representing sets csc 172 spring 2002 lecture 21

32
REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Post on 20-Dec-2015

218 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

REPRESENTING SETS

CSC 172

SPRING 2002

LECTURE 21

Page 2: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Representations

ListSimple O(n) dictionary operations

Binary Search TreesO(log n) average timeRange queries, sorting

Characteristic Vector O(1) dictionary ops, but limited to small sets

Hash TableO(1) average for dictionary ops

Page 3: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Characteristic Vectors

Boolean Strings whose position corresponds to the members of some fixed “universal” setA “1” in a location means that the element is in the set, )

means that it is not

Page 4: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

UNIX file privileges

{user, group, others} x {read, write, execute}

9 possible privileges

Type “ls –l” on UNIX

total 142

-rw-rw-r-- 1 pawlicki none 76 Jun 20 2000 PKG416.desc

-rw-rw-r-- 1 pawlicki none 28906 Jun 20 2000 PKG416.pdf

-rw-rw-r-- 1 pawlicki none 1849 Jun 20 2000 let.1

-rw-rw-r-- 1 pawlicki none 0 Apr 2 13:03 out

-rw-rw-r-- 1 pawlicki none 39891 Jun 20 2000 stapp.uu

Page 5: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

UNIX files

The ususa order is rwx for each of user (owner), group, and others

So, a protection mode of 110100000 means that the owner may read and write (but not execute), the group can read only and others cannot even read

Page 6: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

CV advantages

If the universal set is small, sets can be represented by bits packed 32 to a word

Insert, delete, and lookup are O(1) on the proper bitUnion, intersection, difference are implemented on a

word-by-word basisO(m) where m is the size of the setSmall constant factor (1/32)Fast, machine operations (remember “bits” lab)

Page 7: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Hashing

A cool way to get from an element x to the place where x can be found

An array [0..B-1] of bucketsBucket contains a list of set elements

B = number of buckets

A hash function that takes potential set elements and produces a “random” integer [0..B-1]

Page 8: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Example

If the set elements are integers then the simplest/best hash function is usually h(x) = x % B

Suppose B = 6 and we wish to store the integers {70, 53, 99, 94, 83, 76, 64, 30}

They belong in the buckets 4, 5, 3, 4, 5, 4, 4, and 0

Note: If B = 7 0,4,1,3,6,6,1,2

Page 9: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Pitfalls of Hash Function Selection

We want to get a uniform distribution of elements into buckets

Beware of data patterns that cause non-uniform distribution

Page 10: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Example

If integers were all even, then B = 6 would cause only bucktes 0,2, and 4 to fill

If we hashed words in the the UNIX dictionary into 10 buckets by length of word then 20% go into bucket 7

Page 11: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Dictionary Operations

Lookup

Go to head of bucket h(x)

Search for bucket list. If x is in the bucket

Insertion: append if not found

Delete – list deletion from bucket list

Page 12: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Analysis

If we pick B to be new n, the nubmer of elements in the set, then the average list is O(1) long

Thus, dictionary ops take O(1) time

Worst case all elements go into one bucketO(n)

Page 13: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Managing Hash Table Size

If n gets as high as 2B, create a new hash table with 2B buckets

“Rehash” every element into the new tableO(n) time total

There were at least n inserts since the last “rehash”All these inserts took time O(n)

Thus, we “amortize” the cost of rehashing over the inserts since the last rehashConstant factor, at worst

So, even with rehashing we get O(1) time ops

Page 14: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Collisions

A collision occurs when two values in the set hash to the same value

There are several ways to deal with thisChaining (using a linked list or some secondary structure)

Open AddressingDouble hashing

Linear Probing

Page 15: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Chaining

0

1

2

3

4

5

6

70

99 64

83 76

94

53

30

Very efficientTime Wise

Other approachesUse less space

Page 16: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Open Addressing

When a collision occurs,

if the table is not full find an available spaceLinear Probing

Double Hashing

Page 17: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Linear ProbingIf the current location is occupied, try the next table location

LinearProbingInsert(K) {if (table is full) error;probe = h(K);while (table[probe] is occupied)

probe = ++probe % M;table[probe] = K;

}

Walk along table until an empty spot is foundUses less memory than chaining (no links)Takes more time than chaining (long walks)Deleting is a pain (mark a slot as having been deleted)

Page 18: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Linear Probingh(K) = K % 13

180 1 2 3 4 5 6 7 8 9 10 11 12

Insert: 18, 41, 22, 59, 32, 31, 73

h(K) : 5,

Page 19: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Linear Probingh(K) = K % 13

41 180 1 2 3 4 5 6 7 8 9 10 11 12

Insert: 18, 41, 22, 59, 32, 31, 73

h(K) : 5, 2,

Page 20: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Linear Probingh(K) = K % 13

41 18 220 1 2 3 4 5 6 7 8 9 10 11 12

Insert: 18, 41, 22, 59, 32, 31, 73

h(K) : 5, 2, 9,

Page 21: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Linear Probingh(K) = K % 13

41 18 59 220 1 2 3 4 5 6 7 8 9 10 11 12

Insert: 18, 41, 22, 59, 32, 31, 73

h(K) : 5, 2, 9, 7,

Page 22: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Linear Probingh(K) = K % 13

41 18 32 59 220 1 2 3 4 5 6 7 8 9 10 11 12

Insert: 18, 41, 22, 59, 32, 31, 73

h(K) : 5, 2, 9, 7, 6,

Page 23: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Linear Probingh(K) = K % 13

41 18 32 59 220 1 2 3 4 5 6 7 8 9 10 11 12

Insert: 18, 41, 22, 59, 32, 31, 73

h(K) : 5, 2, 9, 7, 6, 5,

Page 24: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Linear Probingh(K) = K % 13

41 18 32 59 220 1 2 3 4 5 6 7 8 9 10 11 12

Insert: 18, 41, 22, 59, 32, 31, 73

h(K) : 5, 2, 9, 7, 6, 5,

Page 25: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Linear Probingh(K) = K % 13

41 18 32 59 220 1 2 3 4 5 6 7 8 9 10 11 12

Insert: 18, 41, 22, 59, 32, 31, 73

h(K) : 5, 2, 9, 7, 6, 5,

Page 26: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Linear Probingh(K) = K % 13

41 18 32 59 31 220 1 2 3 4 5 6 7 8 9 10 11 12

Insert: 18, 41, 22, 59, 32, 31, 73

h(K) : 5, 2, 9, 7, 6, 5,

Page 27: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Linear Probingh(K) = K % 13

41 18 32 59 31 220 1 2 3 4 5 6 7 8 9 10 11 12

Insert: 18, 41, 22, 59, 32, 31, 73

h(K) : 5, 2, 9, 7, 6, 5, 8

Page 28: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Linear Probingh(K) = K % 13

41 18 32 59 31 220 1 2 3 4 5 6 7 8 9 10 11 12

Insert: 18, 41, 22, 59, 32, 31, 73

h(K) : 5, 2, 9, 7, 6, 5, 8

73

Page 29: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Double HashingIf the current location is occupied, try another table location

Use two hash functions

If M is prime, eventually will examine every location DoubleHashInsert(K) {

if (table is full) error;

probe = h1(K);

offset = h2(K);

while (table[probe] is occupied)

probe = (probe+offset) % M;

table[probe] = K;

}

Many of the same (dis)advantages as linear probing

Distributes keys more evenly than linear probing

Page 30: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Double Hashingh1(K) = K % 13h1(K) = 8 - K % 8

0 1 2 3 4 5 6 7 8 9 10 11 12

Insert: 18, 41, 22, 59, 32, 31, 73

h1(K) : 5, 2, 9, 7, 6, 5, 8

h2(K) : 6, 7, 2, 5, 8, 1, 7

Page 31: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Double Hashingh1(K) = K % 13h1(K) = 8 - K % 8

41 18 32 59 220 1 2 3 4 5 6 7 8 9 10 11 12

Insert: 18, 41, 22, 59, 32, 31, 73

h1(K) : 5, 2, 9, 7, 6, 5, 8

h2(K) : 6, 7, 2, 5, 8, 1, 7

31

Page 32: REPRESENTING SETS CSC 172 SPRING 2002 LECTURE 21

Double Hashingh1(K) = K % 13h1(K) = 8 - K % 8

41 18 32 59 220 1 2 3 4 5 6 7 8 9 10 11 12

Insert: 18, 41, 22, 59, 32, 31, 73

h1(K) : 5, 2, 9, 7, 6, 5, 8

h2(K) : 6, 7, 2, 5, 8, 1, 7

3173