Exercise 2.3 Use Theorem 2.1 to prove that R(BIT) <= 7/4 - 3/4l for both the dynamic and static list models. For dynamic lists, l is the maximum number.

Slides:



Advertisements
Similar presentations
CSE 4101/5101 Prof. Andy Mirzaian. Lists Move-to-Front Search Trees Binary Search Trees Multi-Way Search Trees B-trees Splay Trees Trees Red-Black.
Advertisements

Longest Common Subsequence
Knapsack Problem Section 7.6. Problem Suppose we have n items U={u 1,..u n }, that we would like to insert into a knapsack of size C. Each item u i has.
Exercise 1.1(Paid Exchanges Necessary) Consider the three-element list with the following initial configuration: (i.e. x1 is at the front). Prove that.
CS223 Advanced Data Structures and Algorithms 1 Greedy Algorithms Neil Tang 4/8/2010.
Online Algorithms Motivation and Definitions Paging Problem Competitive Analysis Online Load Balancing.
Theorems on divergent sequences. Theorem 1 If the sequence is increasing and not bounded from above then it diverges to +∞. Illustration =
HASH TABLES Malathi Mansanpally CS_257 ID-220. Agenda: Extensible Hash Tables Insertion Into Extensible Hash Tables Linear Hash Tables Insertion Into.
Theorem 1-a Let be a sequence: L L a) converges to a real number L iff every subsequence of converge to L Illustrations 0 0.
Binary search trees Definition Binary search trees and dynamic set operations Balanced binary search trees –Tree rotations –Red-black trees Move to front.
Copyright © 2007 Pearson Education, Inc. Slide 8-1.
Theorems on continuous functions. Weierstrass’ theorem Let f(x) be a continuous function over a closed bounded interval [a,b] Then f(x) has at least one.
Why is it the second most important theorem in calculus?
CSE 5314 On-line Computation Homework 1 Wook Choi Feb/26/2004.
Do Now Let 1. Which of the given polynomials is a factor of f(x)?
Properties of Inverse Matrices King Saud University.
2-5 PROVING ANGLES CONGRUENT Objective: to prove and apply theorems about angles.
An algorithm of Lock-free extensible hash table Yi Feng.
Theorem Suppose {a n } is non-decreasing and bounded above by a number A. Then {a n } converges to some finite limit a, with a  A. Suppose {b n } is non-increasing.
2 2.2 © 2016 Pearson Education, Ltd. Matrix Algebra THE INVERSE OF A MATRIX.
CSE 5314 – Spring 2004 Homework #1 - Solutions [Soumya Sanyal] Q 1.5: Prove that the algorithm “MTF every-other-access” (i.e. move the item to the front.
Math 3121 Abstract Algebra I Lecture 6 Midterm back over+Section 7.
Chapter 7: Sorting (Insertion Sort, Shellsort)
Chapter 6 Differentiation.
Chapter 3 The Real Numbers.
Binary search trees Definition
Chapter 5 Limits and Continuity.
CSE322 PUMPING LEMMA FOR REGULAR SETS AND ITS APPLICATIONS
Points of condensation
Exercise 3.10 Prove Theorem 3.8 R(ALG) >= k(s+1)/(k+s) Solution:
1.6 Further Results on Systems
Hashing Alexandra Stefan.
Stacks and Queues.
Amortized Analysis The problem domains vary widely, so this approach is not tied to any single data structure The goal is to guarantee the average performance.
Hashing Alexandra Stefan.
Exercise Exercise Proof that
Chapter 5. Optimal Matchings
First Derivative Test So far…
Sequences (11/13/13) A sequence is an infinite list of real numbers: {a1, a2, a3, a4, a5 ….} = {an}. (Order counts!) A sequence can be described by listing.
Clicker Question 1 The shortest interval which the Integral Test guarantees us will contain the value of is: A. 0 to 1 B. 0 to ½ C.
Question Suppose exists, find the limit: (1) (2) Sol. (1) (2)
أنماط الإدارة المدرسية وتفويض السلطة الدكتور أشرف الصايغ
3-2 Solving Inequalities Using Addition or Subtraction
Chapter 4 Sequences.
Advanced Algorithms Analysis and Design
Metatheorems Computational Logic Lecture 8
The Fundamental Theorem of Calculus
Affine Spaces Def: Suppose
Module 12a: Dynamic Hashing
Divide-and-Conquer 7 2  9 4   2   4   7
X y y = x2 - 3x Solutions of y = x2 - 3x y x –1 5 –2 –3 6 y = x2-3x.
Data Structures & Algorithms
Chapter 7: Sorting (Insertion Sort, Shellsort)
Advanced Analysis of Algorithms
Chapter 11: Further Topics in Algebra
Binary SearchTrees [CLRS] – Chap 12.
Further Investigations on Averages
(c) Project Maths Development Team 2011
The Wronskian and Linear Independence
Algebraic Identities.
Exercise Solve x – 14 = 35. x = 49.
Totally Asynchronous Iterative Algorithms
Copyright © Cengage Learning. All rights reserved.
Matrix Algebra THE INVERSE OF A MATRIX © 2012 Pearson Education, Inc.
Chapter 11 Trees © 2011 Pearson Addison-Wesley. All rights reserved.
Vector Spaces COORDINATE SYSTEMS © 2012 Pearson Education, Inc.
Proportion table problems
Mathematical Background: Primes and (GF)
Variations table problems
Presentation transcript:

Exercise 2.3 Use Theorem 2.1 to prove that R(BIT) <= 7/4 - 3/4l for both the dynamic and static list models. For dynamic lists, l is the maximum number of items present in the list at any point in time. Solution: Theorem 2.1: Let σ be the request sequence of n accesses. Then E[BIT(σ)] <= 7OPT(σ)/4 - 3n/4. The above holds true for both dynamic and static lists.

For dynamic lists, BIT needs to handle insertion of a new item in the list. In general, the insertion is equivalent to the first access of the new item in a list of a bigger size. Thus, BIT inserts an item in the list, randomly initializes the bit of the new item, then moves it to the front if its bit is 1. The analysis applied for Theorem 2.1 to accesses show that an insertion would result in the same expected cost as an access. Note: For a deletion, inversions with the deleted item disappear, so potential function decreases even more than during an access.

Now, with a maximum of l items in the list and n accesses, OPT(σ) <= nl. Hence, E[BIT(σ)] <= 7OPT(σ)/4 - 3n/4 <= (7/4 - 3/4l)OPT(σ) which proves that R(BIT) <= 7/4 - 3/4l.