatiotemporal Data

Data Mining

55.2 Space Filling Curves: Order in Many Dimensions

55.2.1 Recursively Defined Space Filling Curves

55.2.2 Range Queries for Space Filling Curve Data Structures

55.2.3 Are All Space Filling Curves Created Equal?

55.2.4 Many Curve Pieces for a Query Range

55.2.5 One Curve Piece for a Query Range

55.3 Spatial Join

55.3.1 External Algorithms

Index on both spatial relations

Index on one spatial relation

Index on none of the inputs

55.3.2 Advanced Issues

55.4 Models, Toolboxes and Systems for Geographic Information

55.4.1 Standardized Data Models

55.4.2 Commercial Systems

Oracle

SpatialWare

LEDA and CGAL

JTS Topology Suite

55.4.3 Research Prototypes

SAND

XXL

Dedale

Acknowledgment

References

Chapter 56: Collision Detection

56.1 Introduction

56.2 Convex Polytopes

56.2.1 Linear Programming

56.2.2 Voronoi-Based Marching Algorithm

Polytope Representation

Local Walk

Implementation and Application

56.2.3 Minkowski Sums and Convex Optimization

56.3 General Polygonal Models

56.3.1 Interference Detection using Trees of Oriented Bounding Boxes

OBBTree Construction

Interference Detection

OBB Representation and Overlap Test

Implementation and Application

56.3.2 Performance of Bounding Volume Hierarchies

56.4 Penetration Depth Computation

56.4.1 Convex Polytopes

56.4.2 Incremental Penetration Depth Computation

Local Walk

Initialization and Refinement

Implementation and Application

56.4.3 Non-Convex Models

56.5 Large Environments

56.5.1 Multiple-Object Collision Detection

One-Dimensional Sweep and Prune

Implementation and Application

56.5.2 Two-Dimensional Intersection Tests

References

Chapter 57: Image Data Structures

57.1 Introduction

57.2 What is Image Data?

57.3 Quadtrees

57.3.1 What is a Quadtree?

57.3.2 Variants of Quadtrees

Region quadtrees

Line quadtrees

Edge quadtrees

Template quadtrees

57.4 Virtual Quadtrees

57.4.1 Compact Quadtrees

57.4.2 Forest of Quadtrees (FQT)

57.5 Quadtrees and R-trees

57.6 Octrees

57.7 Translation Invariant Data Structure (TID)

57.8 Content-Based Image Retrieval System

57.8.1 What is CBIR?

General structure of CBIR systems

57.8.2 An Example of CBIR System

57.9 Summary

57.10 Acknowledgments

References

Chapter 58: Computational Biology

58.1 Introduction

58.2 Discovering Unusual Words

Statistical analysis of words

Detecting unusual words

58.3 Comparing Whole Genomes

Basic Definitions

Computation of multiMEMs

Space efficient computation of MEMs for two genomes

Acknowledgment

References

Chapter 59: Elimination Structures in Scientific Computing

59.1 The Elimination Tree

59.1.1 The Elimination Game

59.1.2 The Elimination Tree Data Structure

59.1.3 An Algorithm

59.1.4 A Skeleton Graph

59.1.5 Supernodes

59.2 Applications of Etrees

59.2.1 Efficient Symbolic Factorization

59.2.2 Predicting Row and Column Nonzero Counts

59.2.3 Three Classes of Factorization Algorithms

59.2.4 Scheduling Parallel Factorizations

59.2.5 Scheduling Out-of-Core Factorizations

59.3 The Clique Tree

59.3.1 Chordal Graphs and Clique Trees

59.3.2 Design of Efficient Algorithms with Clique Trees

59.3.3 Compact Clique Trees

59.4 Clique Covers and Quotient Graphs

59.4.1 Clique Covers

59.4.2 Quotient Graphs

59.4.3 The Problem of Degree Updates

59.4.4 Covering the Column-Intersection Graph and Biclique Covers

59.5 Column Elimination Trees and Elimination DAGS

59.5.1 The Column Elimination Tree

59.5.2 Elimination DAGS

59.5.3 Elimination Structures for the Asymmetric Multifrontal Algorithm

Acknowledgment

References

Chapter 60: Data Structures for Databases

60.1 Overview of the Functionality of a Database Management System

60.2 Data Structures for Query Processing

60.2.1 Index Structures

One-dimensional Indexes

Multi-dimensional Indexes

60.2.2 Sorting Large Data Sets

60.2.3 The Parse Tree

60.2.4 Expression Trees

60.2.5 Histograms

60.3 Data Structures for Buffer Management

60.4 Data Structures for Disk Space Management

60.4.1 Record Organizations

60.4.2 Page Organizations

60.4.3 File Organization

60.5 Conclusion

References

Chapter 61: Data Mining

61.1 Introduction

61.1.1 Data Mining Tasks and Techniques

61.1.2 Challenges of Data Mining

61.1.3 Data Mining and the Role of Data Structures and Algorithms

61.2 Classification

61.2.1 Nearest-Neighbor Classifiers

61.2.2 Proximity Graphs for Enhancing Nearest Neighbor Classifiers

61.3 Association Analysis

61.3.1 Hash Tree Structure

61.3.2 FP-Tree Structure

61.4 Clustering

61.4.1 Hierarchical and Partitional Clustering

61.4.2 Nearest Neighbor Search and Multi-Dimensional Access Methods

61.5 Conclusion

Acknowledgment

References

Chapter 62: Computational Geometry: Fundamental Structures

62.1 Introduction

62.2 Arrangements

62.2.1 Substructures and Complexity

62.2.2 Decomposition

62.2.3 Duality

62.3 Convex Hulls

62.3.1 Complexity

62.3.2 Construction

62.3.3 Dynamic Convex Hulls

62.4 Voronoi Diagrams

62.4.1 Complexity

62.4.2 Construction

62.4.3 Variations

62.5 Triangulations

62.5.1 Delaunay Triangulation

62.5.2 Polygons

62.5.3 Polyhedra

62.5.4 Pseudo-Triangulations

References

Chapter 63: Computational Geometry: Proximity and Location

63.1 Introduction

63.2 Point Location

63.2.1 Kirkpatrick’s Algorithm

63.2.2 Slab-Based Methods and Persistent Trees

63.2.3 Separating Chains and Fractional Cascading

63.2.4 Trapezoidal Maps and the History Graph

63.2.5 Worst- and Expected-Case Optimal Point Location

63.3 Proximity Structures

63.3.1 Voronoi Diagrams

63.3.2 Delaunay Triangulations

63.3.3 Other Geometric Proximity Structures

63.4 Nearest Neighbor Searching

63.4.1 Nearest Neighbor Searching through Point Location

63.4.2 K-d trees

63.4.3 Other Approaches to Nearest Neighbor Searching

63.4.4 Approximate Nearest Neighbor Searching

63.4.5 Approximate Voronoi Diagrams

63.5 Sources and Related Material

Acknowledgments

References

Chapter 64: Computational Geometry: Generalized Intersection Searching

64.1 Geometric Intersection Searching Problems

64.1.1 Generalized Intersection Searching

64.2 Summary of Known Results

64.2.1 Axes-Parallel Objects

64.2.2 Arbitrarily-Oriented Objects

64.2.3 Problems on the Grid

64.2.4 Single-Shot Problems

64.3 Techniques

64.3.1 A Transformation-Based Approach

The Dynamic Reporting Problem

The static counting problem

The dynamic counting problem

The static type-2 problem

64.3.2 A Sparsification-Based Approach

Generalized halfspace range searching in R2 and R3

64.3.3 A Persistence-Based Approach

Generalized semi-dynamic quadrant searching

Generalized semidynamic 2-dimensional range searching

Generalized 3-dimensional range searching

64.3.4 A General Approach for Reporting Problems

64.3.5 Adding Range Restrictions

64.4 Conclusion and Future Directions

64.5 Acknowledgment

References

本文地址:https://www.codercto.com/books/d/1315.html

URL 编码/解码

URL 编码/解码

URL 编码/解码

MD5 加密

MD5 加密

MD5 加密工具

XML 在线格式化

XML 在线格式化

在线 XML 格式化压缩工具