CSCE3400DataStructures&AlgorithmAnalysis

上传人:gb****c 文档编号:243017698 上传时间:2024-09-13 格式:PPT 页数:25 大小:261KB
返回 下载 相关 举报
CSCE3400DataStructures&AlgorithmAnalysis_第1页
第1页 / 共25页
CSCE3400DataStructures&AlgorithmAnalysis_第2页
第2页 / 共25页
CSCE3400DataStructures&AlgorithmAnalysis_第3页
第3页 / 共25页
点击查看更多>>
资源描述
Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,CSCE 3400Data Structures & Algorithm Analysis,Hashing,Reading: Chap.5,Weiss,1,How to Implement a Dictionary?,Sequences,ordered,unordered,Binary Search Trees,Hashtables,2,Hashing,Another important and widely useful technique for implementing dictionaries,Constant time per operation (on the average),Worst case time proportional to the size of the set for each operation (just like array and chain implementation),3,Basic Idea,Use,hash function,to map keys into positions in a,hash table,Ideally,If element,e,has key,k,and,h,is hash function, then,e,is stored in position,h(k),of table,To search for,e, compute,h(k),to locate position. If no element, dictionary does not contain,e,.,4,Example,Dictionary Student Records,Keys are ID numbers (951000 - 952000), no more than 100 students,Hash function: h(k) = k-951000 maps ID into distinct table positions 0-1000,array table1001,.,0,1,2,3,1000,hash table,buckets,5,Analysis (Ideal Case),O(b) time to initialize hash table (b number of positions or buckets in hash table),O,(1) time to perform,insert, remove, search,6,Ideal Case is Unrealistic,Works for implementing dictionaries, but many applications have key ranges that are too large to have 1-1 mapping between buckets and keys!,Example:,Suppose key can take on values from 0 . 65,535 (2 byte unsigned int),Expect, 1,000 records at any given time,Impractical to use hash table with 65,536 slots!,7,Hash Functions,If key range too large, use hash table with fewer buckets and a hash function which maps multiple keys to same bucket:,h(k,1,) =, = h(k,2,): k,1,and k,2,have,collision,at slot ,Popular hash functions: hashing by division,h(k) = k%D, where D number of buckets in hash table,Example: hash table with 11 buckets,h(k) = k%11,80 3 (80%11= 3), 40 7, 65 10,58 3 collision!,8,Collision Resolution Policies,Two classes:,(1) Open hashing, a.k.a. separate chaining,(2) Closed hashing, a.k.a. open addressing,Difference has to do with whether collisions are stored,outside the table,(open hashing) or whether collisions result in storing one of the records at,another slot in the table,(closed hashing),9,Closed Hashing,Associated with closed hashing is a,rehash strategy,:,“If we try to place,x,in bucket,h(x),and find it occupied, find alternative location,h,1,(x),h,2,(x), etc. Try each in order, if none empty table is full,”,h(x),is called,home bucket,Simplest rehash strategy is called,linear hashing,h,i,(x) = (h(x) + i) % D,In general, our collision resolution strategy is to generate a sequence of hash table slots (probe sequence) that can hold the record; test each slot until find empty one (probing),10,Example Linear (Closed) Hashing,D=8, keys,a,b,c,d,have hash values h(a)=3, h(b)=0, h(c)=4, h(d)=3,0,2,3,4,5,6,7,1,b,a,c,Where do we insert,d,? 3 already filled,Probe sequence using linear hashing:,h,1,(d) = (h(d)+1)%8 = 4%8 = 4,h,2,(d) = (h(d)+2)%8 = 5%8 =,5*,h,3,(d) = (h(d)+3)%8 = 6%8 = 6,etc.,7, 0, 1, 2,Wraps around the beginning of the table!,d,11,Operations Using Linear Hashing,Test for membership:,findItem,Examine h(k), h,1,(k), h,2,(k), , until we find k or an empty bucket or home bucket,If no deletions possible, strategy works!,What if deletions?,If we reach empty bucket, cannot be sure that k is not somewhere else and empty bucket was occupied when k was inserted,Need special placeholder,deleted, to distinguish bucket that was never used from one that once held a value,May need to reorganize table after many deletions,12,Performance Analysis - Worst Case,Initialization: O(b), b# of buckets,Insert and search:,O,(n), n number of elements in table; all n key values have same home bucket,No better than linear list for maintaining dictionary!,13,Improved Collision Resolution,Linear probing: h,i,(x) = (h(x) + i) % D,all buckets in table will be candidates for inserting a new record before the probe sequence returns to home position,clustering of records, leads to long probing sequences,Linear probing with skipping:,h,i,(x) = (h(x) + ic) % D,c constant other than 1,records with adjacent home buckets will not follow same probe sequence,(Pseudo)Random probing:,h,i,(x) = (h(x) + r,i,) % D,r,i,is the i,th,value in a random permutation of numbers from 1 to D-1,insertions and searches use the,same,sequence of “random” numbers,14,Example,0,1,2,3,4,5,6,7,8,9,10,1001,9537,3016,9874,2009,9875,h(k) = k%11,0,1,2,3,4,5,6,7,8,9,10,1001,9537,3016,9874,2009,9875,1. What if next element has home bucket 0?, go to bucket 3,Same for elements with home bucket 1 or 2!,Only a record with home position 3 will stay., p = 4/11 that next record will go to bucket 3,2. Similarly, records hashing to 7,8,9,will end up in 10,3. Only records hashing to 4 will end up,in 4 (p=1/11); same for 5 and 6,I,II,insert 1052 (h.b. 7),1052,next element in bucket,3 with p = 8/11,15,Hash Functions -,Numerical Values,Consider: h(x) = x%16,poor distribution, not very random,depends solely on least significant four bits of key,Better,mid-square,method,if keys are integers in range 0,1,K , pick integer C such that DC,2,about equal to K,2, then,h(x) = x,2,/C % D,extracts middle,r,bits of x,2, where 2,r,=D (a base-D digit),better, because most or all of bits of key contribute to result,16,Hash Function ,Strings of Characters,Folding Method:,int h(String x, int D) ,int i, sum;,for (sum=0, i=0; ix.length(); i+),sum+= (int)x.charAt(i);,return (sum%D);,sums the ASCII values of the letters in the string,ASCII value for “A” =65;,sum,will be in range 650-900 for 10 upper-case letters; good when D around 100, for example,order of chars in string has no effect,17,Hash Function ,Strings of Characters,Polynomial hash codes,static long hashCode(String key, int D) ,int h=,key.charAt(0);,;,for (int i=1, ikey.length(); i+),h = h*a;,h += (int) key.charAt(i);,return h%D;,They have found that,a,= 33, 37, and 41 have less then 7 collisions.,18,Hash Function ,Strings of Characters,Much better: Cyclic Shift,static long hashCode(String key, int D) ,int h=0;,for (int i=0, i 27);,h += (int) key.charAt(i);,return h%D;,19,Open Hashing,Each bucket in the hash table is the head of a linked list,All elements that hash to a particular bucket are placed on that buckets linked list,Records within a bucket can be ordered in several ways,by order of insertion, by key value order, or by frequency of access order,20,Open Hashing Data Organization,0,1,2,3,4,D-1,.,.,.,21,Analysis,Open hashing is most appropriate when the hash table is kept in main memory, implemented with a standard in-memory linked list,We hope that number of elements per bucket roughly equal in size, so that the lists will be short,If there are,n,elements in set, then each bucket will have roughly,n/D,If we can estimate,n,and choose,D,to be roughly as large, then the average bucket will have only one or two members,22,Analysis Contd,Average time per dictionary operation:,D,buckets,n,elements in dictionary, average,n/D,elements per bucket,insert, search, remove,operation take O(1+n/D) time each,If we can choose D to be about n, constant time,Assuming each element is likely to be hashed to any bucket, running time constant, independent of n,23,Comparison with Closed Hashing,Worst case performance is O(n) for both,Number of operations for hashing,23 6 8 10 23 5 12 4 9 19,D=9,h(x) = x % D,24,Hashing Problem,Draw the 11 entry hashtable for hashing the keys 12, 44, 13, 88, 23, 94, 11, 39, 20 using the function (2i+5) mod 11, closed hashing, linear probing,Pseudo-code for listing all identifiers in a hashtable in lexicographic order, using open hashing, the hash function h(x) = first character of x. What is the running time?,25,
展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 图纸专区 > 大学资料


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!