Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Amortized analyses of self-organizing sequential search heuristics

Published: 01 April 1985 Publication History
  • Get Citation Alerts
  • Abstract

    The performance of sequential search can be enhanced by the use of heuristics that move elements closer to the front of the list as they are found. Previous analyses have characterized the performance of such heuristics probabilistically. In this article, we use amortization to analyze the heuristics in a worst-case sense; the relative merit of the heuristics in this analysis is different in the probabilistic analyses. Experiments show that the behavior of the heuristics on real data is more closely described by the amortized analyses than by the probabilistic analyses.

    References

    [1]
    Aho. A.V. Hopcroft. J.E., and Ullman, J.D. The Design and Analysis of Computer Algorifhms. Addison-Wesley, Reading, Mass., 1974.
    [2]
    Anderson, E.J. Nash, P. and Weber. R.R. A counterexample to a conjecture on optimal list ordering. \. Appt. Prob. 19, 3 (1982), 730- 732.
    [3]
    Bellows, M.U. Performance of self-organizing sequential search heuristics under stochastic reference models. Ph.D. dissertation, Dept. of Statistics, Carnegie-Mellon Univ. Pittsburgh, Pa. 1983.
    [4]
    Bitner. J.R. Heuristics that dynamically alter data structures to reduce their access time. Ph.D. dissertation, Univ. of Illinois, Urbana- Champaign, 1976.
    [5]
    Bitner. J.R. Heuristics that dynamically organize data structures. SIAM /. Comput. 8, 1 (Feb. 1979). 82-110.
    [6]
    Bitner, J.R. Two results on self-organizing data structures. Tech. Rep. TR-189. Dept. of Computer Science, Univ. of Texas at Austin, Austin, Tex. Jan. 1982.
    [7]
    Burville. P.J., and Kingman. J.F.C. On a model for storage and search. 1. App/. Prob. IO. 3 (Sept. 1973). 697-701.
    [8]
    Gannet, G., Munro. J.I. and Suwanda, H. Toward self-organizing sequential search heuristics. In Proceedings of 20th IEEE Symposium Foundations Compufer Science, (San Juan, Puerto Rico, 1979). 169-174.
    [9]
    Gannet. G., Munro. J.I., and Suwanda. H. Exegisis of self-organizing linear search. SIAM 1. Compuf. IO. 3 (Aug. 1981) 613-637.
    [10]
    Gotlieb. C.C. and Gotlieb. L.R. Data Types and Sfrucfures. Prentice Hall, Englewood Cliffs, N.J. 1978, p. 118.
    [11]
    Hendricks, W.J. The stationary distribution of an interesting Markov chain. 1, Appl. Prob. 9, 1 (Mar. 1972). 231-233.
    [12]
    Hendricks. W.J. An extension of a theorem concerning an interesting Markov chain. 1. Appl. Prob. IO. 4 (Dec. 1973). 886-890.
    [13]
    Hendricks. W.J. An account of self-organizing systems. SIAM J Comput, 5.4 (Dec. 1976). 715-723.
    [14]
    Kan. Y.C. and Ross. S.M. Optimal list order under partial memory constraints. \. Appl. Prob. 17, 4 (Dec. 1980) 1004-1015.
    [15]
    Knuth. D.E. The Art of Compufer Progmmming, Vol. 3: Sorting and Searching. Addison-Wesley, Reading, Mass., 1973.
    [16]
    Lam. K. Sui. M.K. and Yu. CT. A generalized counter scheme. Theoretical Compuf. Sci. 16. 3 {Dec. 1981) 271-278.
    [17]
    McCabe, J. On serial files with relocatable records. Oper. Res. 13,
    [18]
    McCreight. E. Personal communication, Xerox Palo Alto Research Center,Palo Alto, CA, Feb. 1983.
    [19]
    Rivest, R. On self-organizing sequential search heuristics. Commun. ACM 19. 2 (Feb. 1976). 63-67.
    [20]
    Schay. G. Jr., and Dauer. F.W. A probabilistic model of a self-organizing file system. SlAM J Appl. Mafh. 15, 4 (Feb. 1967). 874-888.
    [21]
    Sleator, Il. and Tarjan. R. Self-adjusting binary search trees. In Proceedings of 15fh Symposium on Theory o/Computing. (Boston, Mass., 1983). 235-245.
    [22]
    Sleator. D. and Tarjan. R. Amortized efficiency of list update and paging rules. Commun. ACM 28.2 {Feb. 1985). 202-208.
    [23]
    Tenenbaum. A. Simulations of dynamic sequential search algorithms. Commun. ACM 21. 9 {Sept. 1978). 790-791.
    [24]
    Tenenbaum. A. and Nemes. R.M. Two spectra of self-organizing sequential search algorithms. SIAM J Compuf. II. 3 (Aug. 1982). 557-566.
    [25]
    Veinott, A.F. Optimal policy in a dynamic, single product, nonstationary inventory mode with several demand classes. Oper. Res. 13, (1965); 761-778

    Cited By

    View all
    • (2024)Defending Hash Tables from Subterfuge with Depth ChargeProceedings of the 25th International Conference on Distributed Computing and Networking10.1145/3631461.3631550(134-143)Online publication date: 4-Jan-2024
    • (2024)Defending Hash Tables from Algorithmic Complexity Attacks with Resource BurningTheoretical Computer Science10.1016/j.tcs.2024.114762(114762)Online publication date: Aug-2024
    • (2021)Relative Worst-order AnalysisACM Computing Surveys10.1145/342591054:1(1-21)Online publication date: 2-Jan-2021
    • Show More Cited By

    Recommendations

    Reviews

    William Fennell Smyth

    This clearly written and well-researched paper deals with sequential searching of what it calls a “list” (an ordered set K={ k 1, . . . , k N} of keys k i), where after each successful search for a key k j, 1?Cj?CN, the keys are reordered dynamically according to a heuristic rule R. In particular, the rules considered are: :CR:A=:CT:A::Transpose k j and k j?1, j>1. R= M:Move k j to the first position of K. R= C:Update a frequency-of-search count for k j, and move k j so as to maintain the keys in descending order of count. The “best” rule will be the one that minimizes the “cost” (number of comparisons required) for the search. Traditionally, the asymptotic expected cost A R of a single search has been estimated: it turns out that A T? M and that A C is small, thus encouraging the use of rule T in preference to rule M and the use of rule C when storage is available for counts. In this paper, the authors employ a new nonprobabilistic approach: the total cost C R=C R( S) of searches on all keys in a given request sequence S is used as the criterion for rule selection. They show that on this basis C M and C C are small for any sequence S, while C T may become large. In contrast to the established approach, then, these theoretical results encourage the use of rule M, a conclusion reinforced by empirical tests devised by the authors. The heart of the authors' theoretical results is the concept of pairwise independence in the sequence S: a rule R has the Pairwise Independence Property (PIP) if, for every request sequence S, the number of comparisons of a particular key k j&egr; S against another particular key k h&egr; S is independent (using rule R) of all other keys in S. It seems then to be true (though the authors do not explicitly state this generalization of their results) that a sufficient condition for C R to be “small” is that R have PIP. Further, it would have been of interest if the authors had addressed the question of whether or not this condition is also necessary. Finally, in their empirical tests, the authors use key lists K which are initially empty, then gradually updated by unsuccessful searches. It would have been interesting to see what, if any, qualitative differences would have been introduced into the test results by using lists which initially already contained all the keys in some arbitrary order.

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Information & Contributors

    Information

    Published In

    cover image Communications of the ACM
    Communications of the ACM  Volume 28, Issue 4
    Lecture notes in computer science Vol. 174
    April 1985
    70 pages
    ISSN:0001-0782
    EISSN:1557-7317
    DOI:10.1145/3341
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 April 1985
    Published in CACM Volume 28, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)146
    • Downloads (Last 6 weeks)20
    Reflects downloads up to 12 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Defending Hash Tables from Subterfuge with Depth ChargeProceedings of the 25th International Conference on Distributed Computing and Networking10.1145/3631461.3631550(134-143)Online publication date: 4-Jan-2024
    • (2024)Defending Hash Tables from Algorithmic Complexity Attacks with Resource BurningTheoretical Computer Science10.1016/j.tcs.2024.114762(114762)Online publication date: Aug-2024
    • (2021)Relative Worst-order AnalysisACM Computing Surveys10.1145/342591054:1(1-21)Online publication date: 2-Jan-2021
    • (2021)On utilizing the transitivity pursuit-enhanced object partitioning to optimize self-organizing lists-on-listsEvolving Systems10.1007/s12530-021-09378-1Online publication date: 13-Apr-2021
    • (2020)LUISA: Decoupling the Frequency Model From the Context Model in Prediction-Based CompressionThe Computer Journal10.1093/comjnl/bxaa074Online publication date: 7-Jul-2020
    • (2020)On utilizing an enhanced object partitioning scheme to optimize self-organizing lists-on-listsEvolving Systems10.1007/s12530-020-09327-4Online publication date: 12-Feb-2020
    • (2020)Optimizing Self-organizing Lists-on-Lists Using Transitivity and Pursuit-Enhanced Object PartitioningArtificial Intelligence Applications and Innovations10.1007/978-3-030-49161-1_20(227-240)Online publication date: 29-May-2020
    • (2019)Towards a Unified ApproachAn Introduction to Medical Decision-Making10.1007/978-3-030-23147-7_9(97-119)Online publication date: 17-Oct-2019
    • (2019)Optimizing Self-organizing Lists-on-Lists Using Enhanced Object PartitioningArtificial Intelligence Applications and Innovations10.1007/978-3-030-19823-7_38(451-463)Online publication date: 12-May-2019
    • (2018)Relative Worst-Order Analysis: A SurveyAdventures Between Lower Bounds and Higher Altitudes10.1007/978-3-319-98355-4_13(216-230)Online publication date: 9-Aug-2018
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media