STRUCTURE EXITS, NOT LOOPS
|
|
- Kelley King
- 6 years ago
- Views:
Transcription
1 STRUCTURE EXITS, NOT LOOPS Mordechai Ben-Ari Department of Science Teaching Weizmann Institute of Science Rehovot Israel Copyright c 1996 by the Association for Computing Machinery, Inc. ABSTRACT Until recently, Pascal was the first programming language taught to students. As more schools choose Ada or C++ as a first language, the debate on structured programming has been reopened ([Rob95]). We are no longer restricted to the while-statement: exit/break-statements can be used to exit a loop from the middle, and return from a procedure or function is allowed within a loop statement. Do these constructs violate the principle of structure programming? This article claims that more general loop constructs can be objectively justified, because they simplify the verification of programs. A program that is simple to verify is also easy to explain and understand. INTRODUCTION In his paper at the 1995 SIGCSE Symposium [Rob95], Eric Roberts re-examines the subject of language constructs for loops. He claims that loops need not be restricted to constructs that exit at the ning (or end) of the loop; a program can be well-structured even if: a break-statement is used to exit from the middle of the loop, or a return-statement is used both to exit the loop and to return from a function. Roberts analysis is based on stylistic grounds, namely that forcing loops into while-statements or repeat-statements, as required by Pascal, can make the program unnatural or unnecessarily complex. This paper supports Roberts conclusions, but for different reasons. We claim that the objective criterion that should be used to compare programs is the simplicity of the assertions required for verification. This claim is independent of the decision of a lecturer or a textbook author to discuss verification. Programs that have simple formal proofs will have simple informal proofs. WHERE TO EXIT A LOOP Where should we place the exit point of a loop? Actually, it doesn t matter. Any loop will have an invariant and an exit condition. There is no a-priori reason to suppose that an exit at the start of the loop is better than an exit from the middle. Furthermore, there is no a-priori reason to suppose that understanding (i.e. reasoning about) two simple exit conditions is more complex than understanding a single exit with a compound condition. Teachers of Pascal in local high schools claim that the while-statement is very difficult to teach, and we conjecture that the identification of the loop entry with the loop exit is one source of the difficultly. Another is that while-loops are unnatural in ordinary speech. Compare the following two sentences: While you haven t reached Central Ave., drive straight. Drive straight; exit when you reach Central Ave. Thus it would probably be better to teach a neutral construct such as the Ada loop-statement with an arbitrary exit:
2 loop... exit when... ;... Then the loop concept can be taught independently of the exit concept. In the following sections, we survey some elementary algorithms and show how arbitrary, but elementary, exits lead to programs that are easier to reason about than classical while-loops. The program fragments are written in Ada, but they can easily be translated into other languages like C++. VERIFICATION OF LOOPS My introduction to program verification was from Zohar Manna s textbook [Man74]. Manna introduces verification techniques first on flowchart programs, and only then in the form of Hoare triples {Pre}Program{Post} on structured programs. It is probably not coincidental that many of the flowchart programs in the text and exercises presumably chosen to be relatively easy to verify contain exits from within the loops, rather than from their ning or end. Consider problem 3.6 from (page 227) which is a naive program for deciding if a number is prime. We translated the flowchart program to use an exit-statement: 1 {X 2} while Y X loop exit when X mod Y = 0; Prime := Y = X; {Prime i(1 < i < X (X mod i 0)} The loop invariant is simply: i(1 < i < Y (X mod i 0) and the informal explanation of the algorithm is: Each time around the loop, check that the next number does not divide X. 1 Read the postcondition as: the value of the (Boolean) variable Prime is true, if and only if, for all i such that i is between 1 and X, X mod i 0. To prove the invariant we simply note that for an execution of the body of the loop, if the exit is skipped, X mod Y 0, and Y is increased by 1. To prove the postcondition, we have to check two cases: You exit the loop because Y = X, which implies that i(1 < i < X (X mod i 0) is true. You exit the loop from X mod Y = 0 for Y < X, in which case i(1 < i < X (X mod i 0) is false. The use of a while-statement requires a compound condition: while (X Y) and (X mod Y /= 0) loop The compound condition combines two separate conditions: X mod Y 0, which is essential in proving the invariant, and X < Y which is relevant only upon termination. A standard way of simplifying compound conditions is to use a flag or state variable: {X 2} Prime := True; while Prime and (Y X) loop if X mod Y = 0 then Prime := False; else {Prime i(1 < i < Y (X mod i 0)} This I regard as unacceptable since the invariant is no longer a simple predicate, but an equivalence: Prime ( i(1 < i < Y (X mod i 0)) To prove the equivalence you must prove four, rather than two, verification conditions. The variable Prime can be either true or false, and the condition (X mod i 0) can be either true or false. Corresponding to each formal verification condition is an informal argument that must be explained. Actually, the whole discussion is moot because you don t even need the extra exit. Since X necessarily divides itself, there is no reason to check an additional exit condition: 2
3 {X 2} while X mod Y /= 0 loop Prime := Y = X; {Prime i(1 < i < Y (X mod i 0)} SENTINELS The prime number algorithm demonstrates that the best way to solve the dilemma between additional loop exits and compound Boolean conditions is simply to avoid it by using sentinels. The classic linear search problem becomes trivial even with limited control structures: type IntList is array(0..max) of Integer; I: Integer := Max; List(0) := Key; while L(I) /= Key loop I := I - 1; return I; The loop invariant is simply: J (I < J Max List(J ) Key) The advantages of a using sentinel are: The algorithm is simple because there is only one exit with an elementary condition. Verification is simple because the partial correctness expressed by the loop invariant is separated from the termination condition. The algorithm is more efficient. Sentinels are a very general programming paradigm and should be learned as early as possible. In particular, when students are later introduced to list processing, sentinels can be used to avoid compound conditions that check for null pointers. Roberts use of the linear search problem to justify break ing a loop in the middle is somewhat surprising. Over twenty years ago in his goto-paper [Knu74], Knuth justifies the use of goto in a linear search using arguments similar to Roberts, but immediately adds (p. 267): Unfortunately, however, the example is totally unconvincing in spite of the arguments I ve stated so far, because the method in Example 1 is almost never a good way to search an array for x! According to Knuth, the better way to search an array is, of course, to use a sentinel. With sentinels one is not subject to the numerous bugs that can occur when trying to program linear search, especially if indices are limited to subranges. Thus it is all the more interesting that popular introductory programming texts like [Coo93] and [Kof92] do not even mention sentinels (except as indicators of the end of a sequence of input data). In a high-school course under development at this department, sentinel search is taught as the primary technique, while flags are only later introduced to demonstrate programming with Boolean variables. I observed a class of ordinary, not excellent, students learning the material. They easily understood the sentinel search, but found the compound condition with a flag to be quite difficult. A NOTE ON return There is nothing wrong with using more than one return-statement, or with using the statement within a loop. A subprogram exists solely to establish its postcondition. Once the postcondition is established, there is no reason to remain within the subprogram. Using linear search again: 2 for I in List Range loop if L(I) = Key then return I; 2 In this section, the index of the array type is 1..Max. 3
4 return 0; The postcondition is: (List(I) = Key) ((I = 0) J (1 J Max (List(J ) Key)) and it is trivial to see that the first part is established by return I, while the other part follows immediately from the invariant. A situation is more dramatic in the binary search algorithm. Sedgewick (p. 198) uses a repeat-statement with a compound condition, followed by an ifstatement to distinguish among the cases! But once we have established the required postcondition, there is no reason to tarry within the function: Low: Integer := List First; High: Integer := List Last; Mid: Integer; loop Mid := (Low + High) / 2; if Key = A(Mid) then return Mid; elsif Key A(Mid) then High := Mid - 1; else Low := Mid + 1; if Low High then return 0; Each return-statement establishes part of the postcondition. AN ADVANCED EXAMPLE Even in advanced courses, it pays to search for elementary exit conditions, rather than to insist on structured loops. One example is the representation of a heap by an array, which can be used to develop heapsort a sort algorithm which is O(n log n) even in the worst case. In the representation, array elements 2i and 2i + 1 hold the children of element i. Heap algorithms create and maintain the heap property: every node is larger than its two children. We will not go into the algorithm in detail (see [Man74], [Wir76], [Sed88], [CLR90]). The first three texts give iterative versions of the algorithm which use a second exit from the middle of the loop of the Siftup procedure. The procedure is very difficult to understand and its correctness proof [Lon70] is complex. The source of the complexity (of both the algorithm and its proof) is an optimization designed to cascade exchanges of elements. If we remove the optimization, a loop with one exit (in the middle!) is obtained, as shown by the following program which is an iterative version of the recursive program in [CLR90]: loop L := 2*I; R := 2*I+1; if L = Max and A(L) A(I) then Large := L; else Large := I; if R = Max and A(R) A(Large) then Large := R; exit when Large = I; Swap(A(I), A(Large)); I := Large; The program computes which of the two children holds the largest value, stores its index into Large, and exits if neither child is larger than its parent. The loop invariant is: A is a permutation of the original array and the heap property holds everywhere except possibly at i. The complex computation of the exit condition gives the algorithm the form of a loop-and-a-half. Despite the exit from within the loop, this form of program and its proof are relatively easy to understand. CONCLUSION The point of structured programming is to create programs that are easy to understand and easy to verify. The term should not be associated with a particular language construct such as the while-statement. We have shown that the simplicity of loop exit conditions is an excellent criterion that can be used to decide if a program is structured. This is also a justification for including formal verification in the undergraduate 4
5 computer science curriculum: it furnishes the student with an objective tool for judging the quality of programs. REFERENCES [CLR90] Thomas H. Cormen, Charles E. Leiserson, and Ronald L. Rivest. Introduction to Algorithms. MIT Press, Cambridge, MA, [Coo93] Doug Cooper. Oh! Pascal! (Third Edition). W.W. Norton, New York, [Knu74] Donald E. Knuth. Structured programming with go to statements. Computing Surveys, 6(4): , December [Kof92] Eliot B. Koffman. Pascal: Problem Solving and Program Design (Fourth Edition). Addison- Wesley, Reading, MA, [Lon70] Ralph L. London. Certification of algorithm 245: Treesort 3. Communications of the ACM, 13(6): , June [Man74] Zohar Manna. Mathematical Theory of Computation. McGraw-Hill, New York, [Rob95] Eric S. Roberts. Loop exits and structured programming: Reopening the debate. In Twenty- Sixth SIGCSE Technical Symposium, pages , [Sed88] Robert Sedgewick. Algorithms (Second Edition). Addison-Wesley, Reading, MA, [Wir76] Niklaus Wirth. Algorithms + Data Structures = Programs. Prentice-Hall, Englewood Cliffs, NJ,
Plan of the lecture. Quick-Sort. Partition of lists (or using extra workspace) Quick-Sort ( 10.2) Quick-Sort Tree. Partitioning arrays
Plan of the lecture Quick-sort Lower bounds on comparison sorting Correctness of programs (loop invariants) Quick-Sort 7 4 9 6 2 2 4 6 7 9 4 2 2 4 7 9 7 9 2 2 9 9 Lecture 16 1 Lecture 16 2 Quick-Sort (
More informationCS3110 Spring 2017 Lecture 18: Binary Search Trees
CS3110 Spring 2017 Lecture 18: Binary Search Trees Robert Constable Date for Due Date PS5 Out on April 10 April 24 PS6 Out on April 24 May 8 (day of last lecture) 1 Summarizing Computational Geometry In
More informationarxiv: v3 [cs.ds] 18 Apr 2011
A tight bound on the worst-case number of comparisons for Floyd s heap construction algorithm Ioannis K. Paparrizos School of Computer and Communication Sciences Ècole Polytechnique Fèdèrale de Lausanne
More informationCS2 Algorithms and Data Structures Note 1
CS2 Algorithms and Data Structures Note 1 Analysing Algorithms This thread of the course is concerned with the design and analysis of good algorithms and data structures. Intuitively speaking, an algorithm
More informationOutline. Computer Science 331. Desirable Properties of Hash Functions. What is a Hash Function? Hash Functions. Mike Jacobson.
Outline Computer Science 331 Mike Jacobson Department of Computer Science University of Calgary Lecture #20 1 Definition Desirable Property: Easily Computed 2 3 Universal Hashing 4 References Mike Jacobson
More information12/30/2013 S. NALINI,AP/CSE
12/30/2013 S. NALINI,AP/CSE 1 UNIT I ITERATIVE AND RECURSIVE ALGORITHMS Iterative Algorithms: Measures of Progress and Loop Invariants-Paradigm Shift: Sequence of Actions versus Sequence of Assertions-
More informationarxiv: v3 [cs.ds] 3 Apr 2018
arxiv:1711.07746v3 [cs.ds] 3 Apr 2018 The Hidden Binary Search Tree: A Balanced Rotation-Free Search Tree in the AVL RAM Model Saulo Queiroz Email: sauloqueiroz@utfpr.edu.br Academic Department of Informatics
More informationLecture C8: Trees part II 3 C 2 A 4 D. Response to 'Muddiest Part of the Lecture Cards' (16 respondents)
Lecture C8: Trees part II Response to 'Muddiest Part of the Lecture Cards' (16 respondents) 1) Is the tree in the Depth first example actually a tree? (It has 6 vertices and 8 edges a tree has N verticed
More informationVISUALIZING NP-COMPLETENESS THROUGH CIRCUIT-BASED WIDGETS
University of Portland Pilot Scholars Engineering Faculty Publications and Presentations Shiley School of Engineering 2016 VISUALIZING NP-COMPLETENESS THROUGH CIRCUIT-BASED WIDGETS Steven R. Vegdahl University
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 7, July ISSN
International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-201 971 Comparative Performance Analysis Of Sorting Algorithms Abhinav Yadav, Dr. Sanjeev Bansal Abstract Sorting Algorithms
More informationHow invariants help writing loops Author: Sander Kooijmans Document version: 1.0
How invariants help writing loops Author: Sander Kooijmans Document version: 1.0 Why this document? Did you ever feel frustrated because of a nasty bug in your code? Did you spend hours looking at the
More informationLecture 6 Sorting and Searching
Lecture 6 Sorting and Searching Sorting takes an unordered collection and makes it an ordered one. 1 2 3 4 5 6 77 42 35 12 101 5 1 2 3 4 5 6 5 12 35 42 77 101 There are many algorithms for sorting a list
More informationA Partial Correctness Proof for Programs with Decided Specifications
Applied Mathematics & Information Sciences 1(2)(2007), 195-202 An International Journal c 2007 Dixie W Publishing Corporation, U. S. A. A Partial Correctness Proof for Programs with Decided Specifications
More informationUse of Tree-based Algorithms for Internal Sorting
Use of Tree-based s for Internal Sorting P. Y. Padhye (puru@deakin.edu.au) School of Computing and Mathematics Deakin University Geelong, Victoria 3217 Abstract Most of the large number of internal sorting
More information/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Priority Queues / Heaps Date: 9/27/17
01.433/33 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Priority Queues / Heaps Date: 9/2/1.1 Introduction In this lecture we ll talk about a useful abstraction, priority queues, which are
More informationHardware versus software
Logic 1 Hardware versus software 2 In hardware such as chip design or architecture, designs are usually proven to be correct using proof tools In software, a program is very rarely proved correct Why?
More informationCOMP6700/2140 Recursive Operations
COMP6700/2140 Recursive Operations Alexei B Khorev and Josh Milthorpe Research School of Computer Science, ANU May 2017 Alexei B Khorev and Josh Milthorpe (RSCS, ANU) COMP6700/2140 Recursive Operations
More informationAdvanced Algorithms and Data Structures
Advanced Algorithms and Data Structures Prof. Tapio Elomaa Course Basics A new 7 credit unit course Replaces OHJ-2156 Analysis of Algorithms We take things a bit further than OHJ-2156 We will assume familiarity
More informationOutline. Definition. 2 Height-Balance. 3 Searches. 4 Rotations. 5 Insertion. 6 Deletions. 7 Reference. 1 Every node is either red or black.
Outline 1 Definition Computer Science 331 Red-Black rees Mike Jacobson Department of Computer Science University of Calgary Lectures #20-22 2 Height-Balance 3 Searches 4 Rotations 5 s: Main Case 6 Partial
More informationLecture 1 Contracts. 1 A Mysterious Program : Principles of Imperative Computation (Spring 2018) Frank Pfenning
Lecture 1 Contracts 15-122: Principles of Imperative Computation (Spring 2018) Frank Pfenning In these notes we review contracts, which we use to collectively denote function contracts, loop invariants,
More informationLecture 15 Binary Search Trees
Lecture 15 Binary Search Trees 15-122: Principles of Imperative Computation (Fall 2017) Frank Pfenning, André Platzer, Rob Simmons, Iliano Cervesato In this lecture, we will continue considering ways to
More informationLast time. Reasoning about programs. Coming up. Project Final Presentations. This Thursday, Nov 30: 4 th in-class exercise
Last time Reasoning about programs Coming up This Thursday, Nov 30: 4 th in-class exercise sign up for group on moodle bring laptop to class Final projects: final project presentations: Tue Dec 12, in
More informationReasoning about programs
Reasoning about programs Last time Coming up This Thursday, Nov 30: 4 th in-class exercise sign up for group on moodle bring laptop to class Final projects: final project presentations: Tue Dec 12, in
More informationLecture 1. Introduction
Lecture 1 Introduction 1 Lecture Contents 1. What is an algorithm? 2. Fundamentals of Algorithmic Problem Solving 3. Important Problem Types 4. Fundamental Data Structures 2 1. What is an Algorithm? Algorithm
More informationIntroduction to Axiomatic Semantics
Introduction to Axiomatic Semantics Meeting 10, CSCI 5535, Spring 2009 Announcements Homework 3 due tonight Homework 2 is graded 13 (mean), 14 (median), out of 21 total, but Graduate class: final project
More informationSemantics via Syntax. f (4) = if define f (x) =2 x + 55.
1 Semantics via Syntax The specification of a programming language starts with its syntax. As every programmer knows, the syntax of a language comes in the shape of a variant of a BNF (Backus-Naur Form)
More informationCS 157: Assignment 5
Problem : Printing Neatly CS 157: Assignment 5 Douglas R. Lanman 4 April 006 In a word processor or in L A TEX, one routinely encounters the pretty printing problem. That is, how does one transform text
More informationPosition Sort. Anuj Kumar Developer PINGA Solution Pvt. Ltd. Noida, India ABSTRACT. Keywords 1. INTRODUCTION 2. METHODS AND MATERIALS
Position Sort International Journal of Computer Applications (0975 8887) Anuj Kumar Developer PINGA Solution Pvt. Ltd. Noida, India Mamta Former IT Faculty Ghaziabad, India ABSTRACT Computer science has
More informationLecture 1 Contracts : Principles of Imperative Computation (Fall 2018) Frank Pfenning
Lecture 1 Contracts 15-122: Principles of Imperative Computation (Fall 2018) Frank Pfenning In these notes we review contracts, which we use to collectively denote function contracts, loop invariants,
More informatione-pg PATHSHALA- Computer Science Design and Analysis of Algorithms Module 10
e-pg PATHSHALA- Computer Science Design and Analysis of Algorithms Module 10 Component-I (B) Description of Module Items Subject Name Computer Science Description of Module Paper Name Module Name/Title
More informationHEAPS ON HEAPS* Downloaded 02/04/13 to Redistribution subject to SIAM license or copyright; see
SIAM J. COMPUT. Vol. 15, No. 4, November 1986 (C) 1986 Society for Industrial and Applied Mathematics OO6 HEAPS ON HEAPS* GASTON H. GONNET" AND J. IAN MUNRO," Abstract. As part of a study of the general
More information7. Sorting I. 7.1 Simple Sorting. Problem. Algorithm: IsSorted(A) 1 i j n. Simple Sorting
Simple Sorting 7. Sorting I 7.1 Simple Sorting Selection Sort, Insertion Sort, Bubblesort [Ottman/Widmayer, Kap. 2.1, Cormen et al, Kap. 2.1, 2.2, Exercise 2.2-2, Problem 2-2 19 197 Problem Algorithm:
More informationHow much space does this routine use in the worst case for a given n? public static void use_space(int n) { int b; int [] A;
How much space does this routine use in the worst case for a given n? public static void use_space(int n) { int b; int [] A; } if (n
More informationby Steve Legenhausen Technical Report 73006
QUICKSORT : A TUTORIAL by Steve Legenhausen Technical Report 73006 University Computer Center University of Minnesota 227 Experimental Engineering Minneapolis, Minnesota 55455 1 INTRODUCTION Several recent
More informationBeyond Counting. Owen Kaser. September 17, 2014
Beyond Counting Owen Kaser September 17, 2014 1 Introduction Combinatorial objects such as permutations and combinations are frequently studied from a counting perspective. For instance, How many distinct
More informationHoare logic. A proof system for separation logic. Introduction. Separation logic
Introduction Hoare logic Lecture 6: Examples in separation logic In the previous lecture, we saw how reasoning about pointers in Hoare logic was problematic, which motivated introducing separation logic.
More informationReasoning About Imperative Programs. COS 441 Slides 10
Reasoning About Imperative Programs COS 441 Slides 10 The last few weeks Agenda reasoning about functional programming It s very simple and very uniform: substitution of equal expressions for equal expressions
More informationlecture notes September 2, How to sort?
.30 lecture notes September 2, 203 How to sort? Lecturer: Michel Goemans The task of sorting. Setup Suppose we have n objects that we need to sort according to some ordering. These could be integers or
More informationLecture 15 Notes Binary Search Trees
Lecture 15 Notes Binary Search Trees 15-122: Principles of Imperative Computation (Spring 2016) Frank Pfenning, André Platzer, Rob Simmons 1 Introduction In this lecture, we will continue considering ways
More informationThe p-sized partitioning algorithm for fast computation of factorials of numbers
J Supercomput (2006) 38:73 82 DOI 10.1007/s11227-006-7285-5 The p-sized partitioning algorithm for fast computation of factorials of numbers Ahmet Ugur Henry Thompson C Science + Business Media, LLC 2006
More informationDATA STRUCTURES/UNIT 3
UNIT III SORTING AND SEARCHING 9 General Background Exchange sorts Selection and Tree Sorting Insertion Sorts Merge and Radix Sorts Basic Search Techniques Tree Searching General Search Trees- Hashing.
More informationSmart Sort and its Analysis
Smart Sort and its Analysis Varun Jain and Suneeta Agarwal Department of Computer Science and Engineering, Motilal Nehru National Institute of Technology, Allahabad-211004, Uttar Pradesh, India. varun_jain22@yahoo.com,
More informationHeap Order Property: Key stored at the parent is smaller or equal to the key stored at either child.
A Binary Heap is a data structure that is an array object that can be viewed as a nearly complete binary tree. The tree is completely filled on all levels except the lowest, which may only be partially
More informationAn Annotated Language
Hoare Logic An Annotated Language State and Semantics Expressions are interpreted as functions from states to the corresponding domain of interpretation Operators have the obvious interpretation Free of
More informationHomework 2 CS161 Computer Security, Spring 2008 Assigned 2/13/08 Due 2/25/08
Homework 2 CS161 Computer Security, Spring 2008 Assigned 2/13/08 Due 2/25/08 1. Signatures and Attacks Recall that to use the ElGamal signature scheme, Alice randomly selects her private signing key x
More informationChapter 7. - FORTRAN I control statements were based directly on IBM 704 hardware
Levels of Control Flow: 1. Within expressions 2. Among program units 3. Among program statements Evolution: - FORTRAN I control statements were based directly on IBM 704 hardware - Much research and argument
More informationLecture 6 Binary Search
Lecture 6 Binary Search 15-122: Principles of Imperative Computation (Spring 2018) Frank Pfenning One of the fundamental and recurring problems in computer science is to find elements in collections, such
More informationSemantics. There is no single widely acceptable notation or formalism for describing semantics Operational Semantics
There is no single widely acceptable notation or formalism for describing semantics Operational Describe the meaning of a program by executing its statements on a machine, either simulated or actual. The
More informationCOS 226 Midterm Exam, Spring 2009
NAME: login ID: precept: COS 226 Midterm Exam, Spring 2009 This test is 10 questions, weighted as indicated. The exam is closed book, except that you are allowed to use a one page cheatsheet. No calculators
More informationMulti-Paradigm Approach for Teaching Programming
Multi-Paradigm Approach for Teaching Laxmi P Gewali* and John T Minor School of Computer Science University of Nevada, Las Vegas 4505 Maryland Parkway, Las Vegas Nevada 89154 Abstract: Selecting an appropriate
More informationAlgorithms in Systems Engineering ISE 172. Lecture 16. Dr. Ted Ralphs
Algorithms in Systems Engineering ISE 172 Lecture 16 Dr. Ted Ralphs ISE 172 Lecture 16 1 References for Today s Lecture Required reading Sections 6.5-6.7 References CLRS Chapter 22 R. Sedgewick, Algorithms
More informationAlgorithms and Data Structures, or
Algorithms and Data Structures, or... Classical Algorithms of the 50s, 60s and 70s Mary Cryan A&DS Lecture 1 1 Mary Cryan Our focus Emphasis is Algorithms ( Data Structures less important). Most of the
More informationExam I Principles of Imperative Computation, Summer 2011 William Lovas. May 27, 2011
Exam I 15-122 Principles of Imperative Computation, Summer 2011 William Lovas May 27, 2011 Name: Sample Solution Andrew ID: wlovas Instructions This exam is closed-book with one sheet of notes permitted.
More informationLecture Notes for Chapter 2: Getting Started
Instant download and all chapters Instructor's Manual Introduction To Algorithms 2nd Edition Thomas H. Cormen, Clara Lee, Erica Lin https://testbankdata.com/download/instructors-manual-introduction-algorithms-2ndedition-thomas-h-cormen-clara-lee-erica-lin/
More informationBasic Data Structures and Heaps
Basic Data Structures and Heaps David Kauchak Sorting demo (http://math.hws.edu/tmcm/java/xsortlab/) Data structures What is a data structure? Way of storing data that facilitates particular operations.
More informationLecture 6: Arithmetic and Threshold Circuits
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Advanced Course on Computational Complexity Lecture 6: Arithmetic and Threshold Circuits David Mix Barrington and Alexis Maciel July
More informationComputational Optimization ISE 407. Lecture 16. Dr. Ted Ralphs
Computational Optimization ISE 407 Lecture 16 Dr. Ted Ralphs ISE 407 Lecture 16 1 References for Today s Lecture Required reading Sections 6.5-6.7 References CLRS Chapter 22 R. Sedgewick, Algorithms in
More informationCS 241 Analysis of Algorithms
CS 241 Analysis of Algorithms Professor Eric Aaron Lecture T Th 9:00am Lecture Meeting Location: OLB 205 Business HW4 out Due Tuesday, Nov. 5 For when should we schedule a make-up lecture? Exam: Tuesday
More informationCSE 3101: Introduction to the Design and Analysis of Algorithms. Office hours: Wed 4-6 pm (CSEB 3043), or by appointment.
CSE 3101: Introduction to the Design and Analysis of Algorithms Instructor: Suprakash Datta (datta[at]cse.yorku.ca) ext 77875 Lectures: Tues, BC 215, 7 10 PM Office hours: Wed 4-6 pm (CSEB 3043), or by
More informationVISUAL BASIC COLLECTIONS
VISUAL BASIC COLLECTIONS AND HASH TABLES Tom Niemann Preface Hash tables offer a method for quickly storing and accessing data based on a key value. When you access a Visual Basic collection using a key,
More informationCS134 Spring 2005 Final Exam Mon. June. 20, 2005 Signature: Question # Out Of Marks Marker Total
CS134 Spring 2005 Final Exam Mon. June. 20, 2005 Please check your tutorial (TUT) section from the list below: TUT 101: F 11:30, MC 4042 TUT 102: M 10:30, MC 4042 TUT 103: M 11:30, MC 4058 TUT 104: F 10:30,
More informationCSE 214 Computer Science II Searching
CSE 214 Computer Science II Searching Fall 2017 Stony Brook University Instructor: Shebuti Rayana shebuti.rayana@stonybrook.edu http://www3.cs.stonybrook.edu/~cse214/sec02/ Introduction Searching in a
More informationMain Goal. Language-independent program verification framework. Derive program properties from operational semantics
Main Goal Language-independent program verification framework Derive program properties from operational semantics Questions: Is it possible? Is it practical? Answers: Sound and complete proof system,
More information2. introducing switches that will be used only to affect control flow (and, thus, do not contain data from the original program)
A Case for Teaching Multi-exit Loops to Beginning Programmers P. A. Buhr Dept. of Computer Science, University of Waterloo, Waterloo, Ontario, Canada, N2L 3G1 Abstract While programming using the WHILE
More informationBiostatistics 615/815 Statistical Computing
Biostatistics 615/815 Statistical Computing Hyun Min Kang Januray 6th, 2011 Hyun Min Kang Biostatistics 615/815 - Lecture 1 Januray 6th, 2011 1 / 35 Objectives Understanding computational aspects of statistical
More informationCS2223: Algorithms Sorting Algorithms, Heap Sort, Linear-time sort, Median and Order Statistics
CS2223: Algorithms Sorting Algorithms, Heap Sort, Linear-time sort, Median and Order Statistics 1 Sorting 1.1 Problem Statement You are given a sequence of n numbers < a 1, a 2,..., a n >. You need to
More informationCIS 890: Safety Critical Systems
CIS 890: Safety Critical Systems Lecture: SPARK -- Analysis Tools Copyright 2007, John Hatcliff. The syllabus and all lectures for this course are copyrighted materials and may not be used in other course
More informationSorting L7.2 Recall linear search for an element in an array, which is O(n). The divide-and-conquer technique of binary search divides the array in ha
Lecture Notes on Sorting 15-122: Principles of Imperative Computation Frank Pfenning Lecture 7 February 1, 2011 1 Introduction We have seen in the last lecture that sorted arrays drastically reduce the
More informationAXIOMS OF AN IMPERATIVE LANGUAGE PARTIAL CORRECTNESS WEAK AND STRONG CONDITIONS. THE AXIOM FOR nop
AXIOMS OF AN IMPERATIVE LANGUAGE We will use the same language, with the same abstract syntax that we used for operational semantics. However, we will only be concerned with the commands, since the language
More informationLectures 20, 21: Axiomatic Semantics
Lectures 20, 21: Axiomatic Semantics Polyvios Pratikakis Computer Science Department, University of Crete Type Systems and Static Analysis Based on slides by George Necula Pratikakis (CSD) Axiomatic Semantics
More informationCS/ENGRD 2110 Object-Oriented Programming and Data Structures Spring 2012 Thorsten Joachims. Lecture 10: Asymptotic Complexity and
CS/ENGRD 2110 Object-Oriented Programming and Data Structures Spring 2012 Thorsten Joachims Lecture 10: Asymptotic Complexity and What Makes a Good Algorithm? Suppose you have two possible algorithms or
More information6. Hoare Logic and Weakest Preconditions
6. Hoare Logic and Weakest Preconditions Program Verification ETH Zurich, Spring Semester 07 Alexander J. Summers 30 Program Correctness There are many notions of correctness properties for a given program
More informationLecture Notes on Quicksort
Lecture Notes on Quicksort 15-122: Principles of Imperative Computation Frank Pfenning Lecture 8 February 5, 2015 1 Introduction In this lecture we consider two related algorithms for sorting that achieve
More informationSorting is a problem for which we can prove a non-trivial lower bound.
Sorting The sorting problem is defined as follows: Sorting: Given a list a with n elements possessing a total order, return a list with the same elements in non-decreasing order. Remember that total order
More informationKeywords: Binary Sort, Sorting, Efficient Algorithm, Sorting Algorithm, Sort Data.
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Efficient and
More informationAlgorithms and Data Structures
Algorithms and Data Structures or, Classical Algorithms of the 50s, 60s, 70s Richard Mayr Slides adapted from Mary Cryan (2015/16) with small changes. School of Informatics University of Edinburgh ADS
More informationAlgorithms. Algorithms 1.4 ANALYSIS OF ALGORITHMS
ROBERT SEDGEWICK KEVIN WAYNE Algorithms ROBERT SEDGEWICK KEVIN WAYNE 1.4 ANALYSIS OF ALGORITHMS Algorithms F O U R T H E D I T I O N http://algs4.cs.princeton.edu introduction observations mathematical
More informationLecture 2: Getting Started
Lecture 2: Getting Started Insertion Sort Our first algorithm is Insertion Sort Solves the sorting problem Input: A sequence of n numbers a 1, a 2,..., a n. Output: A permutation (reordering) a 1, a 2,...,
More information2 Proposed Implementation. 1 Introduction. Abstract. 2.1 Pseudocode of the Proposed Merge Procedure
Enhanced Merge Sort Using Simplified Transferrable Auxiliary Space Zirou Qiu, Ziping Liu, Xuesong Zhang Department of Computer Science Southeast Missouri State University Cape Girardeau, MO 63701 zqiu1s@semo.edu,
More informationLecture Notes on Contracts
Lecture Notes on Contracts 15-122: Principles of Imperative Computation Frank Pfenning Lecture 2 August 30, 2012 1 Introduction For an overview the course goals and the mechanics and schedule of the course,
More informationData Structures and Algorithms. Roberto Sebastiani
Data Structures and Algorithms Roberto Sebastiani roberto.sebastiani@disi.unitn.it http://www.disi.unitn.it/~rseba - Week 0 - B.S. In Applied Computer Science Free University of Bozen/Bolzano academic
More informationLecture Notes on Quicksort
Lecture Notes on Quicksort 15-122: Principles of Imperative Computation Frank Pfenning Lecture 8 September 20, 2012 1 Introduction In this lecture we first sketch two related algorithms for sorting that
More informationIntroduction to Algorithms I
Summer School on Algorithms and Optimization Organized by: ACM Unit, ISI and IEEE CEDA. Tutorial II Date: 05.07.017 Introduction to Algorithms I (Q1) A binary tree is a rooted tree in which each node has
More informationThe divide and conquer strategy has three basic parts. For a given problem of size n,
1 Divide & Conquer One strategy for designing efficient algorithms is the divide and conquer approach, which is also called, more simply, a recursive approach. The analysis of recursive algorithms often
More informationWhat is a Procedure?
2015-12-10 0 Question and Answers What is a Procedure? Eric C.R. Hehner Department of Computer Science, University of Toronto hehner@cs.utoronto.ca What is the meaning of a procedure? This question is
More informationAdvanced algorithms. binary heap, d-ary heap, binomial heap, amortized analysis, Fibonacci heap. Jiří Vyskočil, Radek Mařík 2013
binary heap, d-ary heap, binomial heap, amortized analysis, Fibonacci heap Jiří Vyskočil, Radek Mařík 2013 heap Heaps [haldy] a heap is a specialized data structure (usually tree-based) that satisfies
More informationExcerpt from "Art of Problem Solving Volume 1: the Basics" 2014 AoPS Inc.
Chapter 5 Using the Integers In spite of their being a rather restricted class of numbers, the integers have a lot of interesting properties and uses. Math which involves the properties of integers is
More informationAdvanced Algorithms and Data Structures
Advanced Algorithms and Data Structures Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Prerequisites A seven credit unit course Replaced OHJ-2156 Analysis of Algorithms We take things a bit further than
More informationarxiv: v1 [cs.ds] 3 Oct 2017
ORDERED DAGS: HYPERCUBESORT MIKHAIL GUDIM arxiv:70.00v [cs.ds] Oct 07 Abstract. We generalize the insertion into a binary heap to any directed acyclic graph (DAG) with one source vertex. This lets us formulate
More informationAN AGENT BASED INTELLIGENT TUTORING SYSTEM FOR PARAMETER PASSING IN JAVA PROGRAMMING
AN AGENT BASED INTELLIGENT TUTORING SYSTEM FOR PARAMETER PASSING IN JAVA PROGRAMMING 1 Samy Abu Naser 1 Associate Prof., Faculty of Engineering &Information Technology, Al-Azhar University, Gaza, Palestine
More informationCS 270 Algorithms. Oliver Kullmann. Binary search. Lists. Background: Pointers. Trees. Implementing rooted trees. Tutorial
Week 7 General remarks Arrays, lists, pointers and 1 2 3 We conclude elementary data structures by discussing and implementing arrays, lists, and trees. Background information on pointers is provided (for
More informationAlgorithms in Systems Engineering IE172. Midterm Review. Dr. Ted Ralphs
Algorithms in Systems Engineering IE172 Midterm Review Dr. Ted Ralphs IE172 Midterm Review 1 Textbook Sections Covered on Midterm Chapters 1-5 IE172 Review: Algorithms and Programming 2 Introduction to
More information8. Sorting II. 8.1 Heapsort. Heapsort. [Max-]Heap 6. Heapsort, Quicksort, Mergesort. Binary tree with the following properties Wurzel
Heapsort, Quicksort, Mergesort 8. Sorting II 8.1 Heapsort [Ottman/Widmayer, Kap. 2.3, Cormen et al, Kap. 6] 9 210 Heapsort [Max-]Heap 6 Binary tree with the following properties Wurzel Inspiration from
More informationTopic IV. Block-structured procedural languages Algol and Pascal. References:
References: Topic IV Block-structured procedural languages Algol and Pascal Chapters 5 and 7, of Concepts in programming languages by J. C. Mitchell. CUP, 2003. Chapters 10( 2) and 11( 1) of Programming
More informationASYMPTOTIC COMPLEXITY
Simplicity is a great virtue but it requires hard work to achieve it and education to appreciate it. And to make matters worse: complexity sells better. - Edsger Dijkstra ASYMPTOTIC COMPLEXITY Lecture
More informationChapter 3 (part 3) Describing Syntax and Semantics
Chapter 3 (part 3) Describing Syntax and Semantics Chapter 3 Topics Introduction The General Problem of Describing Syntax Formal Methods of Describing Syntax Attribute Grammars Describing the Meanings
More informationPrinciples of Algorithm Design
Principles of Algorithm Design When you are trying to design an algorithm or a data structure, it s often hard to see how to accomplish the task. The following techniques can often be useful: 1. Experiment
More informationA MULTI-DIMENSIONAL DATA ORGANIZATION THAT ASSISTS IN THE PARSING AND PRODUCTION OF A SENTENCE
A MULTI-DIMENSIONAL DATA ORGANIZATION THAT ASSISTS IN THE PARSING AND PRODUCTION OF A SENTENCE W. Faris and K. Cheng Department of Computer Science University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu
More informationWarm-Up Problem. 1. What is the definition of a Hoare triple satisfying partial correctness? 2. Recall the rule for assignment: x (assignment)
Warm-Up Problem 1 What is the definition of a Hoare triple satisfying partial correctness? 2 Recall the rule for assignment: x (assignment) Why is this the correct rule and not the following rule? x (assignment)
More informationASYMPTOTIC COMPLEXITY
Simplicity is a great virtue but it requires hard work to achieve it and education to appreciate it. And to make matters worse: complexity sells better. - Edsger Dijkstra ASYMPTOTIC COMPLEXITY Lecture
More information