Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

Worst-case Analysis of Set Union Algorithms

Published: 30 March 1984 Publication History
First page of PDF

References

[1]
ACKERMANN, W. Zum Hilbertschen Aufbau tier reellen Zahlen. Math. Ann. 99 (1928), i |$-!33.
[2]
AHO, A.V., HOPCROFr, J.E., AND ULLMAN, J.D. The Design and Analysis of Computer Algorithms. Addison-Wesley, Reading, Mass., 1974.
[3]
BANACHOWSKI, L. A complement to Tarjan's result about the lower bound on the complexity of the set union problem. Inf. Process. Lett. 11 (1980), 59-65.
[4]
DUKSTRA, E.W. A Discipline of Programming. Prentice-Hall, Englewood Cliffs, N.J., 1976.
[5]
FISCHER, M.J.Efficiency of equivalence algorithms. In Complexity of Computer Computations, R. E. Miller and J. W. Thatcher, Eds. Plenum Press, New York, 1972, pp. 153-168.
[6]
GABOW, H.N., AND TA~AN, R.E. A linear-time algorithm for a special case of disjoint set union. In Proceedings of the 15th ACM Symposium on Theory of Computing (Boston, Mass., Apr. 25-27). ACM, New York, 1983, pp. 246-251.
[7]
GALLER, B.A., AND FISHER, M.j.An improved equivalence algorithm. Commun. ACM 7, 5 (May 1964), 301-303.
[8]
HOPCaOFr, J.E., AND ULLMAN, J.D. Set-merging algorithms. SIAM J. Comlmt. 2 (1973), 294- 303.
[9]
LAO, M.J. A new data structure for the union-find problem. IrOn. Process. Lett. 9 (1979), 39-45.
[10]
TARJAN, R.E.Efficiency of a good but not linear set union algorithm. ~ ACM 22, 2 (Apr. 1975), 215-225.
[11]
TAIUAN, R.E.A class of algorithms which require nonlinear time to maintain disjoint seas. J. Comput. Syst. Scl. 18 (1979), 110-127.
[12]
TARJAN, R.E.Applications of path compression on balanced trees. Z ACM 26, 4 (Oct. 1979), 690-715.
[13]
VAN LEEUWEN, J., AND VAN DER WEIDE, T.Alternative path compression techniques, Tech. Rcp. RUU-CS-77-3, Rijksuniversiteit Utrecht, Utrecht, The Netherlands, 1977.
[14]
VAN DER WEIDE, T Datastructures: An Axiomatw Approach and the Use of Binomial Trees in Developing and Analyzing Algorithms. Mathematisch Centrum, Amsterdam, 1980.

Cited By

View all
  • (2024)Querying Structural Diversity in Streaming GraphsProceedings of the VLDB Endowment10.14778/3641204.364121317:5(1034-1046)Online publication date: 1-Jan-2024
  • (2024)Solving Strong-Substitutes Product-Mix AuctionsMathematics of Operations Research10.1287/moor.2019.024849:3(1502-1534)Online publication date: 1-Aug-2024
  • (2024)PANDORA: A Parallel Dendrogram Construction Algorithm for Single Linkage Clustering on GPUProceedings of the 53rd International Conference on Parallel Processing10.1145/3673038.3673148(908-918)Online publication date: 12-Aug-2024
  • Show More Cited By

Recommendations

Reviews

William Fennell Smyth

A typical set union problem is to determine a minimum-cost spanning tree (for example, spanning the nodes of a communications network). A Set Union Algorithm (SUA) consists of some sequence of the following fundamental operations: make set ( ): Create a new set with canonical element x; link (x,y): Combine two sets with canonical elements x, y into a single set whose canonical element is either x or y; find (x): Return the canonical element of the set containing the element x. It is supposed that the SUA includes altogether n make set operations and m find operations and that each set is structured as a tree with the canonical element as the root. An SUA is said to be separable if the canonical elements are initially assigned to separate sets. The authors first derive a new worst case lower bound :9I ( n + m &agr; ( m + n, n)) on the execution time for any separable SUA, where the function &agr; is an inverse of a modified Ackermann function (for practical purposes, 1 :9I &agr; :9I 4). The bulk of the paper is devoted to the consideration of various link and find strategies: Denote by size (x) the number of nodes in the tree rooted at x, and by rank (x) the length of the longest path from x to a leaf node. The link strategies considered are then based on the choice of the canonical element (root) for the combined set: naive linking: Choose either root ( x or y) arbitrarily; linking by size: Choose the root of largr size; linking by rank: Choose the root of larger rank. The authors show that if either linking by size or linking by rank is used, the worst case execution time of any separable SUA is &THgr;( n + m log n). The main find strategies considered are compression, splitting, and halving. These strategies may roughly be described as compactions; that is, for every node y on the path from x to the root which is not the root or a child of the root, find (x) resets the parent pointer (cp ( y) either to p( p( y)) or to some more distant ancestor. The authors then show inter alia that: (1)Separable SUAs which employ either linking by size or linking by rank together with any compaction strategy have a worst case execution time O( n + m&agr;( m + n, n:)) and are therefore asymptotically optimal; (2)for m :9I n, naive linking together with any compaction strategy yields asymptotic worst case execution time &THgr;( m log b n), where b = 1 + m/ n:; and (3)for m :9I n for linking by size or linking by rank, compaction strategies dominate other find strategies previously proposed in the literature ( reversal, collapsing, and splicing. This paper is based upon substantial previous work in the field by bother authors. By deriving new &THgr; bounds on worst case execution time, it provides important insights into efficient SUA strategies. The combinatorial arguments used to derive these bound depend heavily on the multiple partition technique due to Tarjan. These arguments are not for the faint of heart.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of the ACM
Journal of the ACM  Volume 31, Issue 2
April 1984
245 pages
ISSN:0004-5411
EISSN:1557-735X
DOI:10.1145/62
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 March 1984
Published in JACM Volume 31, Issue 2

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)736
  • Downloads (Last 6 weeks)112
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Querying Structural Diversity in Streaming GraphsProceedings of the VLDB Endowment10.14778/3641204.364121317:5(1034-1046)Online publication date: 1-Jan-2024
  • (2024)Solving Strong-Substitutes Product-Mix AuctionsMathematics of Operations Research10.1287/moor.2019.024849:3(1502-1534)Online publication date: 1-Aug-2024
  • (2024)PANDORA: A Parallel Dendrogram Construction Algorithm for Single Linkage Clustering on GPUProceedings of the 53rd International Conference on Parallel Processing10.1145/3673038.3673148(908-918)Online publication date: 12-Aug-2024
  • (2024)Graph Summarization: Compactness Meets EfficiencyProceedings of the ACM on Management of Data10.1145/36549432:3(1-26)Online publication date: 30-May-2024
  • (2024)Reference Counting Deeply Immutable Data Structures with Cycles: An Intellectual AbstractProceedings of the 2024 ACM SIGPLAN International Symposium on Memory Management10.1145/3652024.3665507(131-141)Online publication date: 20-Jun-2024
  • (2024)Hierarchical Structure Construction on HypergraphsProceedings of the 33rd ACM International Conference on Information and Knowledge Management10.1145/3627673.3679765(1597-1606)Online publication date: 21-Oct-2024
  • (2024)Query Optimization for Ontology-Mediated Query AnsweringProceedings of the ACM Web Conference 202410.1145/3589334.3645567(2138-2148)Online publication date: 13-May-2024
  • (2024)A Multi-Layer Solver for XPBDProceedings of the ACM SIGGRAPH/Eurographics Symposium on Computer Animation10.1111/cgf.15186(1-11)Online publication date: 21-Aug-2024
  • (2024)PPA-DBSCAN: Privacy-Preserving -Approximate Density-Based ClusteringIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.337534721:6(5324-5340)Online publication date: Nov-2024
  • (2024)An Efficient Algorithm for Computing Mountain Prominence in Almost Linear Time2024 International Conference on INnovations in Intelligent SysTems and Applications (INISTA)10.1109/INISTA62901.2024.10683840(1-6)Online publication date: 4-Sep-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media