X-Git-Url: http://mj.ucw.cz/gitweb/?a=blobdiff_plain;f=ram.tex;h=d39d9ba73f727dcafe19cb5c368457090c72c09f;hb=e4ece93696bd08db4ef45ed8b29e76ba6c7848c4;hp=df7aa4164ea5d5630b7bfa333b0ca05ec23d920d;hpb=2281f2c9b2f8e979a77ce2255cb29408b2499519;p=saga.git diff --git a/ram.tex b/ram.tex index df7aa41..d39d9ba 100644 --- a/ram.tex +++ b/ram.tex @@ -307,6 +307,7 @@ scanning all~$n$ buckets takes $\O(n+m)$ time. %-------------------------------------------------------------------------------- \section{Data structures on the RAM} +\id{ramdssect} There is a~lot of data structures designed specifically for the RAM, taking advantage of both indexing and arithmetics. In many cases, they surpass the known @@ -500,9 +501,16 @@ assuming that the result fits in~$b$ bits: \:$\(x,\alpha)$ --- inserts~$\alpha$ into a~sorted vector $\bf x$: -We calculate $k = \(x,\alpha)$ first, then insert~$\alpha$ as the $k$-th +We calculate the rank of~$\alpha$ in~$x$ first, then we insert~$\alpha$ as the $k$-th field of~$\bf x$ using masking operations and shifts. +\algo +\:$k\=\(x,\alpha)$. +\:$\ell\=x \band \1^{(b+1)(n-k-1)}\0^{(b+1)(k+1)}$. \cmt{``left'' part of the vector} +\:$r=x \band \1^{(b+1)k}$. \cmt{``right'' part} +\:Return $(\ell\shl (b+1)) \bor (\alpha\shl ((b+1)k)) \bor r$. +\endalgo + \:$\(\alpha)$ --- creates a~vector whose elements are the bits of~$\(\alpha)_d$. In other words, inserts blocks~$\0^b$ between the bits of~$\alpha$. Assuming that $b\ge d$, we can do it as follows: @@ -643,7 +651,7 @@ in constant time, but so far only under the assumption that the number of these values is small enough and that the values themselves are also small enough (so that the whole set fits in $\O(1)$ machine words). Now we will show how to lift the restriction on the magnitude of the values and still keep constant time -complexity. We will describe a~simplified version of the Q-heaps developed by +complexity. We will describe a~slightly simplified version of the Q-heaps developed by Fredman and Willard in~\cite{fw:transdich}. The Q-heap represents a~set of at most~$k$ word-sized integers, where $k\le W^{1/4}$ @@ -652,41 +660,41 @@ of minimum and maximum, and other operations described below, in constant time, we are willing to spend~$\O(2^{k^4})$ time on preprocessing. The exponential-time preprocessing may sound alarming, but a~typical application uses -Q-heaps of size $k=\log^{1/4} N$, where $N$ is the size of the algorithm's input, -which guarantees that $k\le W^{1/4}$ and $\O(2^{k^4}) = \O(N)$. Let us however +Q-heaps of size $k=\log^{1/4} N$, where $N$ is the size of the algorithm's input. +This guarantees that $k\le W^{1/4}$ and $\O(2^{k^4}) = \O(N)$. Let us however remark that the whole construction is primarily of theoretical importance and that the huge constants involved everywhere make these heaps useless -for practical algorithms. However, many of the tricks used prove themselves +in practical algorithms. Many of the tricks used however prove themselves useful even in real-life implementations. -Preprocessing makes it possible to precompute tables for almost arbitrary functions -and then assume that they can be evaluated in constant time: +Spending the time on reprocessing makes it possible to precompute tables for +almost arbitrary functions and then assume that they can be evaluated in +constant time: \lemma\id{qhprecomp}% When~$f$ is a~function computable in polynomial time, $\O(2^{k^4})$ time is enough -to precompute a~table of the values of~$f$ for the values of its arguments whose total -bit size is $\O(k^3)$. +to precompute a~table of the values of~$f$ for all arguments whose size is $\O(k^3)$ bits. \proof There are $2^{\O(k^3)}$ possible combinations of arguments of the given size and for each of -them we spend $\O(k^c)$ time by calculating the function (for some~$c\ge 1$). It remains -to observe that $2^{\O(k^3)}\cdot \O(k^c) = \O(2^{k^4})$. +them we spend $\poly(k)$ time on calculating the function. It remains +to observe that $2^{\O(k^3)}\cdot \poly(k) = \O(2^{k^4})$. \qed \para We will first show an~auxiliary construction based on tries and then derive -the actual definition of the Q-heap from it. +the real definition of the Q-heap from it. \nota Let us introduce some notation first: \itemize\ibull \:$W$ --- the word size of the RAM, \:$k = \O(W^{1/4})$ --- the limit on the size of the heap, -\:$n\le k$ --- the number of elements in the represented set, +\:$n\le k$ --- the number of elements stored in the heap, \:$X=\{x_1, \ldots, x_n\}$ --- the elements themselves: distinct $W$-bit numbers indexed in a~way that $x_1 < \ldots < x_n$, -\:$c_i = \(x_i \bxor x_{i+1})$ --- the most significant bit of those in which $x_i$ and~$x_{i+1}$ differ, -\:$R_X(x)$ --- the rank of~$x$ in~$X$, that is the number of elements of~$X$, which are less than~$x$ +\:$g_i = \(x_i \bxor x_{i+1})$ --- the position of the most significant bit in which $x_i$ and~$x_{i+1}$ differ, +\:$R_X(x)$ --- the rank of~$x$ in~$X$, that is the number of elements of~$X$ which are less than~$x$ (where $x$~itself need not be an~element of~$X$).\foot{We will dedicate the whole chapter \ref{rankchap} to the study of various ranks.} \endlist @@ -695,22 +703,24 @@ study of various ranks.} A~\df{trie} for a~set of strings~$S$ over a~finite alphabet~$\Sigma$ is a~rooted tree whose vertices are the prefixes of the strings in~$S$ and there is an~edge going from a~prefix~$\alpha$ to a~prefix~$\beta$ iff $\beta$ can be -obtained from~$\alpha$ by adding a~single symbol of the alphabet. The edge -will be labeled with the particular symbol. We will also define a~\df{letter depth} -of a~vertex to be the length of the corresponding prefix and mark the vertices +obtained from~$\alpha$ by appending a~single symbol of the alphabet. The edge +will be labeled with the particular symbol. We will also define the~\df{letter depth} +of a~vertex as the length of the corresponding prefix. We mark the vertices which match a~string of~$S$. -A~\df{compressed trie} is obtained from the trie by removing the vertices of outdegree~1. -Whereever is a~directed path whose internal vertices have outdegree~1, we replace this -path by a~single edge labeled with the contatenation of the original edge's labels. +A~\df{compressed trie} is obtained from the trie by removing the vertices of outdegree~1 +except for the root and marked vertices. +Whereever is a~directed path whose internal vertices have outdegree~1 and they carry +no mark, we replace this path by a~single edge labeled with the contatenation +of the original edge's labels. -In both kinds of tries, we will order the outgoing edges of every vertex by their labels +In both kinds of tries, we order the outgoing edges of every vertex by their labels lexicographically. \obs -In both tries, the root of the tree is the empty word and for every vertex, the +In both tries, the root of the tree is the empty word and for every other vertex, the corresponding prefix is equal to the concatenation of edge labels on the path -leading from the root to the vertex. The letter depth of the vertex is equal to +leading from the root to that vertex. The letter depth of the vertex is equal to the total size of these labels. All leaves correspond to strings in~$S$, but so can some internal vertices if there are two strings in~$S$ such that one is a~prefix of the other. @@ -720,7 +730,7 @@ distinct and when we compress the trie, no two such labels have share their init symbols. This allows us to search in the trie efficiently: when looking for a~string~$x$, we follow the path from the root and whenever we visit an~internal vertex of letter depth~$d$, we test the $d$-th character of~$x$, -follow the edge whose label starts with this character, and check that the +we follow the edge whose label starts with this character, and we check that the rest of the label matches. The compressed trie is also efficient in terms of space consumption --- it has @@ -729,7 +739,7 @@ and all edge labels can be represented in space linear in the sum of the lengths of the strings in~$S$. \defn -For our set~$X$, we will define~$T$ as a~compressed trie for the set of binary +For our set~$X$, we define~$T$ as a~compressed trie for the set of binary encodings of the numbers~$x_i$, padded to exactly $W$~bits, i.e., for $S = \{ \(x)_W ; x\in X \}$. \obs @@ -738,99 +748,113 @@ length, the leaves of the trie correspond to these exact words, that is to the n The inorder traversal of the trie enumerates the words of~$S$ in lexicographic order and therefore also the~$x_i$'s in the order of their values. Between each pair of leaves $x_i$ and~$x_{i+1}$ it visits an~internal vertex whose letter depth -is exactly~$W-1-c_i$. +is exactly~$W-1-g_i$. \para Let us now modify the algorithm for searching in the trie and make it compare -only the first symbols of the edges. For $x\in X$, the algorithm will still -return the correct leave, for all~$x$ outside~$X$ it will no longer fail -and instead it will land in some leaf $x_i$. We will call the index of this leaf $T(x)$. -At the first sight this vertex may seem unrelated, but we will show that it can -be used to determine the rank of~$x$ in~$X$, which will later form a~basis -for all other Q-heap operations: +only the first symbols of the edges. In other words, we will test only the bits~$g_i$ +which will be called \df{guides} (as they guide us through the tree). For $x\in +X$, the modified algorithm will still return the correct leaf. For all~$x$ outside~$X$ +it will no longer fail and instead it will land on some leaf~$x_i$. At the +first sight the number~$x_i$ may seem unrelated, but we will show that it can be +used to determine the rank of~$x$ in~$X$, which will later form a~basis for all +Q-heap operations: \lemma\id{qhdeterm}% The rank $R_X(x)$ is uniquely determined by a~combination of: \itemize\ibull \:the trie~$T$, -\:the index $i=T(x)$ of the leaf visited when searching for~$x$ in~$T$, +\:the index~$i$ of the leaf found when searching for~$x$ in~$T$, \:the relation ($<$, $=$, $>$) between $x$ and $x_i$, \:the bit position $b=\(x\bxor x_i)$ of the first disagreement between~$x$ and~$x_i$. \endlist \proof -If $x\in X$, we detect that from $x_i=x$ and the rank is obviously~$i$ itself. -Let us assume that $x\not\in X$ and imagine that we follow the same path as during the search for~$T(x)$, +If $x\in X$, we detect that from $x_i=x$ and the rank is obviously~$i-1$. +Let us assume that $x\not\in X$ and imagine that we follow the same path as when +searching for~$x$, but this time we check the full edge labels. The position~$b$ is the first position where~$\(x)$ disagrees with a~label. Before this point, all edges not taken by the search were leading either to subtrees containing elements all smaller than~$x$ or all larger than~$x$ and the only values not known yet are those in the subtree below the edge which we currently consider. Now if $x[b]=0$ (and therefore $xn$, return {\sc undefined.} -\:Return $X[\varrho(i)]$. +\:Return~$x_i$. \algout The $i$-th smallest element in the heap. \endalgo +\para +The heap algorithms we have just described have been built from primitives +operating in constant time, with one notable exception: the extraction +$x[B]$ of all bits of~$x$ at positions specified by the set~$B$. This cannot be done +in~$\O(1)$ time on the Word-RAM, but we can implement it with ${\rm AC}^0$ +instructions as suggested by Andersson in \cite{andersson:fusion} or even +with those ${\rm AC}^0$ instructions present on real processors (see Thorup +\cite{thorup:aczero}). On the Word-RAM, we need to make use of the fact +that the set~$B$ is not changing too much --- there are $\O(1)$ changes +per Q-heap operation. As Fredman and Willard have shown, it is possible +to maintain a~``decoder'', whose state is stored in $\O(1)$ machine words, +and which helps us to extract $x[B]$ in a~constant number of operations: + +\lemman{Extraction of bits}\id{qhxtract}% +Under the assumptions on~$k$, $W$ and the preprocessing time as in the Q-heaps,\foot{% +Actually, this is the only place where we need~$k$ to be as low as $W^{1/4}$. +In the ${\rm AC}^0$ implementation, it is enough to ensure $k\log k\le W$. +On the other hand, we need not care about the exponent because it can +be arbitrarily increased using the Q-heap trees described below.} +it is possible to maintain a~data structure for a~set~$B$ of bit positions, +which allows~$x[B]$ to be extracted in $\O(1)$ time for an~arbitrary~$x$. +When a~single element is inserted to~$B$ or deleted from~$B$, the structure +can be updated in constant time, as long as $\vert B\vert \le k$. + +\proof +See Fredman and Willard \cite{fw:transdich}. +\qed + +\para +This was the last missing bit of the mechanics of the Q-heaps. We are +therefore ready to conclude this section by the following theorem +and its consequences: + +\thmn{Q-heaps, Fredman and Willard \cite{fw:transdich}}\id{qh}% +Let $W$ and~$k$ be positive integers such that $k=\O(W^{1/4})$. Let~$Q$ +be a~Q-heap of at most $k$-elements of $W$~bits each. Then the Q-heap +operations \ref{qhfirst} to \ref{qhlast} on~$Q$ (insertion, deletion, +search for a~given value and search for the $i$-th smallest element) +run in constant time on a~Word-RAM with word size~$W$, after spending +time $\O(2^{k^4})$ on the same RAM on precomputing of tables. + +\proof +Every operation on the Q-heap can be performed in a~constant number of +vector operations and calculations of ranks. The ranks are computed +in $\O(1)$ steps involving again $\O(1)$ vector operations, binary +logarithms and bit extraction. All these can be calculated in constant +time using the results of section \ref{bitsect} and Lemma \ref{qhxtract}. +\qed + +\rem +We can also use the Q-heaps as building blocks of more complex structures +like Atomic heaps and AF-heaps (see once again \cite{fw:transdich}). We will +show a~simpler, but useful construction, sometimes called the \df{Q-heap tree.} +Suppose we have a~Q-heap of capacity~$k$ and a~parameter $d\in{\bb N}^+$. We +can build a~balanced $k$-ary tree of depth~$d$ such that its leaves contain +a~given set and every internal vertex keeps the minimum value in the subtree +rooted in it, together with a~Q-heap containing the values in all its sons. +This allows minimum to be extracted in constant time (it is placed in the root) +and when any element is changed, it is sufficient to recalculate the values +from the path from this element to the root, which takes $\O(d)$ Q-heap +operations. + +\corn{Q-heap trees}\id{qhtree}% +For every positive integer~$r$ and $\delta>0$ there exists a~data structure +capable of maintaining the minimum of a~set of at most~$r$ word-sized numbers +under insertions and deletions. Each operation takes $\O(1)$ time on a~Word-RAM +with word size $W=\Omega(r^{\delta})$, after spending time +$\O(2^{r^\delta})$ on precomputing of tables. + +\proof +Choose $\delta' \le \delta$ such that $r^{\delta'} = \O(W^{1/4})$. Build +a~Q-heap tree of depth $d=\lceil \delta/\delta'\rceil$ containing Q-heaps of +size $k=r^{\delta'}$. \qed + +\rem\id{qhtreerem}% +When we have an~algorithm with input of size~$N$, the word size is at least~$\log N$ +and we can spend time $\O(N)$ on preprocessing, so we can choose $r=\log N$ and +$\delta=1$ in the above corollary and get a~heap of size $\log N$ working in +constant time per operation. + \endpart