Jump to content

Geometry of binary search trees: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Edemaine (talk | contribs)
add NP-completeness reference
Line 98: Line 98:
|publisher=Springer|series=Lecture Notes in Computer Science|volume=6844|doi=10.1007/978-3-642-22300-6_35
|publisher=Springer|series=Lecture Notes in Computer Science|volume=6844|doi=10.1007/978-3-642-22300-6_35
|url=http://web.engr.illinois.edu/~kylefox2/publications/greedyfuture.pdf| pages=411–422}}</ref>
|url=http://web.engr.illinois.edu/~kylefox2/publications/greedyfuture.pdf| pages=411–422}}</ref>

== Other results ==
The geometry of binary search trees has been used to provide an algorithm which is dynamically optimal if any binary search tree algorithm is dynamically optimal.<ref name="Iacono2013">{{cite doi|10.1007/978-3-642-40273-9_16}}</ref>


==See also==
==See also==

Revision as of 11:50, 5 January 2015

In computer science, one approach to the dynamic optimality conjecture on online algorithms for binary search trees involves reformulating the problem geometrically, in terms of augmenting a set of points in the plane with as few additional points as possible in order to avoid rectangles with only two points on their boundary.[1]

Access sequences and competitive ratio

As typically formulated, the online binary search tree problem involves search trees defined over a fixed key set (1, 2, ..., n). An access sequence is a sequence x1, x2, ... where each number xi is one of the given keys.

Any particular algorithm for maintaining binary search trees (such as the splay tree algorithm or Iacono's working set structure) has a cost for each access sequence that models the amount of time it would take to use the structure to search for each of the keys in the access sequence in turn. The cost of a search is modeled by assuming that the search tree algorithm has a single pointer into a binary search tree, which at the start of each search points to the root of the tree. The algorithm may then perform any sequence of the following operations:

  • Move the pointer to its left child.
  • Move the pointer to its right child.
  • Move the pointer to its parent.
  • Perform a single tree rotation on the pointer and its parent.

The search is required, at some point within this sequence of operations to move the pointer to a node containing the key, and the cost of the search is the number of operations that are performed in the sequence. The total cost costA(X) for algorithm A on access sequence X is the sum of the costs of the searches for each successive key in the sequence.

As is standard in competitive analysis, the competitive ratio of an algorithm A is defined to be the maximum, over all access sequences, of the ratio of the cost for A to the best cost that any algorithm could achieve:

The dynamic optimality conjecture states that splay trees have constant competitive ratio, but this remains unproven. The geometric view of binary search trees provides a different way of understanding the problem that has led to the development of alternative algorithms that could also (conjecturally) have a constant competitive ratio.

Translation to a geometric point set

In the geometric view of the online binary search tree problem, an access sequence x1, . . ., xm (sequence of searches performed on a binary search tree (BST) with a key set {1,2,...,n}) is mapped to the set of points {(xi, i)}, where X-axis represents key space and Y-axis represents time; to which a set of touched nodes is added. By touched nodes we mean the following. Consider a BST access algorithm with a single pointer to a node in the tree. At the beginning of an access to a given key xi, this pointer is initialized to the root of the tree. Whenever the pointer moves to or is initialized to a node, we say that the node is touched.[2] We represent a BST algorithm for a given input sequence by drawing a point for each item that gets touched.

For example, assume the following BST on 4 nodes is given: The key set is {1, 2, 3, 4}.

Let 3, 1, 4, 2 be the access sequence.

  • In the first access, only the node 3 is touched.
  • In the second access, the nodes 3 and 1 are touched.
  • In the third access - 3 and 4 are touched.
  • In the fourth access, touch 3, then 1, and after that 2.

The touches are represented geometrically: If an item x is touched in the operations for the ith access, then a point (x,i) is plotted.

Arborally satisfied point sets

Rectangle spanned by two points. This point set is NOT arborally satisfied.
This is an example of arborally satisfied set of points.

A point set is said to be arborally satisfied if the following property holds: for any pair of points that do not both lie on the same horizontal or vertical line, there exists a third point which lies in the rectangle spanned by the first two points (either inside or on the boundary).

Theorem

A point set containing the points (xi, i) is arborally satisfied if and only if it corresponds to a valid BST for the input sequence x1, x2, . . ., xm.

Proof

First, prove that the point set for any valid BST algorithm is arborally satisfied. Consider points (x, i) and (y, j), where x is touched at time i and y is touched at time j. Assume by symmetry that x < y and i < j. It needs to be shown that there exists a third point in the rectangle with corners as (x, i) and (y, j). Also let LCAt(a, b) denote the lowest common ancestor of nodes a and b right before time t. There are a few cases:

  • If LCAi(x, y) ≠ x, then use the point (LCAi(x, y), i), since LCAi(x, y) must have been touched if x was.
  • If LCAj(x, y) ≠ y, then the point (LCAj(x, y), j) can be used.
  • If neither of the above two cases hold, then x must be an ancestor of y right before time i and y be an ancestor of x right before time j. Then at some time k (i ≤ k < j), y must have been rotated above x, so the point (y, k) can be used.

Next, show the other direction: given an arborally satisfied point set, a valid BST corresponding to that point set can be constructed. Organize our BST into a treap which is organized in heap-order by next-touch-time. Note that next-touch-time has ties and is thus not uniquely defined, but this isn’t a problem as long as there is a way to break ties. When time i reached, the nodes touched form a connected subtree at the top, by the heap ordering property. Now, assign new next-touch-times for this subtree, and rearrange it into a new local treap. If a pair of nodes, x and y, straddle the boundary between the touched and untouched part of the treap, then if y is to be touched sooner than x then (x, now) → (y, next − touch(y)) is an unsatisfied rectangle because the leftmost such point would be the right child of x, not y.

Corollary

Finding the best BST execution for the input sequence x1, x2, . . ., xm is equivalent to finding the minimum cardinality superset of points (that contains the input in geometric representation) that is arborally satisfied. The more general problem of finding the minimum cardinality arborally satisfied superset of a general set of input points (not limited to one input point per y coordinate), is known to be NP-complete.[1]

Greedy algorithm

The following greedy algorithm constructs arborally satisfiable sets:

  • Sweep the point set with a horizontal line by increasing y coordinate.
  • At time i, place the minimal number of points at y = i to make the point set up to y ≤ i arborally satisfied. This minimal set of points is uniquely defined: for any unsatisfied rectangle formed with(xi, i) in one corner, add the other corner at y = i.

The algorithm has been conjectured to be optimal.[3]

Other results

The geometry of binary search trees has been used to provide an algorithm which is dynamically optimal if any binary search tree algorithm is dynamically optimal.[4]

See also

References

  1. ^ a b Demaine, Erik D.; Harmon, Dion; Iacono, John; Kane, Daniel; Pătraşcu, Mihai (2009), "The geometry of binary search trees" (PDF), in Proceedings of the 20th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2009), New York: 496–505{{citation}}: CS1 maint: extra punctuation (link)
  2. ^ Demaine, Erik D.; Harmon, Dion; Iacono, John; Pătraşcu, Mihai (2007), "Dynamic optimality—almost", SIAM Journal on Computing, 37 (1): 240–251, doi:10.1137/S0097539705447347, MR 2306291
  3. ^ Fox, Kyle (2011), Upper bounds for maximally greedy binary search trees (PDF), Lecture Notes in Computer Science, vol. 6844, Springer, pp. 411–422, doi:10.1007/978-3-642-22300-6_35 {{citation}}: Unknown parameter |booktitle= ignored (help)
  4. ^ Attention: This template ({{cite doi}}) is deprecated. To cite the publication identified by doi:10.1007/978-3-642-40273-9_16, please use {{cite journal}} (if it was published in a bona fide academic journal, otherwise {{cite report}} with |doi=10.1007/978-3-642-40273-9_16 instead.