{"title":"用边缘压缩平衡 mary 搜索树","authors":"Shuyang Gao, Leen Hatem, Hosam Mahmoud","doi":"10.1007/s00236-023-00448-2","DOIUrl":null,"url":null,"abstract":"<div><p>We investigate the performance of random <i>m</i>-ary trees grown under an algorithm that perfectly balances <i>k</i> levels, whenever the opportunity arises in a fringe subtree. The average-case analysis shows that considerable saving in space and search time is achieved by such <b>a</b> fringe balancing algorithm.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 1","pages":"53 - 66"},"PeriodicalIF":0.4000,"publicationDate":"2023-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Balancing m-ary search trees with compressions on the fringe\",\"authors\":\"Shuyang Gao, Leen Hatem, Hosam Mahmoud\",\"doi\":\"10.1007/s00236-023-00448-2\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>We investigate the performance of random <i>m</i>-ary trees grown under an algorithm that perfectly balances <i>k</i> levels, whenever the opportunity arises in a fringe subtree. The average-case analysis shows that considerable saving in space and search time is achieved by such <b>a</b> fringe balancing algorithm.</p></div>\",\"PeriodicalId\":7189,\"journal\":{\"name\":\"Acta Informatica\",\"volume\":\"61 1\",\"pages\":\"53 - 66\"},\"PeriodicalIF\":0.4000,\"publicationDate\":\"2023-12-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Acta Informatica\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://link.springer.com/article/10.1007/s00236-023-00448-2\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Acta Informatica","FirstCategoryId":"94","ListUrlMain":"https://link.springer.com/article/10.1007/s00236-023-00448-2","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
摘要
我们研究了在一种算法下生长的随机 mary 树的性能,这种算法能在边缘子树出现机会时完美地平衡 k 层。平均情况分析表明,这种边缘平衡算法大大节省了空间和搜索时间。
Balancing m-ary search trees with compressions on the fringe
We investigate the performance of random m-ary trees grown under an algorithm that perfectly balances k levels, whenever the opportunity arises in a fringe subtree. The average-case analysis shows that considerable saving in space and search time is achieved by such a fringe balancing algorithm.
期刊介绍:
Acta Informatica provides international dissemination of articles on formal methods for the design and analysis of programs, computing systems and information structures, as well as related fields of Theoretical Computer Science such as Automata Theory, Logic in Computer Science, and Algorithmics.
Topics of interest include:
• semantics of programming languages
• models and modeling languages for concurrent, distributed, reactive and mobile systems
• models and modeling languages for timed, hybrid and probabilistic systems
• specification, program analysis and verification
• model checking and theorem proving
• modal, temporal, first- and higher-order logics, and their variants
• constraint logic, SAT/SMT-solving techniques
• theoretical aspects of databases, semi-structured data and finite model theory
• theoretical aspects of artificial intelligence, knowledge representation, description logic
• automata theory, formal languages, term and graph rewriting
• game-based models, synthesis
• type theory, typed calculi
• algebraic, coalgebraic and categorical methods
• formal aspects of performance, dependability and reliability analysis
• foundations of information and network security
• parallel, distributed and randomized algorithms
• design and analysis of algorithms
• foundations of network and communication protocols.