ELEMENTARY SEARCH ALGORITHMS

Similar documents

cs2010: algorithms and data structures

3.1 Symbol Tables. API sequential search binary search ordered operations


Algorithms. Algorithms 3.1 SYMBOL TABLES. API elementary implementations ordered operations ROBERT SEDGEWICK KEVIN WAYNE

ELEMENTARY SEARCH ALGORITHMS

ELEMENTARY SEARCH ALGORITHMS

ELEMENTARY SEARCH ALGORITHMS

4.1 Symbol Tables. API sequential search binary search ordered operations. Symbol tables

Algorithms. Algorithms 3.1 SYMBOL TABLES. API elementary implementations ordered operations ROBERT SEDGEWICK KEVIN WAYNE


Symbol Tables 1 / 15

Elementary Symbol Tables


Symbol Table. IP address

Algorithms. Algorithms. Algorithms 3.1 SYMBOL TABLES. API elementary implementations ordered operations

4.4 Symbol Tables. Symbol Table. Symbol Table Applications. Symbol Table API

4.4 Symbol Tables and BSTs

! Insert a key with specified value. ! Given a key, search for the corresponding value. ! Insert URL with specified IP address.

4.4 Symbol Tables. Symbol Table. Symbol Table Applications. Symbol Table API

Algorithms. Algorithms. Algorithms. API elementary implementations. ordered operations. API elementary implementations. ordered operations

Algorithms. Algorithms. Algorithms. API elementary implementations. ordered operations API. elementary implementations. ordered operations

Algorithms. Algorithms. Algorithms 3.1 SYMBOL TABLES. API elementary implementations ordered operations

COMPUTER SCIENCE. 15. Symbol Tables. Section 4.4.

COMPUTER SCIENCE. Computer Science. 13. Symbol Tables. Computer Science. An Interdisciplinary Approach. Section 4.4.

CS.15.A.SymbolTables.API. Alice

Elementary Sorts. ! rules of the game! selection sort! insertion sort! sorting challenges! shellsort. Sorting problem

BINARY SEARCH TREES TODAY BBM ALGORITHMS DEPT. OF COMPUTER ENGINEERING. Binary Search Tree (BST) Binary search trees

BINARY SEARCH TREES BBM ALGORITHMS DEPT. OF COMPUTER ENGINEERING

Lecture 13: Binary Search Trees

4.4 Symbol Tables. Symbol Table. Symbol Table API. Symbol Table Applications

Elementary Sorts. rules of the game selection sort insertion sort sorting challenges shellsort. Sorting problem. Ex. Student record in a University.

CS2012 Programming Techniques II

Class Meeting #8 8 Puzzle. COS 226 Based in part ok slides by Jérémie Lumbroso and Kevin Wayne

Symbol Table. IP address

The class Object. Lecture CS1122 Summer 2008

3.2 BINARY SEARCH TREES. BSTs ordered operations iteration deletion. Algorithms ROBERT SEDGEWICK KEVIN WAYNE.

Algorithms. Algorithms 3.2 BINARY SEARCH TREES. BSTs ordered operations iteration deletion (see book or videos) ROBERT SEDGEWICK KEVIN WAYNE

Algorithms. Algorithms 3.4 HASH TABLES. hash functions separate chaining linear probing context ROBERT SEDGEWICK KEVIN WAYNE

Algorithms. Algorithms 3.2 BINARY SEARCH TREES. BSTs ordered operations deletion ROBERT SEDGEWICK KEVIN WAYNE.

For this section, we will implement a class with only non-static features, that represents a rectangle

4.2 Binary Search Trees

equals() in the class Object

! Insert a key with specified value. ! Given a key, search for the corresponding value. ! Insert URL with specified IP address.

Symbol Tables. API sequential search binary search applications challenges. Symbol tables

3.4 Hash Tables. hash functions separate chaining linear probing applications. Optimize judiciously

Creating an Immutable Class. Based on slides by Prof. Burton Ma

Lecture 16: Encapsulation and ADTs

3.4 Hash Tables. hash functions separate chaining linear probing applications

Algorithms. Algorithms 2.2 MERGESORT. mergesort bottom-up mergesort sorting complexity comparators stability ROBERT SEDGEWICK KEVIN WAYNE

CMSC 132, Object-Oriented Programming II Summer Lecture 13

Algorithms. Algorithms GEOMETRIC APPLICATIONS OF BSTS. 1d range search line segment intersection kd trees interval search trees rectangle intersection

Algorithms. Algorithms GEOMETRIC APPLICATIONS OF BSTS. 1d range search line segment intersection kd trees interval search trees rectangle intersection

Algorithms. Algorithms GEOMETRIC APPLICATIONS OF BSTS. 1d range search line segment intersection kd trees interval search trees rectangle intersection

Algorithms. Algorithms 2.2 MERGESORT. mergesort bottom-up mergesort sorting complexity comparators stability ROBERT SEDGEWICK KEVIN WAYNE

java.lang.object: Equality

Lecture 14: Binary Search Trees (2)

3.3: Encapsulation and ADTs

Algorithms 2.2 MERGESORT. mergesort bottom-up mergesort sorting complexity comparators stability

Chapter 11: Collections and Maps

Algorithms 2.2 MERGESORT. mergesort bottom-up mergesort sorting complexity comparators stability

Super-Classes and sub-classes

CSCI 135 Exam #1 Fundamentals of Computer Science I Fall 2012

2.1 Elementary Sorts

Outline. 1 Hashing. 2 Separate-Chaining Symbol Table 2 / 13

CSE 331 Software Design & Implementation

Methods Common to all Classes

CMSC 132, Object-Oriented Programming II Summer Lecture 5:

Sorting Applications 1 / 9

Running Time. Analytic Engine. Charles Babbage (1864) how many times do you have to turn the crank?

Algorithms 2.1 ELEMENTARY SORTS. rules of the game selection sort insertion sort shellsort shuffling convex hull

Algorithms GEOMETRIC APPLICATIONS OF BSTS. 1d range search line segment intersection kd trees interval search trees rectangle intersection

Expected properties of equality

Name Return type Argument list. Then the new method is said to override the old one. So, what is the objective of subclass?

Overloaded Methods. Sending Messages. Overloaded Constructors. Sending Parameters

CSE 331 Software Design & Implementation

4.1 Performance. Running Time. The Challenge. Scientific Method

Collections. Powered by Pentalog. by Vlad Costel Ungureanu for Learn Stuff

Algorithms. Algorithms 1.5 UNION-FIND. dynamic connectivity quick find quick union improvements applications ROBERT SEDGEWICK KEVIN WAYNE

CMSC 132: Object-Oriented Programming II. Hash Tables

Data abstractions: ADTs Invariants, Abstraction function. Lecture 4: OOP, autumn 2003

CSE 2123: Collections: Priority Queues. Jeremy Morris

(Refer Slide Time: 00:50)

Object-Oriented Programming in the Java language

! A negative integer if v is less than w. ! A positive integer if v is greater than w. ! Zero if v is equal to w.

Algorithms. Algorithms 2.1 ELEMENTARY SORTS. rules of the game selection sort insertion sort shuffling comparators ROBERT SEDGEWICK KEVIN WAYNE

3.5 Symbol Tables Applications

Outline. applications of hashing equality and comparisons in Java sorting selection sort bubble sort insertion sort

Programming Languages and Techniques (CIS120)

Algorithms 1.5 UNION FIND. dynamic connectivity quick find quick union improvements applications

Points off Total off Net Score. CS 314 Final Exam Spring 2016

MET08-J. Preserve the equality contract when overriding the equals() method

Algorithms 1.5 UNION FIND. dynamic connectivity quick find quick union improvements applications

Data Structures in Java

Algorithms. Algorithms GEOMETRIC APPLICATIONS OF BSTS. 1d range search kd trees line segment intersection interval search trees rectangle intersection

Introduction to Computing II (ITI 1121) Final Examination

Algorithms. Algorithms 2.1 ELEMENTARY SORTS. rules of the game selection sort insertion sort shellsort shuffling convex hull

Programming Languages and Techniques (CIS120)

4.5 Symbol Tables Applications

COS 126 Exam Review. Exams overview Example programming exam Example written exam questions (part 1)

Transcription:

BBM 202 - ALGORITHMS DEPT. OF COMPUTER ENGINEERING ELEMENTARY SEARCH ALGORITHMS Acknowledgement: The course slides are adapted from the slides prepared by R. Sedgewick and K. Wayne of Princeton University.

Symbol Tables API Elementary implementations Ordered operations TODAY

API Elementary implementations Ordered operations SYMBOL TABLES

Symbol tables Key-value pair abstraction. Insert a value with specified key. Given a key, search for the corresponding value. Ex. DNS lookup. Insert URL with specified IP address. Given URL, find corresponding IP address. URL IP address www.cs.princeton.edu 128.112.136.11 www.princeton.edu 128.112.128.15 www.yale.edu 130.132.143.21 www.harvard.edu 128.103.060.55 www.simpsons.com 209.052.165.60 key value 4

Symbol table applications application purpose of search key value dictionary find definition word definition book index find relevant pages term list of page numbers file share find song to download name of song computer ID financial account process transactions account number transaction details web search find relevant web pages keyword list of page names compiler find properties of variables variable name type and value routing table route Internet packets destination best route DNS find IP address given URL URL IP address reverse DNS find URL given IP address IP address URL genomics find markers DNA string known positions file system find file on disk filename location on disk 5

Basic symbol table API Associative array abstraction. Associate one value with each key. public class ST<Key, Value> ST() void put(key key, Value val) create a symbol table put key-value pair into the table (remove key from table if value is null) a[key] = val; Value get(key key) value paired with key (null if key is absent) void delete(key key) remove key (and its value) from table boolean contains(key key) is there a value paired with key? boolean isempty() is the table empty? int size() number of key-value pairs in the table a[key] Iterable<Key> keys() all the keys in the table API for a generic basic symbol table 6

Conventions Values are not null. Method get() returns null if key not present. Method put() overwrites old value with new value. Intended consequences. Easy to implement contains(). public boolean contains(key key) { return get(key)!= null; } Can implement lazy version of delete(). public void delete(key key) { put(key, null); } 7

Keys and values Value type. Any generic type. Key type: several natural assumptions. Assume keys are Comparable, use compareto(). Assume keys are any generic type, use equals() to test equality. Assume keys are any generic type, use equals() to test equality; use hashcode() to scramble key. built-in to Java (stay tuned) specify Comparable in API. Best practices. Use immutable types for symbol table keys. Immutable in Java: String, Integer, Double, java.io.file, Mutable in Java: StringBuilder, java.net.url, arrays,... 8

Equality test All Java classes inherit a method equals(). Java requirements. For any references x, y and z: Reflexive: x.equals(x) is true. Symmetric: x.equals(y) iff y.equals(x). Transitive: if x.equals(y) and y.equals(z), then x.equals(z). Non-null: x.equals(null) is false. do x and y refer to the same object? Default implementation. (x == y) Customized implementations. Integer, Double, String, File, URL, User-defined implementations. Some care needed. equivalence relation 9

Implementing equals for user-defined types Seems easy. public class Date implements Comparable<Date> { private final int month; private final int day; private final int year;... public boolean equals(date that) { } } if (this.day!= that.day ) return false; if (this.month!= that.month) return false; if (this.year!= that.year ) return false; return true; check that all significant fields are the same 10

Implementing equals for user-defined types Seems easy, but requires some care. public final class Date implements Comparable<Date> { private final int month; private final int day; private final int year;... Safer to use equals() with inheritance if fields in extending class contribute to equals() the symmetry violated must be Object. public boolean equals(object y) { if (y == this) return true; if (y == null) return false; if (y.getclass()!= this.getclass()) return false; optimize for true object equality check for null objects must be in the same class } } Date that = (Date) y; if (this.day!= that.day ) return false; if (this.month!= that.month) return false; if (this.year!= that.year ) return false; return true; cast is guaranteed to succeed check that all significant fields are the same 11

Equals design "Standard" recipe for user-defined types. Optimization for reference equality. Check against null. Check that two objects are of the same type and cast. Compare each significant field: - if field is a primitive type, use == - if field is an object, use equals() - if field is an array, apply to each entry apply rule recursively alternatively, use Arrays.equals(a, b) or Arrays.deepEquals(a, b), but not a.equals(b) Best practices. No need to use calculated fields that depend on other fields. Compare fields mostly likely to differ first. Only use necessary fields, e.g. a webpage is best defined by URL, not number of views. Make compareto() consistent with equals(). x.equals(y) if and only if (x.compareto(y) == 0) 12

ST test client for traces Build ST by associating value i with i th string from standard input. public static void main(string[] args) { ST<String, Integer> st = new ST<String, Integer>(); for (int i = 0;!StdIn.isEmpty(); i++) { String key = StdIn.readString(); st.put(key, i); } for (String s : st.keys()) StdOut.println(s + " " + st.get(s)); } The order of output depends on the underlying data structure! keys values S E A R C H E X A M P L E 0 1 2 3 4 5 6 7 8 9 10 11 12 output A 8 C 4 E 12 H 5 L 11 M 9 P 10 R 3 S 0 X 7 13

ST test client for analysis Frequency counter. Read a sequence of strings from standard input and print out one that occurs with highest frequency. % more tinytale.txt it was the best of times it was the worst of times it was the age of wisdom it was the age of foolishness it was the epoch of belief it was the epoch of incredulity it was the season of light it was the season of darkness it was the spring of hope it was the winter of despair % java FrequencyCounter 1 < tinytale.txt it 10 % java FrequencyCounter 8 < tale.txt business 122 % java FrequencyCounter 10 < leipzig1m.txt government 24763 tiny example (60 words, 20 distinct) real example (135,635 words, 10,769 distinct) real example (21,191,455 words, 534,580 distinct) 14

Frequency counter implementation public class FrequencyCounter { public static void main(string[] args) { int minlen = Integer.parseInt(args[0]); ST<String, Integer> st = new ST<String, Integer>(); while (!StdIn.isEmpty()) { String word = StdIn.readString(); ignore short strings if (word.length() < minlen) continue; if (!st.contains(word)) st.put(word, 1); else st.put(word, st.get(word) + 1); } String max = ""; st.put(max, 0); for (String word : st.keys()) if (st.get(word) > st.get(max)) max = word; StdOut.println(max + " " + st.get(max)); } } create ST read string and update frequency print a string with max freq 15

API Elementary implementations Ordered operations SYMBOL TABLES

Sequential search in a linked list Data structure. Maintain an (unordered) linked list of key-value pairs. Search. Scan through all keys until find a match. Insert. Scan through all keys until find a match; if no match add to front. key value S 0 first S 0 red nodes are new E 1 A 2 E 1 A 2 S 0 E 1 S 0 black nodes are accessed in search R 3 R 3 A 2 E 1 S 0 C 4 H 5 C 4 H 5 R 3 C 4 A 2 R 3 E 1 A 2 S 0 E 1 S 0 circled entries are changed values E 6 H 5 C 4 R 3 A 2 E 6 S 0 X 7 X 7 H 5 C 4 R 3 A 2 E 6 S 0 A 8 X 7 H 5 C 4 R 3 A 8 E 6 S 0 gray nodes are untouched M 9 M 9 X 7 H 5 C 4 R 3 A 8 E 6 S 0 P 10 L 11 E 12 P 10 L 11 L 11 M 9 X 7 H 5 C 4 R 3 A 8 E 6 S 0 P 10 M 9 X 7 H 5 C 4 R 3 A 8 E 6 S 0 P 10 M 9 X 7 H 5 C 4 R 3 A 8 E 12 S 0 Trace of linked-list ST implementation for standard indexing client 17

Elementary ST implementations: summary ST implementation worst-case cost (after N inserts) average case (after N random inserts) ordered iteration? key interface search insert search hit insert sequential search (unordered list) N N N / 2 N no equals() Must search first to avoid duplicates Challenge. Efficient implementations of both search and insert. 18

Elementary ST implementations: summary worst case average case ST implementation sequential search (unordered list) search insert search hit insert N N N/2 N ordered iteration? operations on keys no equals() compares 5737 2246 0 0 operations 14350 Costs for java FrequencyCounter 8 < tale.txt using SequentialSearchST th Grey data points are observed costs for i operation, reds are their averages 19

Binary search Data structure. Maintain an ordered array of key-value pairs. Rank helper function. How many keys < k? successful search for P lo hi m 0 9 4 A C E H L M P R S X unsuccessful search for Q keys[] 0 1 2 3 4 5 6 7 8 9 5 9 7 A C E H L M P R S X 5 6 5 A C E H L M P R S X 6 6 6 A C E H L M P R S X lo hi m 0 9 4 A C E H L M P R S X 5 9 7 A C E H L M P R S X 5 6 5 A C E H L M P R S X 7 6 6 A C E H L M P R S X loop exits with lo > hi: return 7 Trace of binary search for rank in an ordered array entries in black are a[lo..hi] entry in red is a[m] loop exits with keys[m] = P: return 6 20

Binary search: Java implementation public Value get(key key) { if (isempty()) return null; int i = rank(key); if (i < N && keys[i].compareto(key) == 0) return vals[i]; else return null; } private int rank(key key) { int lo = 0, hi = N-1; while (lo <= hi) { int mid = lo + (hi - lo) / 2; int cmp = key.compareto(keys[mid]); if (cmp < 0) hi = mid - 1; else if (cmp > 0) lo = mid + 1; else if (cmp == 0) return mid; } return lo; } number of keys < key 21

Binary search: mathematical analysis Proposition. Binary search uses ~ lg N compares to search any array of size N. Pf. T(N) number of compares to binary search in a sorted array of size N. left or right half T( N / 2 ) + 1 Recall lecture 2. 22

Binary search: trace of standard indexing client Problem. To insert, need to shift all greater keys over. key value keys[] vals[] 0 1 2 3 4 5 6 7 8 9 N 0 1 2 3 4 5 6 7 8 9 S 0 S 1 0 E 1 E S 2 1 0 entries in red A 2 A E S were inserted 3 2 1 0 R 3 A E R S 4 2 1 3 0 C 4 A C E R S entries in gray 5 2 4 1 3 0 H 5 A C E H R S did not move 6 2 4 1 5 3 0 E 6 A C E H R S 6 2 4 6 5 3 0 X 7 A C E H R S X 7 2 4 6 5 3 0 7 A 8 A C E H R S X 7 8 4 6 5 3 0 7 entries in black moved to the right M 9 A C E H M R S X 8 8 4 6 5 9 3 0 7 circled entries are changed values P 10 A C E H M P R S X 9 8 4 6 5 9 10 3 0 7 L 11 A C E H L M P R S X 10 8 4 6 5 11 9 10 3 0 7 E 12 A C E H L M P R S X 10 8 4 12 5 11 9 10 3 0 7 A C E H L M P R S X 8 4 12 5 11 9 10 3 0 7 23

Elementary ST implementations: frequency counter compares 5737 2246 0 0 operations 14350 Costs for java FrequencyCounter 8 < tale.txt using SequentialSearchST cost 5737 484 0 0 operations Costs for java FrequencyCounter 8 < tale.txt using BinarySearchST 14350 24

Elementary ST implementations: summary ST implementation worst-case cost (after N inserts) average case (after N random inserts) ordered iteration? key interface search insert search hit insert sequential search (unordered list) N N N / 2 N no equals() binary search (ordered array) log N N log N N / 2 yes compareto() Challenge. Efficient implementations of both search and insert. 25

API Elementary implementations Ordered operations SYMBOL TABLES

Ordered symbol table API (Example Operations) min() get(09:00:13) floor(09:05:00) select(7) keys(09:15:00, 09:25:00) ceiling(09:30:00) max() keys values 09:00:00 Chicago 09:00:03 Phoenix 09:00:13 Houston 09:00:59 Chicago 09:01:10 Houston 09:03:13 Chicago 09:10:11 Seattle 09:10:25 Seattle 09:14:25 Phoenix 09:19:32 Chicago 09:19:46 Chicago 09:21:05 Chicago 09:22:43 Seattle 09:22:54 Seattle 09:25:52 Chicago 09:35:21 Chicago 09:36:14 Seattle 09:37:44 Phoenix size(09:15:00, 09:25:00) is 5 rank(09:10:25) is 7 Examples of ordered symbol-table operations 27

Ordered symbol table API public class ST<Key extends Comparable<Key>, Value> ST() create an ordered symbol table void put(key key, Value val) put key-value pair into the table (remove key from table if value is null) Value get(key key) value paired with key (null if key is absent) void delete(key key) remove key (and its value) from table boolean contains(key key) is there a value paired with key? boolean isempty() is the table empty? int size() number of key-value pairs Key min() smallest key Key max() largest key Key floor(key key) largest key less than or equal to key Key ceiling(key key) smallest key greater than or equal to key int rank(key key) number of keys less than key Key select(int k) key of rank k void deletemin() delete smallest key void deletemax() delete largest key int size(key lo, Key hi) number of keys in [lo..hi] Iterable<Key> keys(key lo, Key hi) keys in [lo..hi], in sorted order Iterable<Key> keys() all keys in the table, in sorted order API for a generic ordered symbol table 28

Binary search: ordered symbol table operations summary sequential search binary search search N lg N insert 1 N The Problem: Insert Operation min / max N 1 floor / ceiling N lg N rank N lg N select N 1 ordered iteration N log N N order of growth of the running time for ordered symbol table operations 29