Similar documents
ELEMENTARY SEARCH ALGORITHMS

cs2010: algorithms and data structures

3.1 Symbol Tables. API sequential search binary search ordered operations


Algorithms. Algorithms 3.1 SYMBOL TABLES. API elementary implementations ordered operations ROBERT SEDGEWICK KEVIN WAYNE

ELEMENTARY SEARCH ALGORITHMS

ELEMENTARY SEARCH ALGORITHMS

ELEMENTARY SEARCH ALGORITHMS

4.1 Symbol Tables. API sequential search binary search ordered operations. Symbol tables

Algorithms. Algorithms 3.1 SYMBOL TABLES. API elementary implementations ordered operations ROBERT SEDGEWICK KEVIN WAYNE


Elementary Symbol Tables

Symbol Tables 1 / 15


Symbol Table. IP address

Algorithms. Algorithms. Algorithms 3.1 SYMBOL TABLES. API elementary implementations ordered operations

4.4 Symbol Tables. Symbol Table. Symbol Table Applications. Symbol Table API

4.4 Symbol Tables. Symbol Table. Symbol Table Applications. Symbol Table API

4.4 Symbol Tables and BSTs

! Insert a key with specified value. ! Given a key, search for the corresponding value. ! Insert URL with specified IP address.

Algorithms. Algorithms. Algorithms. API elementary implementations. ordered operations. API elementary implementations. ordered operations

Algorithms. Algorithms. Algorithms. API elementary implementations. ordered operations API. elementary implementations. ordered operations

Algorithms. Algorithms. Algorithms 3.1 SYMBOL TABLES. API elementary implementations ordered operations

COMPUTER SCIENCE. 15. Symbol Tables. Section 4.4.

Class Meeting #8 8 Puzzle. COS 226 Based in part ok slides by Jérémie Lumbroso and Kevin Wayne

COMPUTER SCIENCE. Computer Science. 13. Symbol Tables. Computer Science. An Interdisciplinary Approach. Section 4.4.

CS.15.A.SymbolTables.API. Alice

Elementary Sorts. ! rules of the game! selection sort! insertion sort! sorting challenges! shellsort. Sorting problem

4.4 Symbol Tables. Symbol Table. Symbol Table API. Symbol Table Applications

Elementary Sorts. rules of the game selection sort insertion sort sorting challenges shellsort. Sorting problem. Ex. Student record in a University.

Symbol Table. IP address

Lecture 13: Binary Search Trees

Algorithms. Algorithms 3.4 HASH TABLES. hash functions separate chaining linear probing context ROBERT SEDGEWICK KEVIN WAYNE

The class Object. Lecture CS1122 Summer 2008

BINARY SEARCH TREES TODAY BBM ALGORITHMS DEPT. OF COMPUTER ENGINEERING. Binary Search Tree (BST) Binary search trees

BINARY SEARCH TREES BBM ALGORITHMS DEPT. OF COMPUTER ENGINEERING

CS2012 Programming Techniques II

equals() in the class Object

! Insert a key with specified value. ! Given a key, search for the corresponding value. ! Insert URL with specified IP address.

For this section, we will implement a class with only non-static features, that represents a rectangle

java.lang.object: Equality

CMSC 132, Object-Oriented Programming II Summer Lecture 13

3.2 BINARY SEARCH TREES. BSTs ordered operations iteration deletion. Algorithms ROBERT SEDGEWICK KEVIN WAYNE.

Algorithms. Algorithms 3.2 BINARY SEARCH TREES. BSTs ordered operations iteration deletion (see book or videos) ROBERT SEDGEWICK KEVIN WAYNE

Methods Common to all Classes

3.4 Hash Tables. hash functions separate chaining linear probing applications. Optimize judiciously

Symbol Tables. API sequential search binary search applications challenges. Symbol tables

4.2 Binary Search Trees

3.4 Hash Tables. hash functions separate chaining linear probing applications

Super-Classes and sub-classes

3.3: Encapsulation and ADTs

Creating an Immutable Class. Based on slides by Prof. Burton Ma

Algorithms. Algorithms 2.2 MERGESORT. mergesort bottom-up mergesort sorting complexity comparators stability ROBERT SEDGEWICK KEVIN WAYNE

Algorithms. Algorithms 2.2 MERGESORT. mergesort bottom-up mergesort sorting complexity comparators stability ROBERT SEDGEWICK KEVIN WAYNE

Chapter 11: Collections and Maps

Algorithms. Algorithms 3.2 BINARY SEARCH TREES. BSTs ordered operations deletion ROBERT SEDGEWICK KEVIN WAYNE.

2.1 Elementary Sorts

Lecture 16: Encapsulation and ADTs

Lecture 14: Binary Search Trees (2)

CSE 331 Software Design & Implementation

CSE 331 Software Design & Implementation

Algorithms. Algorithms GEOMETRIC APPLICATIONS OF BSTS. 1d range search line segment intersection kd trees interval search trees rectangle intersection

Algorithms. Algorithms GEOMETRIC APPLICATIONS OF BSTS. 1d range search line segment intersection kd trees interval search trees rectangle intersection

Name Return type Argument list. Then the new method is said to override the old one. So, what is the objective of subclass?

Algorithms 2.2 MERGESORT. mergesort bottom-up mergesort sorting complexity comparators stability

CSCI 135 Exam #1 Fundamentals of Computer Science I Fall 2012

Algorithms. Algorithms GEOMETRIC APPLICATIONS OF BSTS. 1d range search line segment intersection kd trees interval search trees rectangle intersection

! A negative integer if v is less than w. ! A positive integer if v is greater than w. ! Zero if v is equal to w.

Expected properties of equality

Algorithms 2.2 MERGESORT. mergesort bottom-up mergesort sorting complexity comparators stability

Programming Languages and Techniques (CIS120)

Algorithms. Algorithms 2.1 ELEMENTARY SORTS. rules of the game selection sort insertion sort shuffling comparators ROBERT SEDGEWICK KEVIN WAYNE

Algorithms 2.1 ELEMENTARY SORTS. rules of the game selection sort insertion sort shellsort shuffling convex hull

4.1 Performance. Running Time. The Challenge. Scientific Method

Running Time. Analytic Engine. Charles Babbage (1864) how many times do you have to turn the crank?

CMSC 132: Object-Oriented Programming II. Hash Tables

4.3 Stacks and Queues

Algorithms GEOMETRIC APPLICATIONS OF BSTS. 1d range search line segment intersection kd trees interval search trees rectangle intersection

MET08-J. Preserve the equality contract when overriding the equals() method

Overloaded Methods. Sending Messages. Overloaded Constructors. Sending Parameters

CMSC 132, Object-Oriented Programming II Summer Lecture 5:

Equality. Michael Ernst. CSE 331 University of Washington

Collections. Powered by Pentalog. by Vlad Costel Ungureanu for Learn Stuff

Algorithms. Algorithms 2.1 ELEMENTARY SORTS. rules of the game selection sort insertion sort shellsort shuffling convex hull

3.5 Symbol Tables Applications

4.5 Symbol Tables Applications

Data abstractions: ADTs Invariants, Abstraction function. Lecture 4: OOP, autumn 2003

CSE 2123: Collections: Priority Queues. Jeremy Morris

Canonical Form. No argument constructor Object Equality String representation Cloning Serialization Hashing. Software Engineering

Programming Languages and Techniques (CIS120)

Sorting Applications 1 / 9

Algorithms. Algorithms 1.5 UNION-FIND. dynamic connectivity quick find quick union improvements applications ROBERT SEDGEWICK KEVIN WAYNE

Algorithms. Algorithms GEOMETRIC APPLICATIONS OF BSTS. 1d range search kd trees line segment intersection interval search trees rectangle intersection

Domain-Driven Design Activity

School of Computing National University of Singapore CS2010 Data Structures and Algorithms 2 Semester 2, AY 2015/16. Tutorial 2 (Answers)

CSE 331 Spring 2018 Midterm

4.3 Stacks, Queues, and Linked Lists

Data Structures in Java

Algorithms 3.4 HASH TABLES. hash functions separate chaining linear probing context ROBERT SEDGEWICK KEVIN WAYNE.

The Liskov Substitution Principle

Transcription:

Algorithms ROBERT SEDGEWICK KEVIN WAYNE 3.1 SYMBOL TABLES Algorithms F O U R T H E D I T I O N API elementary implementations ordered operations ROBERT SEDGEWICK KEVIN WAYNE http://algs4.cs.princeton.edu

3.1 SYMBOL TABLES Algorithms API elementary implementations ordered operations ROBERT SEDGEWICK KEVIN WAYNE http://algs4.cs.princeton.edu

Symbol tables Key-value pair abstraction. Insert a value with specified key. Given a key, search for the corresponding value. Ex. DNS lookup. Insert domain name with specified IP address. Given domain name, find corresponding IP address. domain name IP address www.cs.princeton.edu 128.112.136.11 www.princeton.edu 128.112.128.15 www.yale.edu 130.132.143.21 www.harvard.edu 128.103.060.55 www.simpsons.com 209.052.165.60 key value 3

Symbol table applications application purpose of search key value dictionary find definition word definition book index find relevant pages term list of page numbers file share find song to download name of song computer ID financial account process transactions account number transaction details web search find relevant web pages keyword list of page names compiler find properties of variables variable name type and value routing table route Internet packets destination best route DNS find IP address domain name IP address reverse DNS find domain name IP address domain name genomics find markers DNA string known positions file system find file on disk filename location on disk 4

Basic symbol table API Associative array abstraction. Associate one value with each key. public class ST<Key, Value> ST() void put(key key, Value val) Value get(key key) create a symbol table put key-value pair into the table (remove key from table if value is null) value paired with key (null if key is absent) void delete(key key) remove key (and its value) from table boolean contains(key key) is there a value paired with key? boolean isempty() is the table empty? int size() number of key-value pairs in the table a[key] = val; a[key] Iterable<Key> keys() all the keys in the table API for a generic basic symbol table 5

Conventions Values are not null. Method get() returns null if key not present. Method put() overwrites old value with new value. Intended consequences. Easy to implement contains(). public boolean contains(key key) { return get(key)!= null; } Can implement lazy version of delete(). public void delete(key key) { put(key, null); } 6

Keys and values Value type. Any generic type. Key type: several natural assumptions. Assume keys are Comparable, use compareto(). Assume keys are any generic type, use equals() to test equality. Assume keys are any generic type, use equals() to test equality; use hashcode() to scramble key. specify Comparable in API. built-in to Java (stay tuned) Best practices. Use immutable types for symbol table keys. Immutable in Java: Integer, Double, String, java.io.file, Mutable in Java: StringBuilder, java.net.url, arrays,... 7

Equality test All Java classes inherit a method equals(). Java requirements. For any references x, y and z: Reflexive: x.equals(x) is true. Symmetric: x.equals(y) iff y.equals(x). Transitive: if x.equals(y) and y.equals(z), then x.equals(z). Non-null: x.equals(null) is false. equivalence relation Default implementation. (x == y) do x and y refer to the same object? Customized implementations. Integer, Double, String, java.io.file, User-defined implementations. Some care needed. 8

Implementing equals for user-defined types Seems easy. public class Date implements Comparable<Date> { private final int month; private final int day; private final int year;... public boolean equals(date that) { } } if (this.day!= that.day ) return false; if (this.month!= that.month) return false; if (this.year!= that.year ) return false; return true; check that all significant fields are the same 9

Implementing equals for user-defined types Seems easy, but requires some care. typically unsafe to use equals() with inheritance (would violate symmetry) public final class Date implements Comparable<Date> { private final int month; private final int day; private final int year;... public boolean equals(object y) { if (y == this) return true; if (y == null) return false; if (y.getclass()!= this.getclass()) return false; must be Object. Why? Experts still debate. optimize for true object equality check for null objects must be in the same class (religion: getclass() vs. instanceof) } } Date that = (Date) y; if (this.day!= that.day ) return false; if (this.month!= that.month) return false; if (this.year!= that.year ) return false; return true; cast is guaranteed to succeed check that all significant fields are the same 10

Equals design "Standard" recipe for user-defined types. Optimization for reference equality. Check against null. Check that two objects are of the same type and cast. Compare each significant field: if field is a primitive type, use == if field is an object, use equals() if field is an array, apply to each entry apply rule recursively alternatively, use Arrays.equals(a, b) or Arrays.deepEquals(a, b), but not a.equals(b) Best practices. No need to use calculated fields that depend on other fields. Compare fields mostly likely to differ first. Make compareto() consistent with equals(). x.equals(y) if and only if (x.compareto(y) == 0) 11

ST test client for traces Build ST by associating value i with i th string from standard input. public static void main(string[] args) { ST<String, Integer> st = new ST<String, Integer>(); for (int i = 0;!StdIn.isEmpty(); i++) { String key = StdIn.readString(); st.put(key, i); } for (String s : st.keys()) StdOut.println(s + " " + st.get(s)); } keys values S E A R C H E X A M P L E 0 1 2 3 4 5 6 7 8 9 10 11 12 output A 8 C 4 E 12 H 5 L 11 M 9 P 10 R 3 S 0 X 7 12

ST test client for analysis Frequency counter. Read a sequence of strings from standard input and print out one that occurs with highest frequency. % more tinytale.txt it was the best of times it was the worst of times it was the age of wisdom it was the age of foolishness it was the epoch of belief it was the epoch of incredulity it was the season of light it was the season of darkness it was the spring of hope it was the winter of despair % java FrequencyCounter 1 < tinytale.txt it 10 % java FrequencyCounter 8 < tale.txt business 122 % java FrequencyCounter 10 < leipzig1m.txt government 24763 tiny example (60 words, 20 distinct) real example (135,635 words, 10,769 distinct) real example (21,191,455 words, 534,580 distinct) 13

Frequency counter implementation public class FrequencyCounter { public static void main(string[] args) { int minlen = Integer.parseInt(args[0]); ST<String, Integer> st = new ST<String, Integer>(); while (!StdIn.isEmpty()) { String word = StdIn.readString(); ignore short strings if (word.length() < minlen) continue; if (!st.contains(word)) st.put(word, 1); else st.put(word, st.get(word) + 1); } String max = ""; st.put(max, 0); for (String word : st.keys()) if (st.get(word) > st.get(max)) max = word; StdOut.println(max + " " + st.get(max)); } } create ST read string and update frequency print a string with max freq 14

3.1 SYMBOL TABLES Algorithms API elementary implementations ordered operations ROBERT SEDGEWICK KEVIN WAYNE http://algs4.cs.princeton.edu

3.1 SYMBOL TABLES Algorithms API elementary implementations ordered operations ROBERT SEDGEWICK KEVIN WAYNE http://algs4.cs.princeton.edu

Sequential search in a linked list Data structure. Maintain an (unordered) linked list of key-value pairs. Search. Scan through all keys until find a match. Insert. Scan through all keys until find a match; if no match add to front. key value S 0 E 1 A 2 R 3 C 4 H 5 E 6 X 7 A 8 M 9 P 10 L 11 E 12 first S 0 E 1 A 2 R 3 C 4 H 5 H 5 X 7 X 7 M 9 P 10 L 11 L 11 red nodes are new S 0 E 1 A 2 R 3 C 4 C 4 H 5 H 5 X 7 S 0 E 1 A 2 R 3 R 3 C 4 C 4 H 5 S 0 E 1 A 2 A 2 R 3 R 3 C 4 black nodes are accessed in search S 0 E 1 E 6 A 2 A 8 R 3 S 0 S 0 E 6 E 6 A 8 circled entries are changed values S 0 S 0 E 6 gray nodes are untouched S 0 M 9 X 7 H 5 C 4 R 3 A 8 E 6 S 0 P 10 M 9 X 7 H 5 C 4 R 3 A 8 E 6 S 0 P 10 M 9 X 7 H 5 C 4 R 3 A 8 E 12 S 0 Trace of linked-list ST implementation for standard indexing client 17

Elementary ST implementations: summary ST implementation worst-case cost (after N inserts) average case (after N random inserts) ordered iteration? key interface search insert search hit insert sequential search (unordered list) N N N / 2 N no equals() Challenge. Efficient implementations of both search and insert. 18

Binary search in an ordered array Data structure. Maintain an ordered array of key-value pairs. Rank helper function. How many keys < k? successful search for P lo hi m 0 9 4 A C E H L M P R S X unsuccessful search for Q keys[] 0 1 2 3 4 5 6 7 8 9 5 9 7 A C E H L M P R S X 5 6 5 A C E H L M P R S X 6 6 6 A C E H L M P R S X lo hi m 0 9 4 A C E H L M P R S X 5 9 7 A C E H L M P R S X 5 6 5 A C E H L M P R S X 7 6 6 A C E H L M P R S X loop exits with lo > hi: return 7 Trace of binary search for rank in an ordered array entries in black are a[lo..hi] entry in red is a[m] loop exits with keys[m] = P: return 6 19

Binary search: Java implementation public Value get(key key) { } if (isempty()) return null; int i = rank(key); if (i < N && keys[i].compareto(key) == 0) return vals[i]; else return null; } private int rank(key key) { } int lo = 0, hi = N-1; while (lo <= hi) { int mid = lo + (hi - lo) / 2; int cmp = key.compareto(keys[mid]); if (cmp < 0) hi = mid - 1; else if (cmp > 0) lo = mid + 1; else if (cmp == 0) return mid; return lo; number of keys < key 20

Binary search: trace of standard indexing client Problem. To insert, need to shift all greater keys over. key value keys[] vals[] 0 1 2 3 4 5 6 7 8 9 N 0 1 2 3 4 5 6 7 8 9 S 0 S 1 0 E 1 E S 2 1 0 entries in red A 2 A E S were inserted 3 2 1 0 R 3 A E R S 4 2 1 3 0 C 4 A C E R S entries in gray 5 2 4 1 3 0 H 5 A C E H R S did not move 6 2 4 1 5 3 0 E 6 A C E H R S 6 2 4 6 5 3 0 X 7 A C E H R S X 7 2 4 6 5 3 0 7 A 8 A C E H R S X 7 8 4 6 5 3 0 7 entries in black moved to the right M 9 A C E H M R S X 8 8 4 6 5 9 3 0 7 circled entries are changed values P 10 A C E H M P R S X 9 8 4 6 5 9 10 3 0 7 L 11 A C E H L M P R S X 10 8 4 6 5 11 9 10 3 0 7 E 12 A C E H L M P R S X 10 8 4 12 5 11 9 10 3 0 7 A C E H L M P R S X 8 4 12 5 11 9 10 3 0 7 21

Elementary ST implementations: summary ST implementation worst-case cost (after N inserts) average case (after N random inserts) ordered iteration? key interface search insert search hit insert sequential search (unordered list) N N N / 2 N no equals() binary search (ordered array) log N N log N N / 2 yes compareto() Challenge. Efficient implementations of both search and insert. 22

3.1 SYMBOL TABLES Algorithms API elementary implementations ordered operations ROBERT SEDGEWICK KEVIN WAYNE http://algs4.cs.princeton.edu

3.1 SYMBOL TABLES Algorithms API elementary implementations ordered operations ROBERT SEDGEWICK KEVIN WAYNE http://algs4.cs.princeton.edu

Examples of ordered symbol table API min() get(09:00:13) floor(09:05:00) select(7) keys(09:15:00, 09:25:00) ceiling(09:30:00) max() keys values 09:00:00 Chicago 09:00:03 Phoenix 09:00:13 Houston 09:00:59 Chicago 09:01:10 Houston 09:03:13 Chicago 09:10:11 Seattle 09:10:25 Seattle 09:14:25 Phoenix 09:19:32 Chicago 09:19:46 Chicago 09:21:05 Chicago 09:22:43 Seattle 09:22:54 Seattle 09:25:52 Chicago 09:35:21 Chicago 09:36:14 Seattle 09:37:44 Phoenix size(09:15:00, 09:25:00) is 5 rank(09:10:25) is 7 25

Ordered symbol table API public class ST<Key extends Comparable<Key>, Value> void Value ST() put(key key, Value val) get(key key) create an ordered symbol table put key-value pair into the table (remove key from table if value is null) value paired with key (null if key is absent) void delete(key key) remove key (and its value) from table boolean contains(key key) is there a value paired with key? boolean isempty() is the table empty? int size() number of key-value pairs Key min() smallest key Key max() largest key Key floor(key key) largest key less than or equal to key Key ceiling(key key) smallest key greater than or equal to key int rank(key key) number of keys less than key Key select(int k) key of rank k void deletemin() delete smallest key void deletemax() delete largest key int size(key lo, Key hi) number of keys in [lo..hi] Iterable<Key> keys(key lo, Key hi) keys in [lo..hi], in sorted order Iterable<Key> keys() all keys in the table, in sorted order API for a generic ordered symbol table 26

Binary search: ordered symbol table operations summary sequential search binary search search N lg N insert / delete N N min / max N 1 floor / ceiling N lg N rank N lg N select N 1 ordered iteration N lg N N order of growth of the running time for ordered symbol table operations 27

3.1 SYMBOL TABLES Algorithms API elementary implementations ordered operations ROBERT SEDGEWICK KEVIN WAYNE http://algs4.cs.princeton.edu

Algorithms ROBERT SEDGEWICK KEVIN WAYNE 3.1 SYMBOL TABLES Algorithms F O U R T H E D I T I O N API elementary implementations ordered operations ROBERT SEDGEWICK KEVIN WAYNE http://algs4.cs.princeton.edu