Size Balanced Tree. Chen Qifeng (Farmer John) Zhongshan Memorial Middle School, Guangdong, China. December 29, 2006.

Size: px
Start display at page:

Download "Size Balanced Tree. Chen Qifeng (Farmer John) Zhongshan Memorial Middle School, Guangdong, China. December 29, 2006."

Transcription

1 Size Balanced Tree Chen Qifeng (Farmer John) Zhonghan Memorial Middle School, Guangdong, China December 9, 006 Abtract Thi paper preent a unique trategy for maintaining balance in dynamically changing Binary Search Tree that ha optimal expected behavior at wort. Size Balanced Tree i, a the name ugget, a Binary Search Tree (abbr. BST) kept balanced by ize. It i imple, efficient and veratile in every apect. It i very eay to implement and ha a traightforward decription and a urpriingly imple proof of correctne and runtime. It runtime matche that of the fatet BST known o far. Furthermore, it work much fater than many other famou BST due to the tendency of a perfect BST in practice. It upport not only typical primary operation but alo Select and Rank. Key Word And Phrae Size Balanced Tree SBT Maintain Thi paper i dedicated to the memory of Heaven.

2 1 Introduction Before preenting Size Balanced Tree it i neceary to explicate Binary Search Tree and rotation on BST, Left-Rotate and Right-Rotate. 1.1 Binary Search Tree Binary Search Tree i a ignificant kind of advanced data tructure. It upport many dynamic-et operation, including Search, Minimum, Maximum, Predeceor, Succeor, Inert and Delete. It can be ued both a a dictionary and a a priority queue. A BST i an organized binary tree. Every node in a BST contain two children at mot. The key for compare in a BST are alway tored in uch a way a to atify the binary-earch-tree property: Let x be a node in a binary earch tree. Then the key of x i not le than that in left ubtree and not larger than that in right ubtree. For every node t we ue the field of leftt and rightt to tore two pointer to it children. And we define keyt to mean the value of the node t for compare. In addition we add t, the ize of ubtree rooted at t, to keep the number of the node in that tree. Particularly we call 0 the pointer to an empty tree and 0=0. 1. Rotation In order to keep a BST balanced (not degenerated to be a chain) we uually change the pointer tructure through rotation to change the configuration, which i a local operation in a earch tree that preerve the binary-earch-tree property. Figure1.1: The operation Left-Rotate(x) tranform the configuration of the two node on the right into the configuration on the left by changing a contant number of pointer. The configuration on the left can be tranformed into the configuration on the right by the invere operation, Right-Rotate(y).

3 1..1 Peudocode Of Right-Rotate The Right-Rotate aume that the left child exit. Right-Rotate (t) 1 k leftt leftt rightk rightk t 4 k t 5 t leftt+rightt+1 6 t k 1.. Peudocode Of Left-Rotate The Left-Rotate aume that the right child exit. Left-Rotate (t) 1 k rightt rightt leftk leftk t 4 k t 5 t leftt+rightt+1 6 t k Size Balanced Tree Size Balanced Tree (abbr. SBT) i a kind of Binary Search Tree kept balanced by ize. It upport many dynamic primary operation in the runtime of O(logn): Inert(t,v) Inert a node whoe key i v into the SBT rooted at t. Delete(t,v) Delete a node whoe key i v from the SBT rooted at t. In the cae that no uch a node in the tree, delete the node earched at lat. Find(t,v) Find the node whoe key i v and return it. Rank(t,v) Return the rank of v in the tree rooted at t. In another word, it i one plu the number of the key which are le than v in that tree. Select(t,k) Return the node which i ranked at the kth poition. Apparently it include operation of Get-max and Get-min becaue Get-min i equivalent to Select(t,1) and Get-max i equivalent to Select(t,t) Pred(t,v) Return the node with maximum key which i le than v. Succ(t,v) Return the node with minimum key which i larger than v.

4 Commonly every node of a SBT contain key, left, right and extra but ueful updated field: it ize, which ha been defined in the former introduction. The kernel of a SBT i divided into two retriction on ize: For every node pointed by t in a SBT, we guarantee that Property(a): Property(b): right t left left t, right left t left t right right t, left right t Figure.1:The node L and R are left and right children of the node T. The Subtree A and B, C and D are left and right ubtree of the node L and R repectively. Correpond to propertie (a) and (b), A, B R & C, D L Maintain Aume that we need to inert a node whoe key i v into a BST. Generally we ue the following procedure to accomplih the miion. Simple-Inert (t,v) 1 If t=0 then t NEW-NODE(v) Ele 4 t t+1 5 If v<keyt then 6 Simple-Inert(leftt,v) 7 Ele 8 Simple-Inert(rightt,v)

5 After the execution of Simple-Inert propertie (a) and (b) are probably not atified. In that cae we need to maintain the SBT. The vital operation on a SBT i a unique procedure, Maintain. Maintain(t) i ued to maintain the SBT rooted at t. The hypothei that the ubtree of t are SBT i applied before the performance. Since propertie (a) and (b) are ymmetrical we only dicu the cae that retriction (a) i violated in detail. Cae 1: leftleftt>rightt In thi cae that A>R correpond to Figure.1 after Inert(leftt,v), we can execute the following intruction to repair the SBT: (1) Firt perform Right-Rotate(T). Thi operation tranform Figure.1 into Figure.1; Figure.1: All the node are defined the ame a in Figure.1. () And then ometime it occur that the tree i till not a SBT becaue C>B or D>B by any poibility. So it i neceary to implement Maintain(T). () In ucceion the configuration of the right ubtree of the node L might be changed. Becaue of the poibility of violating the propertie it i needful to run Maintain(L) again. Cae : rightleftt>rightt In thi cae that B>R correpond to Figure. after Inert(leftt,v), the maintaining i kind of complicated than that in cae 1. We can carry out the following operation for repair.

6 Figure.: All the node are defined the ame a in Figure.1 except E, F and B. E and F are the ubtree of the node B. (1) Firt perform Left-Rotate(L). After that Figure. wa tranformed to Figure. hown below; Figure.: All the node are defined the ame a in Figure.. () And then perform Right-Rotate(T). Thi performance reult in the tranformation from Figure. to following Figure.4.

7 Figure.4: All the node are defined the ame a in Figure.. () After (1) and (), the tree become to be very unpredictable. But luckily, in Figure.4 ubtree A, E, F and R are till SBT. So we can perform Maintain(L) and Maintain(T) to repair the ubtree of the node B. (4) After tep (), thoe ubtree are already SBT. But propertie (a) and (b) may be till violated on the node B. Thu we need perform Maintain(B) again. Cae : rightrightt>leftt Thi cae i ymmetrical with cae 1. Cae 4: leftrightt>leftt Thi cae i ymmetrical with cae..1 Peudocode Of Standard Maintain According to the previou analyi it i eay to implement a normal Maintain. Maintain (t) 1 If leftleftt>rightt then Right-Rotate(t) Maintain(rightt) 4 Maintain(t) 5 Exit 6 If rightleftt>rightt then 7 Left-Rotate(leftt)

8 8 Right-Rotate(t) 9 Maintain(leftt) 10 Maintain(rightt) 11 Maintain(t) 1 Exit 1 If rightrightt>leftt then 14 Left-Rotate(t) 15 Maintain(leftt) 16 Maintain(t) 17 Exit 18 If leftrightt>leftt then 19 Right-Rotate(rightt) 0 Left-Rotate(t) 1 Maintain(leftt) Maintain(rightt) Maintain(t). Peudocode Of Fater And Simpler Maintain The tandard peudocode i a little complicated and low. Generally we can enure that property (a) or (b) ha been atified. Therefore we only need to check cae 1 and or cae and 4 to peed up. In that cae we can add a boolean variant, flag, to avoid meaningle checking. If flag i fale cae 1 and will be checked, otherwie cae and 4 will be checked. Maintain (t,flag) 1 If flag=fale then If leftleftt>rightt then Right-Rotate(t) 4 Eleif rightleftt>rightt then 5 Left-Rotate(leftt) 6 Right-Rotate(t) 7 Ele exit 8 Eleif rightrightt>leftt then 9 Left-Rotate(t) 10 Eleif leftrightt>leftt then 11 Right-Rotate(rightt) 1 Left-Rotate(t) 1 Ele exit 14 Maintain(leftt,fale) 15 Maintain(rightt,true) 16 Maintain(t,fale) 17 Maintain(t,true)

9 Why Maintain(leftt,true) and Maintain(rightt,fale) are expelled? What i the runtime of Maintain? You can find the anwer in part 6, analyi. 4 Inertion The inertion on a SBT i very imple. Here the peudocode of Inert on a SBT. 4.1 Peudocode Of Inert Inert (t,v) 1 If t=0 then t NEW-NODE(v) Ele 4 t t+1 5 If v<keyt then 6 Simple-Inert(leftt,v) 7 Ele 8 Simple-Inert(rightt,v) 9 Maintain(t,v keyt) 5 Deletion I augment the deletion for convenience. If no uch a value to delete in a SBT we delete the node earched at lat and record it. Here the tandard peudocode of Delete on a SBT. 5.1 Peudocode Of Standard Delete Delete (t,v) 1 If t then record keyt t leftt+rightt 4 Exit 5 t t-1 6 If v=keyt then 7 Delete(leftt,vt+1) 8 Keyt record 9 Maintain(t,true) 10 Ele

10 11 If v<keyt then 1 Delete(leftt,v) 1 Ele 14 Delete(rightt,v) 15 Maintain(t,v<keyt) 5. Peudocode Of Fater And Simpler Delete Actually thi i the implet deletion without other function. Delete(t,v) here i a function that return the value deleted. It can reult in a detroyed SBT. But with the inertion above, a BST i till kept at the height of O(logn*) where n* i the total number of inertion, not the current ize! Delete (t,v) 1 t t-1 If (v=keyt)or(v<keyt)and(leftt=0)or(v>keyt)and(rightt=0) then Delete keyt 4 If (leftt=0)or(rightt=0) then 5 t leftt+rightt 6 Ele 7 keyt Delete(leftt,vt+1) 8 Ele 9 If v<keyt then 10 Delete(leftt,v) 11 Ele 1 Delete(rightt,v) 6 Analyi Obviouly Maintain i a recurive procedure. Maybe the quetion about whether it can top or not ha appeared in your mind. Not to worry: it ha been proved that the amortized runtime for Maintain i only O(1). 6.1 Analyi Of Height Let fh be the minimum number of the node of a SBT whoe height i h. We have 1 ( h = 0) f h = ( h = 1) f h 1 + f h + 1 ( h > 1)

11 6.1.1 Proof (1) It i eay to work out that f 0 = 1and f 1 =. () Firt of all, f h f h 1 + f h + 1( h > 1). For each h>1, let aume that t point to a SBT whoe height i h. And then thi SBT contain a ubtree at the height of h-1. It doen t matter to uppoe it a the left ubtree. According to the previou definition of f h, we have that left t f h 1. And there i an h--tall ubtree of the left ubtree. In another word there i a ubtree whoe ize i at leat f h of the left ubtree. Owing to the property (b) we have that right t f h. Therefore we draw the concluion that t f h 1 + f h + 1. On the other hand, f h f h 1 + f h + 1( h > 1). We can contruct a SBT with exact f h node() and it height i h. We call thi kind of SBT treeh. a BST with one node tree h = any BST with two node a BST containing treeh -1 and treeh - a two ubtree ( h = 0) ( h = 1) ( h > 1) Hence that f h = f h 1 + f h + 1( h > 1) i obtained by umming up two upper apect The Wort Height In fact f h i exponential function. It precie value can be calculated from the recurion. h α f h = + β 5 h+ 1 = α h+ 5 1 = Fibonacci h + 1 = h i= 0 Fibonacci i where α = and β = 5

12 Some uual value of fh H Fh Lemma The wort height of an n-node SBT i the maximum h ubjected to f h n. Aume that maxh i the wort height of a SBT at the ize of n. According to the lemma above, we have α f maxh = α maxh+ 5 maxh log n maxh 1.44log maxh+ 5 5( n+ 1.5) α n n 1. Now it i clear that the height of a SBT i O(logn). 6. Analyi Of Maintain We can eaily prove that Maintain work quite efficiently uing the previou concluion. There i a very important value to etimate how well a BST i, the average of all node depth. It i the quotient obtained by SD, the um of the depth of all node, dividing n. Generally the le it i, the better a BST i. Becaue of the contant n, SD i expected to be a mall a poible. Now we need to concentrate on SD. It ignificance i the ability to retrict the time of Maintain. Recalling the condition to perform rotation in Maintain it i urpriing that SD alway decreae after rotation. In cae 1, for example, comparing Figure.1 with Figure.1, SD increae a negative value, rightt-leftleftt. And for intance comparing Figure. to Figure.4, SD increae a value le than -1, rightt-rightleftt-1. Due to the height of O(logn) SD i alway kept O(nlogn). And SD jut increae O(logn) after an inertion on a SBT. Therefore SD = n O(log n) T T = O( n log n) = O(log n) where T i the number of Maintain running rotation. The total number of Maintain i T plu the number of Maintain without rotation. Since the latter i O(nlogn)+O(T), the amortized runtime for Maintain i

13 O( T ) + O( nlog n) + O( T ) nlog n = O(1) 6. Analyi Of Each Operation Now that the height of SBT i O(logn) and Maintain i O(1), the runtime for all primary operation are O(logn). 6.4 Analyi Of Fater And Simpler Delete We call the tatement P(n*) that a BST with the fater and impler Delete and n* tandard Inert i at the height of O(logn*). We prove P(n*) i true for arbitrary poitive integer n* by mathematical induction Proof Here I jut give a rough proof. Aume that a node t i checked by Maintain(t,fale), we have left t 1 right t t 1 left t Therefore if all node on the path from a node to the root are checked by Maintain the depth of thi node i O(logn). (1) For n*=1, P(n*) i true apparently; () Aume that P(n*) i true for n*<k. For n*=k, after the lat conecutive inertion, the node checked by Maintain mut be connected together to form a tree. For every leaf of thi tree, the ubtree pointed by it doe not be changed by Maintain. So the depth of the node in thi ubtree i not larger than O(logn*)+O(logn)=O(logn*) () Therefore P(n*) i true for n*=1,, In thi way the amortized runtime of Maintain i till O(1). 6.5 Analyi Of Fater And Simpler Maintain Here the dicuion about why Maintain(leftt,true) and Maintain(rightt,fale) can be expelled. In cae 1 in Figure. we have

14 9 8, 9 8 1, R R F E R B F E R L B R L Thu Maintain(rightt,fale),correpond to Maintain(T,fale) in Figure.1, can be expelled. And Maintain(leftt,true) i unneceary apparently. In cae in Figure. we have R F E A Thee inequation alo mean that the ize of ubtree of E i le than A and the ize of ubtree of F i le than R. Thu Maintain(rightt,fale) and Maintain(leftt,true) can be expelled. 7 Advantage 7.1 How Fat A SBT Run Typical Problem Write a program to perform n operation given from the input. They are 1) Inert a given number into the et; ) Delete a given number from the et; ) Return if a given number i in the et; 4) Return the rank of a given number in the et; 5) Return the kth number in the et; 6) Return the previou number of a given number in the et; 7) Return the ucceeding number of a given number in the et.

15 7.1. Statitic Inert,000,000 node with random value econd SBT 7.1 AVL 8.4 Treap 11.6 Randomized BST Perform,000,000 operation of 66% inertion and % deletion with random value econd 6 4 SBT 5.59 AVL 7.4 Treap 8.86 Randomzied BST

16 Perform,000,000 operation of 0% inertion,10% deletion and 60% query with random value econd 4 1 SBT.9 AVL 4.1 Treap 5.67 Randomized BST In practice SBT work excellently. From the upper chart we ee that SBT run much fater than other balanced BST while the data are random. Moreover the more ordered the data are, the unexpectedly fater SBT run. It take only econd to inert,000,000 ordered node into a SBT. 7. How Efficiently A SBT Work The average of all node depth nonincreae while Maintain i running. For thi reaon a SBT alway tend to be a perfect balanced BST. Inert,000,000 node with random value Type SBT AVL Treap Randomized BST Splay Perfect BST Average Depth Height Time of Rotation ? Inert,000,000 node with ordered value Type SBT AVL Treap Randomized Perfect Splay BST BST Average Depth Height Time of Rotation ?

17 7. How Eay Debugging I At firt we can merely implement a imple BST to guarantee that the main of the code i correct. After that we add Maintain into the Inert and then debug. If an error i checked out we only need to debug Maintain. Moreover a SBT doen t bae on random o debugging i much tabler comparing to Treap, Skip lit, Randomized BST and o on. 7.4 How Simple A SBT I A SBT i almot the ame a a imple BST. Removing the only additional Maintain in Inert the former turn to be the latter. And Maintain i quite imple too. 7.5 How Compact A SBT I Lot of balanced BST uch a SBT, AVL, Treap, Red-Black BST and o on need extra field to be kept balanced. But many of them are uele like height, random factor and color. On the contrary a SBT contain a ueful extra field, ize. In poeion of it we can augment BST to upport election and ranking. 7.6 How Veratile A SBT I Now that the height of a SBT i O(logn), we can perform Select in O(logn) in the wort cae. But Splay can t upport it very well becaue the height can be degenerated to be O(n) eaily, which i expoed by the char above. Acknowledgment The author thank hi Englih teacher, Fiona, for enthuiatic help. Reference 1 G.M.Adelon-Velkii and E.M.Landi, An algorithm for the Organization of Information, Soviet.Mat.Doklady (196) L.J.Guiba and R.Sedgewick, A dichromatic Framework for Balanced Tree, Proceeding of the Nineteenth Annual IEEE Sympoium on Foundation of Computer Science (1978)

18 D. D. Sleator and R. E. Tarjan, Self-adjuting binary earch tree, JACM,, (1985). 4 S.W.Bent and J.R.Dricoll, Randomly balanced earchtree. Manucript (1991). 5 Raimund Seidel and Cecilia R. Aragony, Randomized Search Tree.(1996). 6 M.A.Wei, Data Structure and Algorithm Analyi in C++, Third Edition, Addion Weley, R.E. Tarjan, Sequential acce in play tree take linear time, Combinatorica 5(4), 1985, pp J. Nievergelt and E. M. Reingold, Binary earch tree of bounded balance, SIAM J. Computing,, 4 (197). 9 K.Mehlhorn, and A.Takalidi, Data Structure, in Handbook of Theoretical Computer Science, Chapter 6, Vol.A, pp.0 41, Elevier Science Publiher,(1990)

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

AVL Tree. The height of the BST be as small as possible

AVL Tree. The height of the BST be as small as possible 1 AVL Tree re and Algorithm The height of the BST be a mall a poible The firt balanced BST. Alo called height-balanced tree. Introduced by Adel on-vel kii and Landi in 1962. BST with the following condition:

More information

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course: Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,

More information

Announcements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum

Announcements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum Announcement Homework 6 due Friday Feb 25 th at the BEGINNING o lecture CSE332: Data Abtraction Lecture 19: Parallel Preix and Sorting Project 3 the lat programming project! Verion 1 & 2 - Tue March 1,

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

CS201: Data Structures and Algorithms. Assignment 2. Version 1d

CS201: Data Structures and Algorithms. Assignment 2. Version 1d CS201: Data Structure and Algorithm Aignment 2 Introduction Verion 1d You will compare the performance of green binary earch tree veru red-black tree by reading in a corpu of text, toring the word and

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Homework 4 Due Thursday Oct 7. CLRS 12-4 (number of binary trees) CLRS (rb insert implementation)

Homework 4 Due Thursday Oct 7. CLRS 12-4 (number of binary trees) CLRS (rb insert implementation) Homework 4 Due Thurday Oct 7 CLRS 12-4 (number of binary tree) CLRS 13.3-6 (rb inert imlementation) 1 Chater 13: Red-Black Tree A red-black tree i a node-colored BST. Each node i colored either black or

More information

CSE 250B Assignment 4 Report

CSE 250B Assignment 4 Report CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

Today s Outline. CS 362, Lecture 19. DFS and BFS. Generic Traverse. BFS and DFS Wrapup Shortest Paths. Jared Saia University of New Mexico

Today s Outline. CS 362, Lecture 19. DFS and BFS. Generic Traverse. BFS and DFS Wrapup Shortest Paths. Jared Saia University of New Mexico Today Outline CS 362, Lecture 9 Jared Saia Univerity of New Mexico BFS and DFS Wrapup Shortet Path Generic Travere DFS and BFS Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v)

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information

Algorithmic Discrete Mathematics 4. Exercise Sheet

Algorithmic Discrete Mathematics 4. Exercise Sheet Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

CORRECTNESS ISSUES AND LOOP INVARIANTS

CORRECTNESS ISSUES AND LOOP INVARIANTS The next everal lecture 2 Study algorithm for earching and orting array. Invetigate their complexity how much time and pace they take Formalize the notion of average-cae and wort-cae complexity CORRECTNESS

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

8.1 Shortest Path Trees

8.1 Shortest Path Trees I tudy my Bible a I gather apple. Firt I hake the whole tree, that the ripet might fall. Then I climb the tree and hake each limb, and then each branch and then each twig, and then I look under each leaf.

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Lemma 1. A 3-connected maximal generalized outerplanar graph is a wheel.

Lemma 1. A 3-connected maximal generalized outerplanar graph is a wheel. 122 (1997) MATHEMATICA BOHEMICA No. 3, 225{230 A LINEAR ALGORITHM TO RECOGNIZE MAXIMAL GENERALIZED OUTERPLANAR GRAPHS Jo C cere, Almer a, Alberto M rquez, Sevilla (Received November 16, 1994, revied May

More information

Distribution-based Microdata Anonymization

Distribution-based Microdata Anonymization Ditribution-baed Microdata Anonymization Nick Kouda niverity of Toronto kouda@c.toronto.edu Ting Yu North Carolina State niverity yu@cc.ncu.edu Diveh Srivatava AT&T Lab Reearch diveh@reearch.att.com Qing

More information

Balanced Binary Search Trees. Victor Gao

Balanced Binary Search Trees. Victor Gao Balanced Binary Search Trees Victor Gao OUTLINE Binary Heap Revisited BST Revisited Balanced Binary Search Trees Rotation Treap Splay Tree BINARY HEAP: REVIEW A binary heap is a complete binary tree such

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring

More information

Laboratory Exercise 2

Laboratory Exercise 2 Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

Bottom Up parsing. Bottom-up parsing. Steps in a shift-reduce parse. 1. s. 2. np. john. john. john. walks. walks.

Bottom Up parsing. Bottom-up parsing. Steps in a shift-reduce parse. 1. s. 2. np. john. john. john. walks. walks. Paring Technologie Outline Paring Technologie Outline Bottom Up paring Paring Technologie Paring Technologie Bottom-up paring Step in a hift-reduce pare top-down: try to grow a tree down from a category

More information

Touring a Sequence of Polygons

Touring a Sequence of Polygons Touring a Sequence of Polygon Mohe Dror (1) Alon Efrat (1) Anna Lubiw (2) Joe Mitchell (3) (1) Univerity of Arizona (2) Univerity of Waterloo (3) Stony Brook Univerity Problem: Given a equence of k polygon

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

Multicast with Network Coding in Application-Layer Overlay Networks

Multicast with Network Coding in Application-Layer Overlay Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

Lecture 17: Shortest Paths

Lecture 17: Shortest Paths Lecture 7: Shortet Path CSE 373: Data Structure and Algorithm CSE 373 9 WI - KASEY CHAMPION Adminitrivia How to Ace the Technical Interview Seion today! - 6-8pm - Sieg 34 No BS CS Career Talk Thurday -

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

Algorithms. AVL Tree

Algorithms. AVL Tree Algorithms AVL Tree Balanced binary tree The disadvantage of a binary search tree is that its height can be as large as N-1 This means that the time needed to perform insertion and deletion and many other

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

KS3 Maths Assessment Objectives

KS3 Maths Assessment Objectives KS3 Math Aement Objective Tranition Stage 9 Ratio & Proportion Probabilit y & Statitic Appreciate the infinite nature of the et of integer, real and rational number Can interpret fraction and percentage

More information

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling

More information

Now consider the following situation after deleting three elements from the queue...

Now consider the following situation after deleting three elements from the queue... Scheme of valuvation -1I Subject & Code : Data Structure and Application (15CS33) NOTE: ANSWER All FIVE QUESTIONS 1 Explain the diadvantage of linear queue and how it i olved in circular queue. Explain

More information

Optimal Gossip with Direct Addressing

Optimal Gossip with Direct Addressing Optimal Goip with Direct Addreing Bernhard Haeupler Microoft Reearch 1065 La Avenida, Mountain View Mountain View, CA 94043 haeupler@c.cmu.edu Dahlia Malkhi Microoft Reearch 1065 La Avenida, Mountain View

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

ADAM - A PROBLEM-ORIENTED SYMBOL PROCESSOR

ADAM - A PROBLEM-ORIENTED SYMBOL PROCESSOR ADAM - A PROBLEM-ORIENTED SYMBOL PROCESSOR A. P. Mullery and R. F. Schauer Thoma J. Waton Reearch Center International Buine Machine Corporation Yorktown Height, New York R. Rice International Buine Machine

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

Differentially Private Histogram Publication

Differentially Private Histogram Publication Differentially Private Hitogram Publication Jia Xu, Zhenjie Zhang, Xiaokui Xiao, Yin Yang, Ge Yu College of Information Science & Engineering, Northeatern Univerity, China xujia,yuge@ie.neu.edu.cn Advanced

More information

arxiv: v3 [cs.cg] 1 Oct 2018

arxiv: v3 [cs.cg] 1 Oct 2018 Improved Time-Space Trade-off for Computing Voronoi Diagram Bahareh Banyaady Matia Korman Wolfgang Mulzer André van Renen Marcel Roeloffzen Paul Seiferth Yannik Stein arxiv:1708.00814v3 [c.cg] 1 Oct 2018

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Region analysis and the polymorphic lambda calculus

Region analysis and the polymorphic lambda calculus Region analyi and the polymorphic lambda calculu Anindya Banerjee Steven Intitute of Technology ab@c.teven-tech.edu Nevin Heintze Bell Laboratorie nch@bell-lab.com Jon G. Riecke Bell Laboratorie riecke@bell-lab.com

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

Brief Announcement: Distributed 3/2-Approximation of the Diameter

Brief Announcement: Distributed 3/2-Approximation of the Diameter Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il

More information

Programmazione di sistemi multicore

Programmazione di sistemi multicore Programmazione di itemi multicore A.A. 2015-2016 LECTURE 9 IRENE FINOCCHI http://wwwuer.di.uniroma1.it/~inocchi/ More complex parallel pattern PARALLEL PREFIX PARALLEL SORTING PARALLEL MERGESORT PARALLEL

More information

Parallel MATLAB at FSU: Task Computing

Parallel MATLAB at FSU: Task Computing Parallel MATLAB at FSU: Tak John Burkardt Department of Scientific Florida State Univerity... 1:30-2:30 Thurday, 07 April 2011 499 Dirac Science Library... http://people.c.fu.edu/ jburkardt/preentation/...

More information

Optimal Peer-to-Peer Technique for Massive Content Distribution

Optimal Peer-to-Peer Technique for Massive Content Distribution 1 Optimal Peer-to-Peer Technique for Maive Content Ditribution Xiaoying Zheng, Chunglae Cho and Ye Xia Computer and Information Science and Engineering Department Univerity of Florida Email: {xiazheng,

More information

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult

More information

3-D Visualization of a Gene Regulatory Network: Stochastic Search for Layouts

3-D Visualization of a Gene Regulatory Network: Stochastic Search for Layouts 3-D Viualization of a Gene Regulatory Network: Stochatic Search for Layout Naoki Hooyama Department of Electronic Engineering, Univerity of Tokyo, Japan hooyama@iba.k.u-tokyo.ac.jp Abtract- In recent year,

More information

arxiv: v1 [math.co] 18 Jan 2019

arxiv: v1 [math.co] 18 Jan 2019 Anti-Ramey number of path in hypergraph Ran Gu 1, Jiaao Li 2 and Yongtang Shi 3 1 College of Science, Hohai Univerity, Nanjing, Jiangu Province 210098, P.R. China 2 School of Mathematical Science and LPMC

More information

Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images

Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images 2009 10th International Conference on Document Analyi and Recognition Uing Moue Feedback in Computer Aited Trancription of Handwritten Text Image Verónica Romero, Alejandro H. Toelli, Enrique Vidal Intituto

More information

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Priority Queues / Heaps Date: 9/27/17

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Priority Queues / Heaps Date: 9/27/17 01.433/33 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Priority Queues / Heaps Date: 9/2/1.1 Introduction In this lecture we ll talk about a useful abstraction, priority queues, which are

More information

Uninformed Search Complexity. Informed Search. Search Revisited. Day 2/3 of Search

Uninformed Search Complexity. Informed Search. Search Revisited. Day 2/3 of Search Informed Search ay 2/3 of Search hap. 4, Ruel & Norvig FS IFS US PFS MEM FS IS Uninformed Search omplexity N = Total number of tate = verage number of ucceor (branching factor) L = Length for tart to goal

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

IMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE

IMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE Nuclear Mathematical and Computational Science: A Century in Review, A Century Anew Gatlinburg, Tenneee, April 6-, 003, on CD-ROM, American Nuclear Society, LaGrange Park, IL (003) IMPLEMENTATION OF CHORD

More information

Exploring Simple Grid Polygons

Exploring Simple Grid Polygons Exploring Simple Grid Polygon Chritian Icking 1, Tom Kamphan 2, Rolf Klein 2, and Elmar Langetepe 2 1 Univerity of Hagen, Praktiche Informatik VI, 58084 Hagen, Germany. 2 Univerity of Bonn, Computer Science

More information

Define the red- black tree properties Describe and implement rotations Implement red- black tree insertion

Define the red- black tree properties Describe and implement rotations Implement red- black tree insertion Red black trees Define the red- black tree properties Describe and implement rotations Implement red- black tree insertion We will skip red- black tree deletion October 2004 John Edgar 2 Items can be inserted

More information

Representations and Transformations. Objectives

Representations and Transformations. Objectives Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element

More information

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations: Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital

More information

Floating Point CORDIC Based Power Operation

Floating Point CORDIC Based Power Operation Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,

More information

Dynamic Access Binary Search Trees

Dynamic Access Binary Search Trees Dynamic Access Binary Search Trees 1 * are self-adjusting binary search trees in which the shape of the tree is changed based upon the accesses performed upon the elements. When an element of a splay tree

More information