Trees in java.util. A set is an object that stores unique elements In Java, two implementations are available:
|
|
- Nigel Lambert
- 5 years ago
- Views:
Transcription
1 Trees in java.util A set is an object that stores unique elements In Java, two implementations are available: The class HashSet implements the set with a hash table and a hash function The class TreeSet, which keeps elements of a set in a sorted order Data Structures and Algorithms in Java 1
2 Trees in java.util (continued) Figure 3-32 Methods of the class TreeSet Data Structures and Algorithms in Java 2
3 Trees in java.util (continued) Figure 3-32 Methods of the class TreeSet (continued) Data Structures and Algorithms in Java 3
4 Trees in java.util (continued) Figure 3-32 Methods of the class TreeSet (continued) Data Structures and Algorithms in Java 4
5 Trees in java.util (continued) Figure 3-32 Methods of the class TreeSet (continued) Data Structures and Algorithms in Java 5
6 Trees in java.util (continued) Figure 3-32 Methods of the class TreeSet (continued) Data Structures and Algorithms in Java 6
7 Trees in java.util (continued) Figure 7-33 An example of application of the TreeSet methods Data Structures and Algorithms in Java 7
8 Trees in java.util (continued) Figure 7-33 An example of application of the TreeSet methods (continued) Data Structures and Algorithms in Java 8
9 Trees in java.util (continued) Figure 7-33 An example of application of the TreeSet methods (continued) Data Structures and Algorithms in Java 9
10 Trees in java.util (continued) Figure 7-33 An example of application of the TreeSet methods (continued) Data Structures and Algorithms in Java 10
11 Trees in java.util (continued) Figure 7-33 An example of application of the TreeSet methods (continued) Data Structures and Algorithms in Java 11
12 Trees in java.util (continued) Figure 7-33 An example of application of the TreeSet methods (continued) Data Structures and Algorithms in Java 12
13 Trees in java.util (continued) Figure 7-33 An example of application of the TreeSet methods (continued) Data Structures and Algorithms in Java 13
14 Trees in java.util (continued) Figure 7-33 An example of application of the TreeSet methods (continued) Data Structures and Algorithms in Java 14
15 TreeMap Maps are tables that can be indexed with any type of data Maps use keys that are used as indexes and elements (values) to be accessed through the keys Keys in maps are unique in that one key is associated with one value only Tree maps implement maps store pairs (key, value) called entries that can be operated on by methods specified in the interface Map.Entry Data Structures and Algorithms in Java 15
16 TreeMap (continued) Figure 7-34 (a) Methods in the interface Map.Entry; (b) methods of the class TreeMap Data Structures and Algorithms in Java 16
17 TreeMap (continued) Figure 7-34 (a) Methods in the interface Map.Entry; (b) methods of the class TreeMap (continued) Data Structures and Algorithms in Java 17
18 TreeMap (continued) Figure 7-34 (a) Methods in the interface Map.Entry; (b) methods of the class TreeMap (continued) Data Structures and Algorithms in Java 18
19 TreeMap (continued) Figure 7-34 (a) Methods in the interface Map.Entry; (b) methods of the class TreeMap (continued) Data Structures and Algorithms in Java 19
20 TreeMap (continued) Figure 7-34 (a) Methods in the interface Map.Entry; (b) methods of the class TreeMap (continued) Data Structures and Algorithms in Java 20
21 TreeMap (continued) Figure 7-35 An example of application of the TreeMap methods. The class PersonByName is the same as in Figure Data Structures and Algorithms in Java 21
22 TreeMap (continued) Figure 7-35 An example of application of the TreeMap methods (continued) Data Structures and Algorithms in Java 22
23 Tries A tree that uses parts of the key to navigate the search is called a trie Each key is a sequence of characters; a trie is organized around these characters rather than entire keys Data Structures and Algorithms in Java 23
24 Tries (continued) Figure 7-36 A trie of some words composed of the five letters A, E, I, R, and P Data Structures and Algorithms in Java 24
25 Tries (continued) Figure 7-37 The trie in Figure 7.36 with all unused reference fields removed Data Structures and Algorithms in Java 25
26 Tries (continued) Figure 7-38 The trie from Figure 7.37 implemented as a binary tree Data Structures and Algorithms in Java 26
27 Tries (continued) Figure 7-39 A part of a trie (a) before and (b) after compression using the compresstrie() algorithm and (c) after compressing it in an optimal way Data Structures and Algorithms in Java 27
28 Tries (continued) Figure 7-39 A part of a trie (a) before and (b) after compression using the compresstrie() algorithm and (c) after compressing it in an optimal way (continued) Data Structures and Algorithms in Java 28
29 Tries (continued) Figure 7-40 A fragment of the C-trie representation of the trie from Figure 7-36 Data Structures and Algorithms in Java 29
30 Case Study: Spell Checker Figure 7-41 An implementation of a trie that uses pseudoflexible arrays. The trie has the same words as the trie in Figure Data Structures and Algorithms in Java 30
31 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries Data Structures and Algorithms in Java 31
32 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 32
33 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 33
34 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 34
35 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 35
36 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 36
37 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 37
38 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 38
39 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 39
40 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 40
41 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 41
42 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 42
43 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 43
44 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 44
45 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 45
46 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 46
47 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 47
48 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 48
49 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 49
50 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 50
51 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 51
52 Case Study: Spell Checker (continued) Figure 7-42 Implementation of a spell checker using tries (continued) Data Structures and Algorithms in Java 52
53 Summary B + -trees are commonly used in the implementation of indexes in today s relational databases Seek time depends on the mechanical movement of the disk head to position the head at the correct track of the disk Latency is the time required to position the head above the correct block and is equal to the time needed to make one-half of a revolution Data Structures and Algorithms in Java 53
54 Summary (continued) In a B*-tree, all nodes except the root are required to be at least two-thirds full, not just half full as in a B-tree A simple prefix B + -tree is a B + -tree in which the chosen separators are the shortest prefixes that allow us to distinguish two neighboring index keys A set is an object that stores unique elements. Maps are tables that can be indexed with any type of data Data Structures and Algorithms in Java 54
55 Summary (continued) The bit-tree is based on the concept of a distinction bit (D-bit) A variant of B-trees, 2 4 trees, is useful in processing information in memory A tree that uses parts of the key to navigate the search is called a trie Data Structures and Algorithms in Java 55
R16 SET - 1 '' ''' '' ''' Code No: R
1. a) Define Latency time and Transmission time? (2M) b) Define Hash table and Hash function? (2M) c) Explain the Binary Heap Structure Property? (3M) d) List the properties of Red-Black trees? (3M) e)
More informationAdvanced Tree Data Structures
Advanced Tree Data Structures Fawzi Emad Chau-Wen Tseng Department of Computer Science University of Maryland, College Park Binary trees Traversal order Balance Rotation Multi-way trees Search Insert Overview
More informationCPS222 Lecture: Sets. 1. Projectable of random maze creation example 2. Handout of union/find code from program that does this
CPS222 Lecture: Sets Objectives: last revised April 16, 2015 1. To introduce representations for sets that can be used for various problems a. Array or list of members b. Map-based representation c. Bit
More informationSchool of Computing and Information Sciences. Course Title: Data Structures Date: 3/30/2010 Course Number: COP 3530 Number of Credits: 3
Course Title: Date: 3/30/2010 Course Number: Number of Credits: 3 Subject Area: Programming Subject Area Coordinator: Tim Downey email: downeyt@cis.fiu.edu Catalog Description: Basic concepts of data organization,
More informationCS 310: Maps and Sets and Trees
CS 310: Maps and Sets and Trees Chris Kauman Week 8-2 Logistics Oce hours Wednesday normal: 4:30-5:30pm Thursday 2-3pm special oce hours Reading Weiss Ch. 6 (Java Library Classes/Interfaces) 6.7 Sets,
More informationLecture 7 February 26, 2010
6.85: Advanced Data Structures Spring Prof. Andre Schulz Lecture 7 February 6, Scribe: Mark Chen Overview In this lecture, we consider the string matching problem - finding all places in a text where some
More informationAP Computer Science 4325
4325 Instructional Unit Algorithm Design Techniques -divide-and-conquer The students will be -Decide whether an algorithm -classroom discussion -backtracking able to classify uses divide-and-conquer, -worksheets
More informationECE697AA Lecture 20. Forwarding Tables
ECE697AA Lecture 20 Routers: Prefix Lookup Algorithms Tilman Wolf Department of Electrical and Computer Engineering 11/14/08 Forwarding Tables Routing protocols involve a lot of information Path choices,
More informationNAME: c. (true or false) The median is always stored at the root of a binary search tree.
EE 322C Spring 2009 (Chase) Exam 2: READ THIS FIRST. Please use the back side of each page for scratch paper. For some of the questions you may need to think quite a bit before you write down an answer.
More informationLe L c e t c ur u e e 8 To T p o i p c i s c t o o b e b e co c v o e v r e ed e Collections
Course Name: Advanced Java Lecture 8 Topics to be covered Collections Introduction A collection, sometimes called a container, is simply an object that groups multiple elements into a single unit. Collections
More informationCollections Questions
Collections Questions https://www.journaldev.com/1330/java-collections-interview-questions-and-answers https://www.baeldung.com/java-collections-interview-questions https://www.javatpoint.com/java-collections-interview-questions
More informationTopics for CSCI 151 Final Exam Wednesday, May 10
Topics for CSCI 151 Final Exam Wednesday, May 10 Java and Programming Techniques Types Inheritance Generics Abstract classes and interfaces Exceptions Recursion Writing recursive methods Dynamic Programming
More informationDatabase Technology. Topic 7: Data Structures for Databases. Olaf Hartig.
Topic 7: Data Structures for Databases Olaf Hartig olaf.hartig@liu.se Database System 2 Storage Hierarchy Traditional Storage Hierarchy CPU Cache memory Main memory Primary storage Disk Tape Secondary
More informationSets and Maps. Part of the Collections Framework
Sets and Maps Part of the Collections Framework The Set interface A Set is unordered and has no duplicates Operations are exactly those for Collection int size( ); boolean isempty( ); boolean contains(object
More informationIndexing and Searching
Indexing and Searching Introduction How to retrieval information? A simple alternative is to search the whole text sequentially Another option is to build data structures over the text (called indices)
More informationCSC 1351: Final. The code compiles, but when it runs it throws a ArrayIndexOutOfBoundsException
VERSION A CSC 1351: Final Name: 1 Interfaces, Classes and Inheritance 2 Basic Data Types (arrays, lists, stacks, queues, trees,...) 2.1 Does the following code compile? If it does not, how can it be fixed?
More informationFinal Examination CSE 100 UCSD (Practice)
Final Examination UCSD (Practice) RULES: 1. Don t start the exam until the instructor says to. 2. This is a closed-book, closed-notes, no-calculator exam. Don t refer to any materials other than the exam
More informationThe Bucharest University of Economic Studies. Data Structures. Heap Priority Queues Maps and Sets
The Bucharest University of Economic Studies Data Structures Heap Priority Queues Maps and Sets Heap A heap is a specialized tree-based data structure that satisfies the property: if A is parent for B
More informationString Matching. Pedro Ribeiro 2016/2017 DCC/FCUP. Pedro Ribeiro (DCC/FCUP) String Matching 2016/ / 42
String Matching Pedro Ribeiro DCC/FCUP 2016/2017 Pedro Ribeiro (DCC/FCUP) String Matching 2016/2017 1 / 42 On this lecture The String Matching Problem Naive Algorithm Deterministic Finite Automata Knuth-Morris-Pratt
More informationTRIE BASED METHODS FOR STRING SIMILARTIY JOINS
TRIE BASED METHODS FOR STRING SIMILARTIY JOINS Venkat Charan Varma Buddharaju #10498995 Department of Computer and Information Science University of MIssissippi ENGR-654 INFORMATION SYSTEM PRINCIPLES RESEARCH
More informationINTRODUCTION TO DATA AND PROCEDURE
INTRODUCTION TO DATA AND PROCEDURE In this book, our goal is to understand computation. In particular, we want to be able to take any computational problem and produce a technique for solving it that is
More informationChapter 12 Digital Search Structures
Chapter Digital Search Structures Digital Search Trees Binary Tries and Patricia Multiway Tries C-C Tsai P. Digital Search Tree A digital search tree is a binary tree in which each node contains one element.
More informationSince it is an interface, we need a concrete class during its declaration. There are many ways to initialize a Queue object, most common being-
Laboratory 2 Data Structures-II Implementation of Daa structures using Collection frame work Obecjective Data Structures. A data structure is a particular way of storing and organizing data in a computer
More informationCONTAİNERS COLLECTİONS
CONTAİNERS Some programs create too many objects and deal with them. In such a program, it is not feasible to declare a separate variable to hold reference to each of these objects. The proper way of keeping
More information13 A: External Algorithms II; Disjoint Sets; Java API Support
13 A: External Algorithms II; ; Java API Support Martin Henz April 15, 2009 Generated on Friday 13 17 A: th External April, 2009, Algorithms 12:37 II; ; Java API Support 1 1 External Sorting 2 3 4 13 A:
More informationInverted Indexes. Indexing and Searching, Modern Information Retrieval, Addison Wesley, 2010 p. 5
Inverted Indexes Indexing and Searching, Modern Information Retrieval, Addison Wesley, 2010 p. 5 Basic Concepts Inverted index: a word-oriented mechanism for indexing a text collection to speed up the
More informationToday: Secondary Storage! Typical Disk Parameters!
Today: Secondary Storage! To read or write a disk block: Seek: (latency) position head over a track/cylinder. The seek time depends on how fast the hardware moves the arm. Rotational delay: (latency) time
More informationA Secondary storage Algorithms and Data Structures Supplementary Questions and Exercises
308-420A Secondary storage Algorithms and Data Structures Supplementary Questions and Exercises Section 1.2 4, Logarithmic Files Logarithmic Files 1. A B-tree of height 6 contains 170,000 nodes with an
More informationSamples of Evidence to Satisfy the AP Computer Science AB Curricular Requirements
Samples of Evidence to Satisfy the AP Computer Science AB Curricular Requirements What s here? This table presents samples of evidence that address the curricular requirements for AP Computer Science AB.
More informationAbstract Data Types Data Structure Grand Tour Java Collections.
Abstract Data Types Data Structure Grand Tour Java Collections http://gcc.gnu.org/onlinedocs/libstdc++/images/pbds_different_underlying_dss_1.png Stacks and Queues Hopefully you have met with your partner
More informationCS 310: Maps and Sets
CS 310: Maps and Sets Chris Kauffman Week 9-1 Logistics Goals Today HW2 Discussion Maps and Sets HW2 Discussion Milestones due Thu 7/6 Discuss AdditiveList Iterator Implementation O(1) Undo/Redo Reading
More informationFriday Four Square! 4:15PM, Outside Gates
Binary Search Trees Friday Four Square! 4:15PM, Outside Gates Implementing Set On Monday and Wednesday, we saw how to implement the Map and Lexicon, respectively. Let's now turn our attention to the Set.
More informationCOS 226 Midterm Exam, Spring 2009
NAME: login ID: precept: COS 226 Midterm Exam, Spring 2009 This test is 10 questions, weighted as indicated. The exam is closed book, except that you are allowed to use a one page cheatsheet. No calculators
More informationChapter 5 Hashing. Introduction. Hashing. Hashing Functions. hashing performs basic operations, such as insertion,
Introduction Chapter 5 Hashing hashing performs basic operations, such as insertion, deletion, and finds in average time 2 Hashing a hash table is merely an of some fixed size hashing converts into locations
More informationChapter 10 Collections
Chapter 10 Collections I. Scott MacKenzie 1 Outline 2 1 What is a Collection? A collection is an aggregation with a variable number of components, or elements Examples Portfolio - a collection of Investment
More information1 Introduciton. 2 Tries /651: Algorithms CMU, Spring Lecturer: Danny Sleator
15-451/651: Algorithms CMU, Spring 2015 Lecture #25: Suffix Trees April 22, 2015 (Earth Day) Lecturer: Danny Sleator Outline: Suffix Trees definition properties (i.e. O(n) space) applications Suffix Arrays
More informationSets and Maps. Sets Maps The Comparator Interface Sets and Maps in Java Collections API. Review for Exam Reading:
Sets and Maps Sets Maps The Comparator Interface Sets and Maps in Java Collections API TreeSet TreeMap Review for Exam Reading: 13.1-13.6 Sets A set is a collection of elements with no duplicates We had
More informationPublic-Service Announcement
Public-Service Announcement From ΣΠ Fall 2016 Pledge Class: Rise of the Machines: The Automation Revolution. 9 November 2016 in Chevron Auditorium. With cars beginning to drive themselves, homes getting
More informationJava Collections. Readings and References. Collections Framework. Java 2 Collections. References. CSE 403, Winter 2003 Software Engineering
Readings and References Java Collections References» "Collections", Java tutorial» http://java.sun.com/docs/books/tutorial/collections/index.html CSE 403, Winter 2003 Software Engineering http://www.cs.washington.edu/education/courses/403/03wi/
More informationDarshan Institute of Engineering & Technology
What is File? A file is a collection of records where a record consists of one or more fields. Each contains the same sequence of fields. Each field is normally of fixed length. A sample file with four
More informationAbstract Data Types Data Structure Grand Tour Java Collections.
Abstract Data Types Data Structure Grand Tour Java Collections http://gcc.gnu.org/onlinedocs/libstdc++/images/pbds_different_underlying_dss_1.png } Stacks and Queues Ideally, you have met with your partner
More informationJava Collections. Readings and References. Collections Framework. Java 2 Collections. CSE 403, Spring 2004 Software Engineering
Readings and References Java Collections "Collections", Java tutorial http://java.sun.com/docs/books/tutorial/collections/index.html CSE 403, Spring 2004 Software Engineering http://www.cs.washington.edu/education/courses/403/04sp/
More informationComputational Applications in Nuclear Astrophysics using Java Java course Lecture 6
Computational Applications in Nuclear Astrophysics using Java Java course Lecture 6 Prepared for course 160410/411 Michael C. Kunkel m.kunkel@fz-juelich.de Materials taken from; docs.oracle.com Teach Yourself
More informationPhysical Level of Databases: B+-Trees
Physical Level of Databases: B+-Trees Adnan YAZICI Computer Engineering Department METU (Fall 2005) 1 B + -Tree Index Files l Disadvantage of indexed-sequential files: performance degrades as file grows,
More informationMidterm Review. Congestion Mgt, CIDR addresses,tcp processing, TCP close. Routing. hierarchical networks. Routing with OSPF, IS-IS, BGP-4
Midterm Review Week 1 Congestion Mgt, CIDR addresses,tcp processing, TCP close Week 2 Routing. hierarchical networks Week 3 Routing with OSPF, IS-IS, BGP-4 Week 4 IBGP, Prefix lookup, Tries, Non-stop routers,
More informationStoring Data: Disks and Files
Storing Data: Disks and Files Yea, from the table of my memory I ll wipe away all trivial fond records. -- Shakespeare, Hamlet Data Access Disks and Files DBMS stores information on ( hard ) disks. This
More informationWhat are the differences between the Set interface and the List interface?
7.1.1 Explain the effect of the following method calls. Set s = new HashSet(); s.add("hello"); s.add("bye"); s.addall(s); Set t = new TreeSet(); t.add("123"); s.addall(t);
More informationCSCI 136 Data Structures & Advanced Programming. Lecture 12 Fall 2018 Profs Bill & Jon
CSCI 136 Data Structures & Advanced Programming Lecture 12 Fall 2018 Profs Bill & Jon Last Time Assertions SLL Improvements Tail pointers Circularly Linked Lists Doubly Linked Lists Practice with recursion
More informationRadix Searching. The insert procedure for digital search trees also derives directly from the corresponding procedure for binary search trees:
Radix Searching The most simple radix search method is digital tree searching - the binary search tree with the branch in the tree according to the bits of keys: at the first level the leading bit is used,
More informationImplementation. (Mapping to Java) Jörg Kienzle & Alfred Strohmeier. COMP-533 Implementation
Implementation (Mapping to Java) Jörg Kienzle & Alfred Strohmeier COMP-533 Implementation Datatype Enumeration Class Attribute Association Inheritance Method Visibility Collections Overview 2 Data Type
More informationData Structure. A way to store and organize data in order to support efficient insertions, queries, searches, updates, and deletions.
DATA STRUCTURES COMP 321 McGill University These slides are mainly compiled from the following resources. - Professor Jaehyun Park slides CS 97SI - Top-coder tutorials. - Programming Challenges book. Data
More informationAbstract Data Types Data Structure Grand Tour Java Collections.
Abstract Data Types Data Structure Grand Tour Java Collections http://gcc.gnu.org/onlinedocs/libstdc++/images/pbds_different_underlying_dss_1.png } Stacks and Queues Ideally, you have met with your partner
More informationSoftware 1 with Java. Recitation No. 6 (Collections)
Software 1 with Java Recitation No. 6 (Collections) Java Collections Framework Collection: a group of elements Interface Based Design: Java Collections Framework Interfaces Implementations Algorithms 2
More informationMidterm spring. CSC228H University of Toronto
Midterm 2002 - spring CSC228H University of Toronto Duration 50 minutes Aids Allowed: none. No calculators. Student Number: Last Name: First Name: Instructor: TA: Do not turn this page until you have received
More informationIntroduction. hashing performs basic operations, such as insertion, better than other ADTs we ve seen so far
Chapter 5 Hashing 2 Introduction hashing performs basic operations, such as insertion, deletion, and finds in average time better than other ADTs we ve seen so far 3 Hashing a hash table is merely an hashing
More informationSoftware 1 with Java. Java Collections Framework. Collection Interfaces. Online Resources. The Collection Interface
Java Collections Framework Collection: a group of elements Based Design: Software 1 with Java Java Collections Framework s s Algorithms Recitation No. 6 (Collections) 2 Collection s Online Resources Collection
More informationObject-Oriented Programming with Java
Object-Oriented Programming with Java Recitation No. 2 Oranit Dror The String Class Represents a character string (e.g. "Hi") Explicit constructor: String quote = "Hello World"; string literal All string
More informationBalanced Trees Part One
Balanced Trees Part One Balanced Trees Balanced search trees are among the most useful and versatile data structures. Many programming languages ship with a balanced tree library. C++: std::map / std::set
More informationCSE 143. Lecture 28: Hashing
CSE 143 Lecture 28: Hashing SearchTree as a set We implemented a class SearchTree to store a BST of ints: Our BST is essentially a set of integers. Operations we support: add contains remove... -3 overallroot
More informationText search. CSE 392, Computers Playing Jeopardy!, Fall
Text search CSE 392, Computers Playing Jeopardy!, Fall 2011 Stony Brook University http://www.cs.stonybrook.edu/~cse392 1 Today 2 parts: theoretical: costs of searching substrings, data structures for
More informationAdam Blank Lecture 5 Winter 2019 CS 2. Introduction to Programming Methods
Adam Blank Lecture 5 Winter 2019 CS 2 Introduction to Programming Methods CS 2: Introduction to Programming Methods Java Collections Abstract Data Types (ADT) 1 Abstract Data Type An abstract data type
More informationCOS 226 Algorithms and Data Structures Fall Final Solutions. 10. Remark: this is essentially the same question from the midterm.
COS 226 Algorithms and Data Structures Fall 2011 Final Solutions 1 Analysis of algorithms (a) T (N) = 1 10 N 5/3 When N increases by a factor of 8, the memory usage increases by a factor of 32 Thus, T
More information58093 String Processing Algorithms. Lectures, Autumn 2013, period II
58093 String Processing Algorithms Lectures, Autumn 2013, period II Juha Kärkkäinen 1 Contents 0. Introduction 1. Sets of strings Search trees, string sorting, binary search 2. Exact string matching Finding
More informationHash table basics mod 83 ate. ate
Hash table basics After today, you should be able to explain how hash tables perform insertion in amortized O(1) time given enough space ate hashcode() 82 83 84 48594983 mod 83 ate Topics: weeks 1-6 Reading,
More informationBinary Search Tree (2A) Young Won Lim 5/17/18
Binary Search Tree (2A) Copyright (c) 2015-2018 Young W. Lim. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or
More informationCS 216 Fall 2007 Final Exam Page 1 of 10 Name: ID:
Page 1 of 10 Name: Email ID: You MUST write your name and e-mail ID on EACH page and bubble in your userid at the bottom of EACH page including this page. If you do not do this, you will receive a zero
More informationHashing for searching
Hashing for searching Consider searching a database of records on a given key. There are three standard techniques: Searching sequentially start at the first record and look at each record in turn until
More informationJava Data Structures Collections Framework BY ASIF AHMED CSI-211 (OBJECT ORIENTED PROGRAMMING)
Java Data Structures Collections Framework BY ASIF AHMED CSI-211 (OBJECT ORIENTED PROGRAMMING) What is a Data Structure? Introduction A data structure is a particular way of organizing data using one or
More informationChapter 5 Java Collection. Wang Yang
Chapter 5 Java Collection Wang Yang wyang@njnet.edu.cn Outline Last Chapter Review Array & Arrays Tourism Collection & Collections Map Performance benchmark Last Chapter Review Exception Exception is an
More informationMessage Switch. Processor(s) 0* 1 100* 6 1* 2 Forwarding Table
Recent Results in Best Matching Prex George Varghese October 16, 2001 Router Model InputLink i 100100 B2 Message Switch B3 OutputLink 6 100100 Processor(s) B1 Prefix Output Link 0* 1 100* 6 1* 2 Forwarding
More informationToday. Book-keeping. Exceptions. Subscribe to sipb-iap-java-students. Collections. Play with problem set 1
Today Book-keeping Exceptions Subscribe to sipb-iap-java-students Collections http://sipb.mit.edu/iap/java/ Play with problem set 1 No class Monday (MLK); happy Hunting Problem set 2 on Tuesday 1 2 So
More informationChange in Schedule. I'm changing the schedule around a bit...
Graphs Announcements() { Change in Schedule I'm changing the schedule around a bit... Today: Graphs Tuesday: Shortest Path Algorithms Wednesday: Minimum Spanning Trees Tursday: Review Session for Midterm
More informationThe Collections API. Lecture Objectives. The Collections API. Mark Allen Weiss
The Collections API Mark Allen Weiss Lecture Objectives To learn how to use the Collections package in Java 1.2. To illustrate features of Java that help (and hurt) the design of the Collections API. Tuesday,
More informationCS61B Spring 2016 Guerrilla Section 6 Worksheet
Spring 2016 5 May 2016 Directions: In groups of 4-5, work on the following exercises. Do not proceed to the next exercise until everyone in your group has the answer and understands why the answer is what
More informationData Structures - CSCI 102. CS102 Hash Tables. Prof. Tejada. Copyright Sheila Tejada
CS102 Hash Tables Prof. Tejada 1 Vectors, Linked Lists, Stack, Queues, Deques Can t provide fast insertion/removal and fast lookup at the same time The Limitations of Data Structure Binary Search Trees,
More informationData Structures and Methods. Johan Bollen Old Dominion University Department of Computer Science
Data Structures and Methods Johan Bollen Old Dominion University Department of Computer Science jbollen@cs.odu.edu http://www.cs.odu.edu/ jbollen January 20, 2004 Page 1 Lecture Objectives 1. To this point:
More informationEECE.4810/EECE.5730: Operating Systems Spring 2017
EECE.4810/EECE.5730: Operating Systems Spring 2017 1. (16 points) Storage devices Final Exam Solution Assume you have a magnetic hard disk with tracks numbered from 0-127, track 0 being the outermost track.
More informationCSC 321: Data Structures. Fall 2017
CSC : Data Structures Fall 7 Hash tables HashSet & HashMap hash table, hash function collisions Ø linear probing, lazy deletion, clustering, rehashing Ø chaining Java hashcode method HW6: finite state
More informationFile Management By : Kaushik Vaghani
File Management By : Kaushik Vaghani File Concept Access Methods File Types File Operations Directory Structure File-System Structure File Management Directory Implementation (Linear List, Hash Table)
More informationDATA STRUCTURES AND PROBLEM SOLVING USING JAVA
DATA STRUCTURES AND PROBLEM SOLVING USING JAVA Second Edition MARK ALLEN WEISS Florida International University Addison Wesley Boston San Francisco New York London Toronto Sydney Tokyo Singapore Madrid
More informationPredecessor Data Structures. Philip Bille
Predecessor Data Structures Philip Bille Outline Predecessor problem First tradeoffs Simple tries x-fast tries y-fast tries Predecessor Problem Predecessor Problem The predecessor problem: Maintain a set
More informationFinal Exam Solutions
COS 226 FINAL SOLUTIONS, FALL 214 1 COS 226 Algorithms and Data Structures Fall 214 Final Exam Solutions 1. Digraph traversal. (a) 8 5 6 1 4 2 3 (b) 4 2 3 1 5 6 8 2. Analysis of algorithms. (a) N (b) log
More informationModule 4: Tree-Structured Indexing
Module 4: Tree-Structured Indexing Module Outline 4.1 B + trees 4.2 Structure of B + trees 4.3 Operations on B + trees 4.4 Extensions 4.5 Generalized Access Path 4.6 ORACLE Clusters Web Forms Transaction
More informationPredecessor. Predecessor Problem van Emde Boas Tries. Philip Bille
Predecessor Predecessor Problem van Emde Boas Tries Philip Bille Predecessor Predecessor Problem van Emde Boas Tries Predecessors Predecessor problem. Maintain a set S U = {,..., u-} supporting predecessor(x):
More informationTECHNICAL WHITEPAPER. Performance Evaluation Java Collections Framework. Performance Evaluation Java Collections. Technical Whitepaper.
Performance Evaluation Java Collections Framework TECHNICAL WHITEPAPER Author: Kapil Viren Ahuja Date: October 17, 2008 Table of Contents 1 Introduction...3 1.1 Scope of this document...3 1.2 Intended
More informationData Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi.
Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture 18 Tries Today we are going to be talking about another data
More informationA simple map: Hashtable
Using Maps A simple map: Hashtable To create a Hashtable, use: import java.util.*; Hashtable table = new Hashtable(); To put things into a Hashtable, use: table.put(key, value); To retrieve a value from
More informationRecursion. Chapter 7. Copyright 2012 by Pearson Education, Inc. All rights reserved
Recursion Chapter 7 Contents What Is Recursion? Tracing a Recursive Method Recursive Methods That Return a Value Recursively Processing an Array Recursively Processing a Linked Chain The Time Efficiency
More informationFile System Implementation. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University
File System Implementation Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Implementing a File System On-disk structures How does file system represent
More informationClass Libraries. Readings and References. Java fundamentals. Java class libraries and data structures. Reading. Other References
Reading Readings and References Class Libraries CSE 142, Summer 2002 Computer Programming 1 Other References» The Java tutorial» http://java.sun.com/docs/books/tutorial/ http://www.cs.washington.edu/education/courses/142/02su/
More informationFaster Sorting Methods
Faster Sorting Methods Chapter 9 Contents Merge Sort Merging Arrays Recursive Merge Sort The Efficiency of Merge Sort Iterative Merge Sort Merge Sort in the Java Class Library Contents Quick Sort The Efficiency
More informationCSE 237B Fall 2009 Virtualization, Security and RTOS. Rajesh Gupta Computer Science and Engineering University of California, San Diego.
CSE 237B Fall 2009 Virtualization, Security and RTOS Rajesh Gupta Computer Science and Engineering University of California, San Diego. Overview What is virtualization? Types of virtualization and VMs
More informationEBSCOhost Web 6.0. User s Guide EBS 2065
EBSCOhost Web 6.0 User s Guide EBS 2065 6/26/2002 2 Table Of Contents Objectives:...4 What is EBSCOhost...5 System Requirements... 5 Choosing Databases to Search...5 Using the Toolbar...6 Using the Utility
More informationCache-Oblivious String Dictionaries
Cache-Oblivious String Dictionaries Gerth Stølting Brodal University of Aarhus Joint work with Rolf Fagerberg #"! Outline of Talk Cache-oblivious model Basic cache-oblivious techniques Cache-oblivious
More informationDUKE UNIVERSITY Department of Computer Science. Test 2: CompSci 100
DUKE UNIVERSITY Department of Computer Science Test 2: CompSci 100 Name (print): Community Standard acknowledgment (signature): Problem 1 value 14 pts. grade Problem 2 9 pts. Problem 3 7 pts. Problem 4
More informationScalable Name-Based Packet Forwarding: From Millions to Billions. Tian Song, Beijing Institute of Technology
Scalable Name-Based Packet Forwarding: From Millions to Billions Tian Song, songtian@bit.edu.cn, Beijing Institute of Technology Haowei Yuan, Patrick Crowley, Washington University Beichuan Zhang, The
More informationFinancial Tracking Service Tutorial: Using Data Search
Tutorial: 2 of 27 TABLE OF CONTENTS What is data Search? 3 1.Search Page 4 2. Search Options 5 3. Year(s) 6 4. Search Terms 7 5. Get the Data 10 6. Viewing the Data Results 11 7. Flows (the data) 12 8.
More informationApplied Databases. Sebastian Maneth. Lecture 14 Indexed String Search, Suffix Trees. University of Edinburgh - March 9th, 2017
Applied Databases Lecture 14 Indexed String Search, Suffix Trees Sebastian Maneth University of Edinburgh - March 9th, 2017 2 Recap: Morris-Pratt (1970) Given Pattern P, Text T, find all occurrences of
More informationObjec&ves. Packages Collec&ons Generics. Sept 28, 2016 Sprenkle - CSCI209 1
Objec&ves Packages Collec&ons Generics Sept 28, 2016 Sprenkle - CSCI209 1 PACKAGES Sept 28, 2016 Sprenkle - CSCI209 2 Packages Hierarchical structure of Java classes Ø Directories of directories java lang
More informationThe Berkeley File System. The Original File System. Background. Why is the bandwidth low?
The Berkeley File System The Original File System Background The original UNIX file system was implemented on a PDP-11. All data transports used 512 byte blocks. File system I/O was buffered by the kernel.
More information