2. FINDING A SOLUTION
|
|
|
- Oswin Walters
- 10 years ago
- Views:
Transcription
1 The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS ADRIAN DEACONU Transilvania University of Brasov, Roania Abstract A linear tie and space algorith for construction of a binary tree fro the pre-order and post-order traversals is presented. The solution is not always unique. The nuber of solutions is calculated and an optial tie and space ethod to find all the solutions is shown. Keywords: binary tree, traversals, construction of tree. INTRODUCTION The proble of construction the binary tree fro the pre-order (or post-order) and in-order traversals is well-nown [][][3][4][5]. The linear tie and space was achieved. The case of pre-order and post-order is less studied [5][6]. The solution in this case is not even unique. We shall present an algorith to find a solution in linear tie and space and, starting fro this one, we ll be able to find all the solutions in optial tie and space coplexity. The ethod in this paper for finding one solution is adapted fro the algorith for finding the tree fro pre-order and post-order traversal vectors [6]. All the notations we shall use are according to the textboo of Ahuja, Magnanti and Orlin [7]. It is well-nown the following propriety for the post-order traversal vector: Propriety The reversed post-order vector is a root-right-to-left traversal vector. We shall nae the root-left-to-right traversal as first pre-order traversal and the root-right-to-left traversal as the second pre-order traversal, because the nodes are analyzed siilarly to pre-order traversal: root and then it s successors, but in reversed order (right-to-left).
2 In this paper we shall refer to the first and the second pre-order traversal vectors as the pre-order (traversal) vectors of the trees. It is easy to observe that a pre-order (first or second) traversal vector starts with the root. So, we have the following propriety: Propriety In a (first or second) pre-order traversal vector the first eleent is the root of the binary tree. Let (a i ) in be the first pre-order traversal vector and (b i ) in the second pre-order traversal vector. We suppose for each i and j {,,, n}, i j that a i a j and b i b j. It is obviously that: { a i i =,,, n } = { b j j =,,, n } = N, (.) where N is the set of nodes of the binary tree, N = n. The following propriety of the first pre-order traversal vector helps us to prove the ain theores of this paper (theore and theore ). Propriety 3 If u and v are consecutive nodes in the first pre-order traversal vector, then we have one of the following situations: i) v is a son of the node u (see fig..). If u has two sons, then v is the left one. or: ii) v is the son to the right of the node w and u is the last node in the first pre-order traversal vector of the left partial tree T of w (see fig..). u w v v Fig..: First situation of propriety 3 T T u Fig..: Second situation of propriety 3. FINDING A SOLUTION The algorith we shall present is a adapted fro the algorith for reconstruction of the tree fro the pre-order and post-order traversals [6]. We shall prove two theores, which will lead us to the ethod to construct a binary tree fro the pre-order and post-order traversals. For each consecutive pair of nodes, u and v, fro the first pre-order traversal vector using one of the next two theores we can find the father denoted w of the node v. The ethod of finding w involves one of the situations described in propriety 3. The ain idea is to find a criterion for each situation that can appear and then to prove that there is only one node with this propriety.
3 Theore. If a - is before a ( {, 3,, n}) in the second pre-order traversal vector, i.e. i, j {,,, n} so that a - = b i, a = b j and i < j, then the node a is a son of a -. If a - has two sons, then a is to the left of a -.. If two nodes, u and v, are consecutive in both (the first and the second) pre-order traversal vectors, then the node v is the only son of u. Proof.. Let be an arbitrary value in the set {, 3,, n}. We ae two notations: u = a - = b i and v = a = b j. (.) Let s suppose that the nodes (u and v) are respecting to the second situation fro propriety 3. Then the second pre-order traversal vector (denoted pre) is: pre = (, w,, v,, u, ). (.) Since u = b i and v = b j (see (.)) it results fro (.) that i > j, which i < j. So, the consecutive nodes (u and v) of the first pre-order traversal vector are respecting the first situation in propriety 3.. The node v is a son of u (see.). Let s suppose that u has sons. Let t ( v) be the son to the right of u. Then, in the second pre-order traversal vector, the node t is next after u and, because t v, the nodes u and v can not be consecutive (contradiction). Theore If a - is after a ( {, 3,, n}) in the second pre-order traversal vector, i.e. i, j {,,, n} so that a - = b i, a = b j and i > j, then the node a is the son to the right of a p, where p {,,, -} and all the nodes in the first pre-order traversal vector (if exist) between a p and a are after b j = a in the second pre-order traversal i.e. q {p+, p+,, -}, h {j+, j+,, n} : a q = b h. Proof. We ae the sae notations as in the proof of theore (see (.)). We shall prove that the father denote w of v has the propriety that it is before v in the first pre-order traversal vector and all the nodes (if exist) between w and v (in the first pre-order traversal vector) are after v in the second pre-order traversal vector. If u has ore than a son (see the second part of the theore ), then u and v can not be respecting situation in propriety 3, because u is after v in the second pre-order traversal vector. So, the nodes ust be in the second situation (see fig..). In the situation, the first pre-order traversal vector is: pre = (, w,, u, v, ). (.3) So, the father w is before his son v in the first pre-order traversal vector. Let t = a q be a node between w = a p and v = a ( p < - ) in the first pre-order traversal vector, where q {p+, p+,, -}. It results that the node t ust be in the left partial binary tree of w. If t is in T, then t ust be after v in the second pre-order traversal vector. So far, we proved that the father w of v has the propriety that it is before v in the first pre-order traversal vector and all the nodes (if exist) between w and v (in the first pre-order traversal vector) are after v in the second pre-order traversal vector. Next we shall prove that the father w of v is the only node with this propriety. Let s suppose there exists another node denoted w w with the sae propriety. So, the node w is before v in the first pre-order traversal vector. We have two situations:
4 i) The node w is before w in the first pre-order traversal vector or ii) The node w is between w and v in the first pre-order traversal vector. In the situation i) the node w is between w and v. All the nodes between w and v are after v in the second pre-order traversal vector and so, the node w ust be after v (contradiction with the propriety of w). In the situation ii), because the node w is between w and v, it ust be after v in the second pre-order traversal vector (contradiction with the presued propriety of w ). In both cases we obtained contradiction. So, the father w of v is the only node with the above propriety. The theore is proved. The theores and lead us to an algorith for finding a binary tree using the pre-order traversal vectors. The pseudo-code of the algorith for finding a binary tree fro the pre-order traversal vector is:. a[] is the root of the tree;. a[] pushes the stac s; 3. For := to n do 4. PrePos[b[]] := ; end for; 5. :=; 6. For := to n do 7. left := true; 8. While the last node u fro the stac s is after a[] in the second pre-order vector, i.e. PrePos[u] > PrePos[a[]] do 9. Pop node u out of the stac s;. left := false; end while;. Let w be the last node in the stac s;. If left then 3. If PrePos[w]+ = PrePos[a[]] then a[] is the only son of w (left or right); :=+; u[] := w; 7. else a[] is the left son of w end if; 8. else a[] is the son to right of w; end if; 9. The node a[] pushes the stac s; end for; Let s study now the algorith. The first node of any pre-order traversal vector is the root of the tree. The first pre-order traversal vector coponents are sequentially (fro the second to the last) analyzed and then inserted in the tree using the ethod given by the theores or, depending the situation.
5 One of the tricy linear tie idea to do this in linear tie is to decide in O() if a node is before or after another node in the second pre-order traversal vector. This can be easily done using a vector denoted PrePos. PrePos[u] is the position of the node u in the second pre-order vector b. The vector PrePos can be built in linear tie directly fro the second pre-order traversal vector b. If we treat directly the situations presented in the theore, then the worst-case coplexity of the ethod is greater then O(n) (for each such situation we have to verify if the nodes between a p and a in the first pre-order traversal vector is after a in the second traversal vector). In order not to increase the coplexity of the ethod we shall use a denoted s stac. A node enters the stac s after it is analyzed. Nodes exit the stac only when a second situation of propriety 3 appears. Let s notice that for the current node a[], before taing out any node fro the stac, the last node fro the stac is a[-] (previous analyzed and inserted). If a[-] is before a[] in the second pre-order vector, then we have the first situation in the propriety 3 and no node is popped out of the stac. So, the last node in the stac (which is a[-]) is the father of a[] (see theore ). If a[-] is after a[] in the second pre-order vector then we have the second situation of the propriety 3. All the nodes in the stac which are after a[] are in the second situation of the propriety 3 they are popped out of the stac. After all these nodes are popped out of the stac, the last node in the stac is before a[] in the second pre-order traversal vector. This node has the propriety that all the nodes between it and a[] in the first pre-order traversal vector are after a[] in the second pre-order traversal vector, because they have been already analyzed (they entered in the stac before). The current node a[] is the son to the right of the last node in the stac (see theore ). In the end of the algorith, the variable will store the nuber of situations where a node has only a son. The eleents of the vector u are the nodes, which have only a son. Theore 3 The algorith presented above constructs a binary tree fro the pre-order traversals vectors. Proof. The correctness of the algorith is given by the observations above the algorith and fro the theores and. If no iteration of while do in line 8 of the algorith taes place, then the node a[] is the left son of the last node w = a[-] in the stac, according to theore, else a[] is the son to the right of the last node w in the stac. If there are pops out of the stac in the line 8, then the node a[] is the son to the right of w, because in this case a[] is not the first son of w and the first son was previously inserted in the binary tree to the left. If the nodes w = a[-] and a[] are consecutive in the second pre-order traversal vector, then the node a[] is the only son of w. In this case, we can not decide if a[] is the son to the left or to the right for w (see the second part of theore ). Theore 4 The algorith finds a binary tree fro the pre-order traversal vectors in linear tie and space.
6 Proof. Every coponent a[] ( {, 3,, n} ) of the first pre-order traversal vector enters once in O() in the stac s and, because of this, it can not exit the stac s ore than once. So, the total nuber of iterations of all while loops in the whole algorith is O(n). The worst-case tie coplexity of the whole algorith is O(n). There are three vectors with n coponents involved and in the stac s all n nodes enter once, so the algorith uses linear space. It is easy to see that the construction of a binary tree fro the traversal vectors can not be done in a coplexity less than O(n). So, the algorith above has an optial tie and space coplexity. 3. FINDING ALL THE SOLUTIONS If two nodes, u and v, are consecutive in both (the first and the second) pre-order traversal vectors, then the node v is the only son of u. We can not decide which son of u (left or right) is v. For the binary trees this do atter, because the case of v being the left son of u is different than the case of v being the son to the right for u. So, having the first and the second traversal of a binary tree if there are situations described in the second part of the theore, the solution is not unique. We can calculate the nuber of solutions. Theore 5 The nuber of solutions for the proble of construction of a binary tree fro the pre-order and post-order traversals is, where is the nuber of situations described in the second part of the theore that appear. Proof. All the situations described in the second part of the theore are independent. So, for each of these situations the nuber of solutions ultiplies by. Let s tae an exaple (see fig. 3.) Fig. 3.: Binary trees having the sae pre-order and post-order vectors 5
7 In the figure 3., the first pre-order traversal vector is a = (,, 3, 4, 5) and the second pre-order traversal vector is b = (,, 4, 5, 3), then =, because the pair of nodes (, ) and (4, 5) are consecutive in both pre-order traversal vectors. The total nuber of solutions for this exaple is = 4. We shall present now an optial tie and space coplexity ethod to find all the solution for the proble for construction of the binary trees fro the pre-order traversals. We saw that a solution can be found in linear tie and space. Starting fro this one we can find all solutions. We shall use a vector d with eleents or. Each eleent of d corresponds to a node, which has only a son. If d[j] =, then the son of the node u[j] is to the left (or to the right) and if d[j] =, then the son of u[j] is the other part (to the right and respectively to the left). We shall generate all possible values for the vector d and for each such instance we shall find the corresponded solution. We ll tae care to do this in O( ) tie and using linear space. A binary tree can be ept in three vectors: ls, rs and info, each having n eleents, as follows: ls[] is the son to the left of the node. If has no son, then ls[] =. rs[] is the son to the right of the node. If has no son, then rs[] =. info[] is the inforation of the node. The algorith to find all the solutions for the proble of construction of the binary tree fro the pre-order traversals is:. Find a solution ls, rs, info and the vector u;. For i:= to do d[i]:=; end for; 3. For i:= to - do 4. t:=; j:=; 5. while t= do 6. If d[j]= then d[j]:=; 7. else d[j]:=; t:=; 8. end if; 9. ls[u[j]] <-> ld[u[j]]; (interchange). j:=j+;. end while;. In ls, lr, info is ept a new solution; 3. end for; Theore 6 The algorith finds all the solutions for the proble of construction of the binary tree fro the pre-order traversals. Proof. All possible values for the vector d are generated and for each instance the corresponded solution is found. Theore 7 All the solutions for the proble of construction of the binary tree fro the pre-order traversals are found in optial tie and space coplexity. Proof. The initial solution is found linear tie and space (see theore 4). We shall calculate now the total nuber of while loops, which will give us the tie coplexity for the second part of the algorith.
8 The iterations of a while sequence ends when t becoes. This happens on the position of the first. Let s suppose that in the i-th iteration of for, the first in d is on the position, where {,,, }. There are - such cases. In such case, while sequence has iterations. So, the total nuber of iterations of while is:. (3.) Let s prove now that O = O : li li R * (3.) The su is convergent because: * * * li,,, R N N. (3.3) We can calculate the liit (3.): ) ( ) ( li ) ( li li li li (3.4) The coplexity of the whole algorith is O(n+ ) = O(ax{n, }). It is obviously that an optial tie algorith can not have the coplexity less than O(ax{n, }), because the eleents of the traversal vectors ust be analyzed at least once (in O(n)) and the nuber of solutions is. The algorith uses linear space (see theore 4). This eans that the algorith for finding all the solutions for the proble of construction the binary trees fro the pre-order traversals has an optial tie and space coplexity.
9 BIBLIOGRAPHY [] H.A. Burgdor, S. Jajodia, F.N. Springsteel, Y. Zalcstein (987), Alternative Methods for the Reconstruction of Trees fro their Traversals, BIT 7., 34-4; [] G. Chen, M.S. Yu, L. T. Liu (988), Two algoriths for constructing a binary tree fro its traversals, Inf. Process. Lett. 8, No.6, 97-99; [3] E. Mäinen (989), Constructing a binary tree fro its traversals, BIT 9, No.3, ; [4] E. Mäinen (), Constructing a binary tree efficiently fro its traversals, Int. J. Coput. Math. 75, No., 43-47; [5] A. Andersson, S. Carlsson (99), Construction of a tree fro its traversals in optial tie and space, Inf. Process. Lett. 34, No., -5; [6] A. Deaconu (4), Iterative Algorith for Construction of a Tree fro its Pre-order and Post-order Traversals in Linear Tie and Space, Analele Stiintifice Univ. Alexandru Ioan Cuza din Iasi (serie noua), ed. Univ. Al. I. Cuza, Toul IV; [7] R. K. Ahuja, T. L. Magnanti, J. B. Orlin (993), Networ flows: Theory, Algorits and Applications, Prentice Hall.
ER E P M A S S I CONSTRUCTING A BINARY TREE EFFICIENTLYFROM ITS TRAVERSALS DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF TAMPERE REPORT A-1998-5
S I N S UN I ER E P S I T VER M A TA S CONSTRUCTING A BINARY TREE EFFICIENTLYFROM ITS TRAVERSALS DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF TAMPERE REPORT A-1998-5 UNIVERSITY OF TAMPERE DEPARTMENT OF
arxiv:0805.1434v1 [math.pr] 9 May 2008
Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of
ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128
ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute
2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]
Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)
1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++
Answer the following 1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++ 2) Which data structure is needed to convert infix notations to postfix notations? Stack 3) The
RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure
RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University
TREE BASIC TERMINOLOGIES
TREE Trees are very flexible, versatile and powerful non-liner data structure that can be used to represent data items possessing hierarchical relationship between the grand father and his children and
Data Structure with C
Subject: Data Structure with C Topic : Tree Tree A tree is a set of nodes that either:is empty or has a designated node, called the root, from which hierarchically descend zero or more subtrees, which
Online Bagging and Boosting
Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used
Binary Search Trees CMPSC 122
Binary Search Trees CMPSC 122 Note: This notes packet has significant overlap with the first set of trees notes I do in CMPSC 360, but goes into much greater depth on turning BSTs into pseudocode than
Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks
Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna [email protected]
Converting a Number from Decimal to Binary
Converting a Number from Decimal to Binary Convert nonnegative integer in decimal format (base 10) into equivalent binary number (base 2) Rightmost bit of x Remainder of x after division by two Recursive
Binary Search Trees (BST)
Binary Search Trees (BST) 1. Hierarchical data structure with a single reference to node 2. Each node has at most two child nodes (a left and a right child) 3. Nodes are organized by the Binary Search
DATA STRUCTURES USING C
DATA STRUCTURES USING C QUESTION BANK UNIT I 1. Define data. 2. Define Entity. 3. Define information. 4. Define Array. 5. Define data structure. 6. Give any two applications of data structures. 7. Give
A quantum secret ballot. Abstract
A quantu secret ballot Shahar Dolev and Itaar Pitowsky The Edelstein Center, Levi Building, The Hebrerw University, Givat Ra, Jerusale, Israel Boaz Tair arxiv:quant-ph/060087v 8 Mar 006 Departent of Philosophy
PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS
PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,
The Application of Bandwidth Optimization Technique in SLA Negotiation Process
The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia
Chapter 14 The Binary Search Tree
Chapter 14 The Binary Search Tree In Chapter 5 we discussed the binary search algorithm, which depends on a sorted vector. Although the binary search, being in O(lg(n)), is very efficient, inserting a
Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller
Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference
PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO
Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:
A binary search tree is a binary tree with a special property called the BST-property, which is given as follows:
Chapter 12: Binary Search Trees A binary search tree is a binary tree with a special property called the BST-property, which is given as follows: For all nodes x and y, if y belongs to the left subtree
MAX = 5 Current = 0 'This will declare an array with 5 elements. Inserting a Value onto the Stack (Push) -----------------------------------------
=============================================================================================================================== DATA STRUCTURE PSEUDO-CODE EXAMPLES (c) Mubashir N. Mir - www.mubashirnabi.com
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
Data Structure [Question Bank]
Unit I (Analysis of Algorithms) 1. What are algorithms and how they are useful? 2. Describe the factor on best algorithms depends on? 3. Differentiate: Correct & Incorrect Algorithms? 4. Write short note:
Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks
Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois
The Student-Project Allocation Problem
The Student-Project Allocation Problem David J. Abraham, Robert W. Irving, and David F. Manlove Department of Computing Science, University of Glasgow, Glasgow G12 8QQ, UK Email: {dabraham,rwi,davidm}@dcs.gla.ac.uk.
Binary Trees and Huffman Encoding Binary Search Trees
Binary Trees and Huffman Encoding Binary Search Trees Computer Science E119 Harvard Extension School Fall 2012 David G. Sullivan, Ph.D. Motivation: Maintaining a Sorted Collection of Data A data dictionary
Resource Allocation in Wireless Networks with Multiple Relays
Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0
Applying Multiple Neural Networks on Large Scale Data
0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree
OPTIMAL BINARY SEARCH TREES
OPTIMAL BINARY SEARCH TREES 1. PREPARATION BEFORE LAB DATA STRUCTURES An optimal binary search tree is a binary search tree for which the nodes are arranged on levels such that the tree cost is minimum.
Questions 1 through 25 are worth 2 points each. Choose one best answer for each.
Questions 1 through 25 are worth 2 points each. Choose one best answer for each. 1. For the singly linked list implementation of the queue, where are the enqueues and dequeues performed? c a. Enqueue in
Introduction to Unit Conversion: the SI
The Matheatics 11 Copetency Test Introduction to Unit Conversion: the SI In this the next docuent in this series is presented illustrated an effective reliable approach to carryin out unit conversions
CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY
CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong [email protected]
Efficiency of algorithms. Algorithms. Efficiency of algorithms. Binary search and linear search. Best, worst and average case.
Algorithms Efficiency of algorithms Computational resources: time and space Best, worst and average case performance How to compare algorithms: machine-independent measure of efficiency Growth rate Complexity
On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes
On Coputing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May and Ilya Ozerov Horst Görtz Institute for IT-Security Ruhr-University Bochu, Gerany Faculty of Matheatics
PES Institute of Technology-BSC QUESTION BANK
PES Institute of Technology-BSC Faculty: Mrs. R.Bharathi CS35: Data Structures Using C QUESTION BANK UNIT I -BASIC CONCEPTS 1. What is an ADT? Briefly explain the categories that classify the functions
Learning Outcomes. COMP202 Complexity of Algorithms. Binary Search Trees and Other Search Trees
Learning Outcomes COMP202 Complexity of Algorithms Binary Search Trees and Other Search Trees [See relevant sections in chapters 2 and 3 in Goodrich and Tamassia.] At the conclusion of this set of lecture
ASIC Design Project Management Supported by Multi Agent Simulation
ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously
10CS35: Data Structures Using C
CS35: Data Structures Using C QUESTION BANK REVIEW OF STRUCTURES AND POINTERS, INTRODUCTION TO SPECIAL FEATURES OF C OBJECTIVE: Learn : Usage of structures, unions - a conventional tool for handling a
Efficient Key Management for Secure Group Communications with Bursty Behavior
Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:
Use of extrapolation to forecast the working capital in the mechanical engineering companies
ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance
The Virtual Spring Mass System
The Virtual Spring Mass Syste J. S. Freudenberg EECS 6 Ebedded Control Systes Huan Coputer Interaction A force feedbac syste, such as the haptic heel used in the EECS 6 lab, is capable of exhibiting a
Analysis of Algorithms I: Binary Search Trees
Analysis of Algorithms I: Binary Search Trees Xi Chen Columbia University Hash table: A data structure that maintains a subset of keys from a universe set U = {0, 1,..., p 1} and supports all three dictionary
The following themes form the major topics of this chapter: The terms and concepts related to trees (Section 5.2).
CHAPTER 5 The Tree Data Model There are many situations in which information has a hierarchical or nested structure like that found in family trees or organization charts. The abstraction that models hierarchical
Machine Learning Applications in Grid Computing
Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA [email protected], [email protected]
Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network
2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A REVIEW ON THE USAGE OF OLD AND NEW DATA STRUCTURE ARRAYS, LINKED LIST, STACK,
An Innovate Dynamic Load Balancing Algorithm Based on Task
An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun
Data Structures. Level 6 C30151. www.fetac.ie. Module Descriptor
The Further Education and Training Awards Council (FETAC) was set up as a statutory body on 11 June 2001 by the Minister for Education and Science. Under the Qualifications (Education & Training) Act,
How To Get A Loan From A Bank For Free
Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,
Data Set Generation for Rectangular Placement Problems
Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George
Quality evaluation of the model-based forecasts of implied volatility index
Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor
Home Page. Data Structures. Title Page. Page 1 of 24. Go Back. Full Screen. Close. Quit
Data Structures Page 1 of 24 A.1. Arrays (Vectors) n-element vector start address + ielementsize 0 +1 +2 +3 +4... +n-1 start address continuous memory block static, if size is known at compile time dynamic,
CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS
641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC [email protected] Abstract Custoer relationship
CPU Animation. Introduction. CPU skinning. CPUSkin Scalar:
CPU Aniation Introduction The iportance of real-tie character aniation has greatly increased in odern gaes. Aniating eshes ia 'skinning' can be perfored on both a general purpose CPU and a ore specialized
A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries
Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries
Factored Models for Probabilistic Modal Logic
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois
Calculation Method for evaluating Solar Assisted Heat Pump Systems in SAP 2009. 15 July 2013
Calculation Method for evaluating Solar Assisted Heat Pup Systes in SAP 2009 15 July 2013 Page 1 of 17 1 Introduction This docuent describes how Solar Assisted Heat Pup Systes are recognised in the National
Fuzzy Sets in HR Management
Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic [email protected] Jana Talašová Faculty of Science, Palacký Univerzity,
Reconnect 04 Solving Integer Programs with Branch and Bound (and Branch and Cut)
Sandia is a ultiprogra laboratory operated by Sandia Corporation, a Lockheed Martin Copany, Reconnect 04 Solving Integer Progras with Branch and Bound (and Branch and Cut) Cynthia Phillips (Sandia National
Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances
Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances Jialin Zhang Tsinghua University [email protected] Wei Chen Microsoft Research Asia [email protected] Abstract
Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3)
324 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 Fuzzy Evaluation on Networ Security Based on the New Algorith of Mebership Degree Transforation M(,2,3) Hua Jiang School of Econoics and Manageent, Hebei
Analysis of Algorithms I: Optimal Binary Search Trees
Analysis of Algorithms I: Optimal Binary Search Trees Xi Chen Columbia University Given a set of n keys K = {k 1,..., k n } in sorted order: k 1 < k 2 < < k n we wish to build an optimal binary search
Partitioning Data on Features or Samples in Communication-Efficient Distributed Optimization?
Partitioning Data on Features or Saples in Counication-Efficient Distributed Optiization? Chenxin Ma Industrial and Systes Engineering Lehigh University, USA [email protected] Martin Taáč Industrial and
Method of supply chain optimization in E-commerce
MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent
Loop Invariants and Binary Search
Loop Invariants and Binary Search Chapter 4.3.3 and 9.3.1-1 - Outline Ø Iterative Algorithms, Assertions and Proofs of Correctness Ø Binary Search: A Case Study - 2 - Outline Ø Iterative Algorithms, Assertions
UIL Computer Science for Dummies by Jake Warren and works from Mr. Fleming
UIL Computer Science for Dummies by Jake Warren and works from Mr. Fleming 1 2 Foreword First of all, this book isn t really for dummies. I wrote it for myself and other kids who are on the team. Everything
Regression Verification: Status Report
Regression Verification: Status Report Presentation by Dennis Felsing within the Projektgruppe Formale Methoden der Softwareentwicklung 2013-12-11 1/22 Introduction How to prevent regressions in software
Exercises Software Development I. 11 Recursion, Binary (Search) Trees. Towers of Hanoi // Tree Traversal. January 16, 2013
Exercises Software Development I 11 Recursion, Binary (Search) Trees Towers of Hanoi // Tree Traversal January 16, 2013 Software Development I Winter term 2012/2013 Institute for Pervasive Computing Johannes
Ordered Lists and Binary Trees
Data Structures and Algorithms Ordered Lists and Binary Trees Chris Brooks Department of Computer Science University of San Francisco Department of Computer Science University of San Francisco p.1/62 6-0:
Binary Search Trees. A Generic Tree. Binary Trees. Nodes in a binary search tree ( B-S-T) are of the form. P parent. Key. Satellite data L R
Binary Search Trees A Generic Tree Nodes in a binary search tree ( B-S-T) are of the form P parent Key A Satellite data L R B C D E F G H I J The B-S-T has a root node which is the only node whose parent
Algorithms Chapter 12 Binary Search Trees
Algorithms Chapter 1 Binary Search Trees Outline Assistant Professor: Ching Chi Lin 林 清 池 助 理 教 授 [email protected] Department of Computer Science and Engineering National Taiwan Ocean University
The Tower of Hanoi. Recursion Solution. Recursive Function. Time Complexity. Recursive Thinking. Why Recursion? n! = n* (n-1)!
The Tower of Hanoi Recursion Solution recursion recursion recursion Recursive Thinking: ignore everything but the bottom disk. 1 2 Recursive Function Time Complexity Hanoi (n, src, dest, temp): If (n >
Why? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
Performance Evaluation of Machine Learning Techniques using Software Cost Drivers
Perforance Evaluation of Machine Learning Techniques using Software Cost Drivers Manas Gaur Departent of Coputer Engineering, Delhi Technological University Delhi, India ABSTRACT There is a treendous rise
Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation
Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during
Solutions to In-Class Problems Week 4, Mon.
Massachusetts Institute of Technology 6.042J/18.062J, Fall 05: Mathematics for Computer Science September 26 Prof. Albert R. Meyer and Prof. Ronitt Rubinfeld revised September 26, 2005, 1050 minutes Solutions
INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS
Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE
Binary Search Trees. Data in each node. Larger than the data in its left child Smaller than the data in its right child
Binary Search Trees Data in each node Larger than the data in its left child Smaller than the data in its right child FIGURE 11-6 Arbitrary binary tree FIGURE 11-7 Binary search tree Data Structures Using
Presentation Safety Legislation and Standards
levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety
Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy
Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou
A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS
A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box
Real Time Target Tracking with Binary Sensor Networks and Parallel Computing
Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking
MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
Lecture L26-3D Rigid Body Dynamics: The Inertia Tensor
J. Peraire, S. Widnall 16.07 Dynaics Fall 008 Lecture L6-3D Rigid Body Dynaics: The Inertia Tensor Version.1 In this lecture, we will derive an expression for the angular oentu of a 3D rigid body. We shall
Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model
Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary
The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs
Send Orders for Reprints to [email protected] 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic
Data Structures and Algorithms
Data Structures and Algorithms CS245-2016S-06 Binary Search Trees David Galles Department of Computer Science University of San Francisco 06-0: Ordered List ADT Operations: Insert an element in the list
Previous Lectures. B-Trees. External storage. Two types of memory. B-trees. Main principles
B-Trees Algorithms and data structures for external memory as opposed to the main memory B-Trees Previous Lectures Height balanced binary search trees: AVL trees, red-black trees. Multiway search trees:
Lecture Notes on Linear Search
Lecture Notes on Linear Search 15-122: Principles of Imperative Computation Frank Pfenning Lecture 5 January 29, 2013 1 Introduction One of the fundamental and recurring problems in computer science is
Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center
Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava
Any two nodes which are connected by an edge in a graph are called adjacent node.
. iscuss following. Graph graph G consist of a non empty set V called the set of nodes (points, vertices) of the graph, a set which is the set of edges and a mapping from the set of edges to a set of pairs
Overview. Database Security. Relational Database Basics. Semantic Integrity Controls. Access Control Rules- Name dependent access
Database ecurity ione FischerHübner Applied ecurity, DAVC7 Overview eantic Integrity Controls Access Control Rules Multilevel ecure Databases RBAC in Coercial DBM tatistical Database ecurity Relational
B-Trees. Algorithms and data structures for external memory as opposed to the main memory B-Trees. B -trees
B-Trees Algorithms and data structures for external memory as opposed to the main memory B-Trees Previous Lectures Height balanced binary search trees: AVL trees, red-black trees. Multiway search trees:
Preference-based Search and Multi-criteria Optimization
Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne [email protected]
Lecture L9 - Linear Impulse and Momentum. Collisions
J. Peraire, S. Widnall 16.07 Dynaics Fall 009 Version.0 Lecture L9 - Linear Ipulse and Moentu. Collisions In this lecture, we will consider the equations that result fro integrating Newton s second law,
