• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

The Soft Heap: An Approximate Priority Queue with Optimal Error Rate, (2000)

by B Chazelle
Venue:Journal of the ACM ,
Add To MetaCart

Tools

Sorted by:
Results 11 - 20 of 24
Next 10 →

An Inverse-Ackermann Style Lower Bound for Online Minimum Spanning Tree Verification

by Seth Pettie - Combinatorica
"... 1 Introduction The minimum spanning tree (MST) problem has seen a flurry of activity lately, driven largely by the success of a new approach to the problem. The recent MST algorithms [20, 8, 29, 28], despite their superficial differences, are all based on the idea of progressively improving an appro ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
1 Introduction The minimum spanning tree (MST) problem has seen a flurry of activity lately, driven largely by the success of a new approach to the problem. The recent MST algorithms [20, 8, 29, 28], despite their superficial differences, are all based on the idea of progressively improving an approximately minimum solution, until the actual minimum spanning tree is found. It is still likely that this progressive improvement approach will bear fruit. However, the current
(Show Context)

Citation Context

...gorithms [23, 10, 33] were made possible by even more fundamental algorithms and data structures, namely Komlós’s minimum spanning tree verification algorithm [27, 17, 24, 5] and Chazelle’s Soft Heap =-=[11]-=-. It has been speculated by some (see, e.g., Chazelle [10, p. 1029]) that the key to a faster MST algorithm is some interesting new data structure. In this paper we show that there are no linear solut...

A Simpler Implementation and Analysis of Chazelle’s Soft Heaps

by Haim Kaplan, Uri Zwick - In Proc. of the 19th ACM-SIAM Symposium on Discrete Algorithms , 2009
"... Chazelle (JACM 47(6), 2000) devised an approximate meldable priority queue data structure, called Soft Heaps, and used it to obtain the fastest known deterministic comparison-based algorithm for computing minimum spanning trees, as well as some new algorithms for selection and approximate sorting pr ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Chazelle (JACM 47(6), 2000) devised an approximate meldable priority queue data structure, called Soft Heaps, and used it to obtain the fastest known deterministic comparison-based algorithm for computing minimum spanning trees, as well as some new algorithms for selection and approximate sorting problems. If n elements are inserted into a collection of soft heaps, then up to εn of the elements still contained in these heaps, for a given error parameter ε, maybecorrupted, i.e., have their keys artificially increased. In exchange for allowing these corruptions, each soft heap operation is performed in O(log 1 ε) amortized time. Chazelle’s soft heaps are derived from the binomial heaps data structure in which each priority queue is composed of a collection of binomial trees. We describe a simpler and more direct implementation of soft heaps in which each priority queue is composed of a collection of standard binary trees. Our implementation has the advantage that no clean-up operations similar to the ones used in Chazelle’s implementation are required. We also present a concise and unified potential-based amortized analysis of the new implementation. 1
(Show Context)

Citation Context

...rations similar to the ones used in Chazelle’s implementation are required. We also present a concise and unified potential-based amortized analysis of the new implementation. 1 Introduction Chazelle =-=[4, 2]-=- devised an approximate meldable priority queue data structure, called Soft Heaps, and used it to obtain the fastest known deterministic comparisonbased algorithm for computing minimum spanning trees ...

Improved Methods for Solving Traffic Flow Problems in Dynamic Networks

by Nathaniel J. Grier, Associate Professor Of Civil, Ismail Chabini, Nathaniel J. Grier , 2002
"... Dynamic networks are pervasive, present in many transportation and non-transporta-tion contexts. We present improved methods for solving two of the primary problems in dynamic networks: dynamic shortest paths and the Dynamic Network Loading Problem (DNLP). In each case we also propose a solution alg ..."
Abstract - Add to MetaCart
Dynamic networks are pervasive, present in many transportation and non-transporta-tion contexts. We present improved methods for solving two of the primary problems in dynamic networks: dynamic shortest paths and the Dynamic Network Loading Problem (DNLP). In each case we also propose a solution algorithm and an imple-mentation of the algorithm. We first explore the one-to-all dynamic shortest path problem for discrete time networks for all departure times. A new framework for the problem is proposed in which the problem is viewed as series of static reoptimization problems. By posing the problem in this manner, we are able to reuse the information regarding the short-est path trees calculated for earlier departure times. The results of computational tests are provided showing significant savings in computation times over traditional methods when the percentage of dynamic links is small. We next present a method for achieving an exact solution to a class of the continuous-time and space model formulation of the DNLP. The model of a link
(Show Context)

Citation Context

...e underlying data structures used in the problem other than a traditional heap. Recently, for example, an "error-prone" heap has been proposed, but one in which the error rate is known and controlled =-=[9]-=-. It would be interesting to examine whether the runtime savings associated with such a data structure would outweigh the extra work which would 88 need to be done to correct errors in the order in wh...

7 Binomial, Fibonacci, and Pairing Heaps

by Michael L Fredman
"... ..."
Abstract - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...ractmin operations initiated with an empty heap, at the time a given item x is deleted we can attribute to x a contribution bounded by O(log op(x)) to the total running time of the sequence, where op(x) is the number of heap operations that have taken place since x bound applies for skew and skew-pairing heaps [8]. Knuth [10] has observed, at least in qualitative terms, similar behavior for leftist heaps . Quoting Knuth: Leftist trees are in fact already obsolete, except for applications with a strong tendency towards last-in-first-out behavior. Soft Heaps An interesting development (Chazelle [1]) that builds upon and extends binomial heaps in a different direction is a data structure referred to as a soft heap. The soft heap departs from the standard notion of priority queue by allowing for a type of error, referred to as corruption, which confers enhanced efficiency. When an item becomes corrupted, its key value gets increased. Findmin returns the minimum current key, which might or might not be corrupted. The user has no control over which items become corrupted, this prerogative belonging to the data structure. But the user does control the overall amount of corruption in the foll...

An optimal minimum spanning tree algorithm

by Claus Andersen , 2008
"... ..."
Abstract - Add to MetaCart
Abstract not found

Efficient Algorithms and Data Structures for Massive Data Sets

by Alka , 2010
"... ..."
Abstract - Add to MetaCart
Abstract not found

4. TITLE AND SUBTITLE

by Gedare Bloom, Rahul Simha , 2013
"... Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments ..."
Abstract - Add to MetaCart
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number.

1 Introduction Minimum Spanning Trees ∗

by Bang Ye, Wu Kun-mao Chao
"... ..."
Abstract - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...ea is to compute suboptimal independent sets in a nongreedy fashion, and then progressively improve upon them until an optimal solution is reached. 9sAn approximate priority queue, called a soft heap =-=[3]-=-, is used to construct a suboptimal spanning tree, whose quality is progressively refined until a minimum spanning tree is finally produced. Seth Pettie and Vijaya Ramachandran [15] established that t...

List Heuristic Scheduling Algorithms for Distributed Memory Systems with Improved Time Complexity

by Maruf Ahmed, Sharif M. H. Chowdhury, Masud Hasan
"... Abstract. We present a compile time list heuristic scheduling algorithm called Low Cost Critical Path algorithm (LCCP) for the distributed memory systems. LCCP has low scheduling cost for both homogeneous and heterogeneous systems. In some recent papers list heuristic scheduling algorithms keep thei ..."
Abstract - Add to MetaCart
Abstract. We present a compile time list heuristic scheduling algorithm called Low Cost Critical Path algorithm (LCCP) for the distributed memory systems. LCCP has low scheduling cost for both homogeneous and heterogeneous systems. In some recent papers list heuristic scheduling algorithms keep their scheduling cost low by using a fixed size heap and a FIFO, where the heap always keeps fixed number of tasks and the excess tasks are inserted in the FIFO. When the heap has empty spaces, tasks are inserted in it from the FIFO. The best known list scheduling algorithm based on this strategy requires two heap restoration operations, one after extraction and another after insertion. Our LCCP algorithm improves on this by using only one such operation for both the extraction and insertion, which in theory reduces the scheduling cost without compromising the scheduling performance. In our experiment we compare LCCP with other well known list scheduling algorithms and it shows that LCCP is the fastest among all. 1
(Show Context)

Citation Context

...that the scheduling costs of LCCP is better than any other algorithm for any number of processors. Fig. 3(b) closely compares LCCP with FCP. LCCP has the lower scheduling cost even when the soft heap =-=[2]-=- is used as priorityqueueinFCP.So,thescheduling cost of the LCCP is less than any other scheduling algorithm and 29.5% to 41.8% better (less) than that of FCP. Normalized Scheduling Length(NSL)isameas...

1.1 History and Content........................... 6

by Jinna Lei , 2010
"... 1.2 The problem, formally.......................... 6 1.2.1 Some definitions......................... 6 ..."
Abstract - Add to MetaCart
1.2 The problem, formally.......................... 6 1.2.1 Some definitions......................... 6
(Show Context)

Citation Context

...he item away from the heap. • deletemin() returns the item with minimum key and removes it from the heap. • meld(otherHeap) which combines two heaps. The soft heap, an earlier invention of Chazelle’s =-=[5]-=-, plays a central part in lowering the running time bound. We have seen, as in Kruskal’s and Prim’s, that insisting on correctness at every step leads to unnecessary overhead. In Kruskal’s sorting the...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University