Priority Queues and Heaps in Java Collections

Priority Queues & Heaps
Chapter 9
Interface
Abstract Class
Class
The Java Collections Framework (Ordered Data Types)
Based on priority heap
Elements are prioritized based either on
natural order
a
 
c
o
m
p
a
r
a
t
o
r
,
 
p
a
s
s
e
d
 
t
o
 
t
h
e
 
c
o
n
s
t
r
u
c
t
o
r
.
P
r
o
v
i
d
e
s
 
a
n
 
i
t
e
r
a
t
o
r
Priority Queue ADT
A
 
p
r
i
o
r
i
t
y
 
q
u
e
u
e
 
s
t
o
r
e
s
 
a
 
c
o
l
l
e
c
t
i
o
n
 
o
f
 
e
n
t
r
i
e
s
E
a
c
h
 
e
n
t
r
y
 
i
s
 
a
 
p
a
i
r
 
(
k
e
y
,
 
v
a
l
u
e
)
Main methods of the Priority Queue ADT
i
n
s
e
r
t
(
k
,
 
x
)
 
i
n
s
e
r
t
s
 
a
n
 
e
n
t
r
y
 
w
i
t
h
 
k
e
y
 
k
 
a
n
d
 
v
a
l
u
e
 
x
r
e
m
o
v
e
M
i
n
(
)
 
r
e
m
o
v
e
s
 
a
n
d
 
r
e
t
u
r
n
s
 
t
h
e
 
e
n
t
r
y
 
w
i
t
h
 
s
m
a
l
l
e
s
t
 
k
e
y
Additional methods
m
i
n
(
)
 
r
e
t
u
r
n
s
,
 
b
u
t
 
d
o
e
s
 
n
o
t
 
r
e
m
o
v
e
,
 
a
n
 
e
n
t
r
y
 
w
i
t
h
 
s
m
a
l
l
e
s
t
 
k
e
y
s
i
z
e
(
)
,
 
i
s
E
m
p
t
y
(
)
Applications:
Process scheduling
Standby flyers
Total Order Relations
Keys in a priority
queue can be
arbitrary objects on
which an order is
defined
Two distinct entries
in a priority queue
can have the same
key
Mathematical concept
of total order relation ≤
Reflexive property:
x 
 x
Antisymmetric property:
x 
 y
 
 
y 
 x 
 
x 
=
 y
Transitive property:
 
x 
 y
 
 
y 
 z 
 
x 
 z
Entry ADT
A
n
 
e
n
t
r
y
 
i
n
 
a
 
p
r
i
o
r
i
t
y
q
u
e
u
e
 
i
s
 
s
i
m
p
l
y
 
a
 
k
e
y
-
v
a
l
u
e
 
p
a
i
r
Methods:
g
e
t
K
e
y
(
)
:
 
r
e
t
u
r
n
s
 
t
h
e
 
k
e
y
 
f
o
r
t
h
i
s
 
e
n
t
r
y
g
e
t
V
a
l
u
e
(
)
:
 
r
e
t
u
r
n
s
 
t
h
e
v
a
l
u
e
 
f
o
r
 
t
h
i
s
 
e
n
t
r
y
As a Java interface:
/**
  * Interface for a key-value
  * pair entry
 **/
p
u
b
l
i
c
 
i
n
t
e
r
f
a
c
e
 
 
E
n
t
r
y
 
 
{
 
 
 
 
p
u
b
l
i
c
 
 
O
b
j
e
c
t
 
g
e
t
K
e
y
(
)
;
 
 
 
 
p
u
b
l
i
c
 
 
O
b
j
e
c
t
 
g
e
t
V
a
l
u
e
(
)
;
}
Comparator ADT
A comparator encapsulates the action of comparing two
objects according to a given total order relation
A generic priority queue uses an auxiliary comparator
The comparator is external to the keys being compared
When the priority queue needs to compare two keys, it
uses its comparator
The primary method of the Comparator ADT:
c
o
m
p
a
r
e
(
a
,
 
b
)
:
Returns an integer 
i 
such that
i < 
0 if 
a < b
i 
= 0 if 
a 
= 
b
i > 
0 if 
a > b
an error occurs if 
a 
and 
b 
cannot be compared.
Example Comparator
/** Comparator for 2D points under the
standard lexicographic order. */
p
u
b
l
i
c
 
c
l
a
s
s
 
 
L
e
x
i
c
o
g
r
a
p
h
i
c
 
 
i
m
p
l
e
m
e
n
t
s
C
o
m
p
a
r
a
t
o
r
 
 
{
 
 
 
 
i
n
t
 
 
x
a
,
 
y
a
,
 
x
b
,
 
y
b
;
 
 
 
 
p
u
b
l
i
c
 
i
n
t
 
 
c
o
m
p
a
r
e
(
O
b
j
e
c
t
 
a
,
 
O
b
j
e
c
t
 
b
)
t
h
r
o
w
s
 
 
C
l
a
s
s
C
a
s
t
E
x
c
e
p
t
i
o
n
 
 
{
       xa = ((Point2D) a).getX();
       ya = ((Point2D) a).getY();
       xb = ((Point2D) b).getX();
       yb = ((Point2D) b).getY();
 
 
 
 
 
 
 
i
f
 
 
(
x
a
 
!
=
 
x
b
)
r
e
t
u
r
n
 
 
(
x
a
 
-
 
x
b
)
;
 
 
 
 
 
 
 
e
l
s
e
r
e
t
u
r
n
 
 
(
y
a
 
-
 
y
b
)
;
   }
}
/** Class representing a point in the
plane with integer coordinates */
p
u
b
l
i
c
 
c
l
a
s
s
 
 
P
o
i
n
t
2
D
{
 
 
 
 
p
r
o
t
e
c
t
e
d
 
i
n
t
 
x
c
,
 
y
c
;
 
/
/
 
c
o
o
r
d
i
n
a
t
e
s
 
 
 
 
p
u
b
l
i
c
 
 
P
o
i
n
t
2
D
(
i
n
t
 
 
x
,
 
 
i
n
t
 
 
y
)
 
 
{
       xc = x;
       yc = y;
   }
 
 
 
 
p
u
b
l
i
c
 
i
n
t
 
 
g
e
t
X
(
)
 
 
{
r
e
t
u
r
n
 
 
x
c
;
    }
 
 
 
 
p
u
b
l
i
c
 
i
n
t
 
 
g
e
t
Y
(
)
 
 
{
r
e
t
u
r
n
 
 
y
c
;
    }
}
Sequence-based Priority Queue
Implementation with an
unsorted list
Performance:
i
n
s
e
r
t
 
t
a
k
e
s
 
O
(
1
)
 
t
i
m
e
 
s
i
n
c
e
w
e
 
c
a
n
 
i
n
s
e
r
t
 
t
h
e
 
i
t
e
m
 
a
t
t
h
e
 
b
e
g
i
n
n
i
n
g
 
o
r
 
e
n
d
 
o
f
 
t
h
e
s
e
q
u
e
n
c
e
r
e
m
o
v
e
M
i
n
 
a
n
d
 
m
i
n
 
t
a
k
e
O
(
n
)
 
t
i
m
e
 
s
i
n
c
e
 
w
e
 
h
a
v
e
 
t
o
t
r
a
v
e
r
s
e
 
t
h
e
 
e
n
t
i
r
e
s
e
q
u
e
n
c
e
 
t
o
 
f
i
n
d
 
t
h
e
s
m
a
l
l
e
s
t
 
k
e
y
Implementation with a
sorted list
Performance:
i
n
s
e
r
t
 
t
a
k
e
s
 
O
(
n
)
 
t
i
m
e
 
s
i
n
c
e
w
e
 
h
a
v
e
 
t
o
 
f
i
n
d
 
t
h
e
 
r
i
g
h
t
p
l
a
c
e
 
t
o
 
i
n
s
e
r
t
 
t
h
e
 
i
t
e
m
r
e
m
o
v
e
M
i
n
 
a
n
d
 
m
i
n
 
t
a
k
e
O
(
1
)
 
t
i
m
e
,
 
s
i
n
c
e
 
t
h
e
 
s
m
a
l
l
e
s
t
k
e
y
 
i
s
 
a
t
 
t
h
e
 
b
e
g
i
n
n
i
n
g
I
s
 
t
h
i
s
 
t
r
a
d
e
o
f
f
 
i
n
e
v
i
t
a
b
l
e
?
Heaps
Goal:
O(log n) insertion
O(log n) removal
Remember that O(log n) is almost as good as O(1)!
e.g., n = 1,000,000,000 
 log n 
 30
There are min heaps and max heaps.  We will assume
min heaps.
Min Heaps
A min heap is a binary tree storing keys at its nodes and
satisfying the following properties:
Heap-order:
 for every internal node v other than the root
key
(
v
)
key
(
parent
(
v
))
(Almost) complete binary tree:
 let 
h
 be the height of the heap
for 
i 

0, … , 
h 

1,
 there are 
2
i
 nodes of depth 
i
at depth 
h
 
 1
the internal nodes are to the left of the external nodes
Only the rightmost internal node may have a single child
2
6
5
7
9
T
h
e
 
l
a
s
t
 
n
o
d
e
 
o
f
 
a
 
h
e
a
p
 
i
s
 
t
h
e
r
i
g
h
t
m
o
s
t
 
n
o
d
e
 
o
f
 
d
e
p
t
h
 
h
Height of a Heap
Theorem:
 A heap storing 
n
 
keys has height 
O
(log 
n
)
 
Proof: (we apply the complete binary tree property)
Let 
h
 be the height of a heap storing 
n 
keys
Since there are 
2
i
 keys at depth 
i
 
 
0, … , 
h 

1 
and at least one key
at depth 
h
, we have 
n
1 

2 
 4 
 2
h
1 

1
Thus, 
n
2
h
 
, i.e., 
h
log 
n
1
2
2
h
1
1
keys
0
1
h
1
h
depth
Heaps and Priority Queues
We can use a heap to implement a priority queue
We store a (key, element) item at each internal node
We keep track of the position of the last node
For simplicity, we will typically show only the keys in the
pictures
(2, Sue)
(6, Mark)
(5, Pat)
(9, Jeff)
(7, Anna)
Insertion into a Heap
M
e
t
h
o
d
 
i
n
s
e
r
t
 
o
f
 
t
h
e
p
r
i
o
r
i
t
y
 
q
u
e
u
e
 
A
D
T
 
i
n
v
o
l
v
e
s
i
n
s
e
r
t
i
n
g
 
a
 
n
e
w
 
e
n
t
r
y
 
w
i
t
h
k
e
y
 
k
 
i
n
t
o
 
t
h
e
 
h
e
a
p
The insertion algorithm
consists of two steps
Store 
the new entry at the
next available location
Restore the heap-order
property
2
6
5
7
9
new node
2
6
5
7
9
1
z
z
Upheap
After the insertion of a new key 
k
, the heap-order property may be
violated
A
l
g
o
r
i
t
h
m
 
u
p
h
e
a
p
 
r
e
s
t
o
r
e
s
 
t
h
e
 
h
e
a
p
-
o
r
d
e
r
 
p
r
o
p
e
r
t
y
 
b
y
 
s
w
a
p
p
i
n
g
 
k
a
l
o
n
g
 
a
n
 
u
p
w
a
r
d
 
p
a
t
h
 
f
r
o
m
 
t
h
e
 
i
n
s
e
r
t
i
o
n
 
n
o
d
e
U
p
h
e
a
p
 
t
e
r
m
i
n
a
t
e
s
 
w
h
e
n
 
t
h
e
 
k
e
y
 
k
 
r
e
a
c
h
e
s
 
t
h
e
 
r
o
o
t
 
o
r
 
a
 
n
o
d
e
w
h
o
s
e
 
p
a
r
e
n
t
 
h
a
s
 
a
 
k
e
y
 
s
m
a
l
l
e
r
 
t
h
a
n
 
o
r
 
e
q
u
a
l
 
t
o
 
k
S
i
n
c
e
 
a
 
h
e
a
p
 
h
a
s
 
h
e
i
g
h
t
 
O
(
l
o
g
 
n
)
,
 
u
p
h
e
a
p
 
r
u
n
s
 
i
n
 
O
(
l
o
g
 
n
)
 
t
i
m
e
2
1
5
7
9
6
1
2
5
7
9
6
Removal from a Heap
M
e
t
h
o
d
 
r
e
m
o
v
e
M
i
n
 
o
f
 
t
h
e
p
r
i
o
r
i
t
y
 
q
u
e
u
e
 
A
D
T
c
o
r
r
e
s
p
o
n
d
s
 
t
o
 
t
h
e
 
r
e
m
o
v
a
l
 
o
f
t
h
e
 
r
o
o
t
 
k
e
y
 
f
r
o
m
 
t
h
e
 
h
e
a
p
The removal algorithm
consists of three steps
Replace the root key with the
key of the last node 
w
Remove 
w
Restore the heap-order property
2
6
5
7
9
last node
w
7
6
5
9
w
new last node
Downheap
After replacing the root key with the key 
k
 of the last node, the
heap-order property may be violated
Algorithm downheap restores the heap-order property by
swapping key 
k
 along a downward path from the root
Note that there are, in general, many possible downward paths –
which one do we choose?
?
?
Downheap
W
e
 
s
e
l
e
c
t
 
t
h
e
 
d
o
w
n
w
a
r
d
 
p
a
t
h
 
t
h
r
o
u
g
h
 
t
h
e
 
m
i
n
i
m
u
m
-
k
e
y
 
n
o
d
e
s
.
Downheap terminates when key 
k
 reaches a leaf or a node whose
children have keys greater than or equal to 
k
Since a heap has height 
O
(log 
n
)
, downheap runs in 
O
(log 
n
)
 time
7
6
5
9
w
5
6
7
9
w
Array-based Heap Implementation
We can represent a heap with 
n
 keys
by means of an array of length 
n 
 
1
Links between nodes are not explicitly
stored
The cell at rank 
0
 is not used
The root is stored at rank 1.
For the node at rank 
i
the left child is at rank 
2
i
the right child is at rank 
2
i 
 
1
t
h
e
 
p
a
r
e
n
t
 
i
s
 
a
t
 
r
a
n
k
 
f
l
o
o
r
(
i
/
2
)
if 2i + 1 > n, the node has no right child
if 2i > n, the node is a leaf
2
6
5
7
9
Constructing a Heap
 
A heap can be constructed by iteratively inserting
entries:  
example
.
What is the running time?
 
 
Can we do better?
We can construct a heap
storing 
n
 keys using a
bottom-up construction with
log 
n
 phases
In phase 
i
, each pair of
heaps with 
2
i 
1
 keys are
merged with an additional
node into a heap with 
2
i
1
1
keys
 
Bottom-up Heap Construction
2
i
1
1
Merging Two Heaps
We are given two
heaps and a new key 
k
We create a new heap
with the root node
storing 
k
 and with the
two heaps as subtrees
We perform downheap
to restore the heap-
order property
7
3
5
8
2
6
4
3
5
8
2
6
4
2
3
5
8
4
6
7
Example
15
16
12
4
7
6
20
23
25
15
16
5
12
4
11
7
6
27
20
23
Example (contd.)
25
15
16
5
12
4
11
9
6
27
20
23
15
25
16
4
12
5
6
9
11
20
27
23
Example (contd.)
7
15
25
16
4
12
5
8
6
9
11
20
27
23
4
15
25
16
5
12
7
6
8
9
11
20
27
23
Example (end)
4
15
25
16
5
12
7
10
6
8
9
11
20
27
23
5
15
25
16
7
12
10
4
6
8
9
11
20
27
23
Bottom-Up Heap Construction Analysis
In the worst case, each added node gets downheaped to the bottom of the heap.
We analyze the run time by considering the total length of these downward paths through
the binary tree as it is constructed.
For convenience, we can assume that each path first goes right and then repeatedly goes
left until the bottom of the heap (this path may differ from the actual downheap path, but
this will not change the run time)
Analysis
By assumption, each downheap path has the form RLL…L.
Each internal node thus originates a single right-going path.
In addition, note that there is a unique path (sequence of R,L moves) from the root to
each node in the tree.
Thus each node can be traversed by at most one left-going path.
Since each node is traversed by at most two paths, the total length of the paths is 
O
(
n
)
Thus, bottom-up heap construction runs in 
O
(
n
) 
time
B
o
t
t
o
m
-
u
p
 
h
e
a
p
 
c
o
n
s
t
r
u
c
t
i
o
n
 
i
s
 
f
a
s
t
e
r
 
t
h
a
n
 
n
 
s
u
c
c
e
s
s
i
v
e
 
i
n
s
e
r
t
i
o
n
s
 
(
O
(
n
l
o
g
n
)
)
.
Bottom-Up Heap Construction
Uses downHeap to reorganize the tree from bottom to
top to make it a heap.
Can be written concisely in either recursive or iterative
form.
Iterative MakeHeap
Recursive MakeHeap
 
Get help from friends
Recursive MakeHeap
i
n
 
Invoke as MakeHeap (
A, 1, n
)
 
Iterative and recursive methods perform exactly the same downheaps but in a different
order.  Thus both constructions methods are 
O(n)
.
Iterative  vs Recursive MakeHeap
Recursive and Iterative MakeHeap do essentially the
same thing:  Heapify from bottom to top.
Difference:
Recursive is “depth-first”
Iterative is “breadth-first”
Adaptable
Priority Queues
Recall the Entry and Priority Queue ADTs
A
n
 
e
n
t
r
y
 
s
t
o
r
e
s
 
a
 
(
k
e
y
,
v
a
l
u
e
)
 
p
a
i
r
 
w
i
t
h
i
n
 
a
 
d
a
t
a
s
t
r
u
c
t
u
r
e
Methods of the entry
ADT:
getKey
(): returns the key
associated with this
entry
getValue
(): returns the
value paired with the key
associated with this
entry
Priority Queue ADT:
insert
(k, x)
inserts an entry with
key k and value x
removeMin
()
removes and returns
the entry with
smallest key
min
()
returns, but does not
remove, an entry
with smallest key
size
(), 
isEmpty
()
Finding an entry in a heap by key
Note that we have not specified any methods for
removing or updating an entry with a specified key.
These operations require that we first find the entry.
I
n
 
g
e
n
e
r
a
l
,
 
t
h
i
s
 
i
s
 
a
n
 
O
(
n
)
 
o
p
e
r
a
t
i
o
n
:
 
 
i
n
 
t
h
e
 
w
o
r
s
t
c
a
s
e
,
 
t
h
e
 
w
h
o
l
e
 
t
r
e
e
 
m
u
s
t
 
b
e
 
e
x
p
l
o
r
e
d
.
Motivating Example
Suppose we have an online trading system where orders to
purchase and sell a given stock are stored in two priority queues
(one for sell orders and one for buy orders) as (p,s) entries:
The key, p, of an order is the price
The value, s, for an entry is the number of shares
A buy order (p,s) is executed when a sell order (p’,s’) with price
p’
<
p is added (the execution is complete if s’
>
s)
A sell order (p,s) is executed when a buy order (p’,s’) with price
p’
>
p is added (the execution is complete if s’
>
s)
What if someone wishes to cancel their order before it
executes?
What if someone wishes to update the price or number of
shares for their order?
Additional Methods of the Adaptable Priority Queue ADT
remove
(
e
): Remove from 
P 
and return entry 
e
.
 
replaceKey
(
e,k
): Replace with 
k 
and return the old key
;
an error condition occurs if 
k 
is invalid (that is, 
k 
cannot
be compared with other keys).
 
replaceValue
(
e,x
): Replace with 
x 
and return the old
value.
 
Example
Operation
   
Output
  
P
 
insert(
5
,
A
)
   
e
1
  
(
5
,
A
)
 
insert(
3
,
B
)
   
e
2
  
(
3
,
B
)
,
(
5
,
A
)
 
insert(
7
,
C
)
   
e
3
  
(
3
,
B
)
,
(
5
,
A
)
,
(
7
,
C
)
min()
    
e
2
  
(
3
,
B
)
,
(
5
,
A
)
,
(
7
,
C
)
key(
e
2
)
    
3
  
(
3
,
B
)
,
(
5
,
A
)
,
(
7
,
C
)
remove(
e
1
)
   
e
1
  
(
3
,
B
)
,
(
7
,
C)
replaceKey(
e
2
,
9
)
  
3
  
(
7
,
C
)
,
(
9
,
B
)
 
replaceValue(
e
3
,
D
)
  
C
  
(
7
,
D
)
,
(
9
,
B
)
 
remove(
e
2
)
   
e
2
  
(
7
,
D
)
 
Locating Entries
In order to implement the operations remove(e),
replaceKey(e,k), and replaceValue(e,x), we need a fast
way of locating an entry e in a priority queue.
We can always just search the entire data structure to
find an entry e, but this takes O(n) time.
Using location-aware entries, this can be reduced to
O(1) time.
Location-Aware Entries
A location-aware entry identifies and tracks the
location of its (key, value) object within a data
structure
List Implementation
A location-aware list entry is an object storing
key
value
position (or rank) of the item in the list
In turn, the position (or array cell) stores the entry
Back pointers (or ranks) are updated during swaps
trailer
header
nodes/positions
entries
2
c
4
a
5
d
8
b
Heap Implementation
A location-aware heap
entry is an object storing
key
value
position of the entry in the
underlying heap
In turn, each heap position
stores an entry
Back pointers are updated
during entry swaps
4
a
2
d
6
b
8
g
5
e
9
c
Performance
Times better than those achievable without location-aware
entries are highlighted in 
red
:
Method
   
Unsorted List
 
Sorted List
 
Heap
 
size, isEmpty
  
O
(1)
  
O
(1)
  
O
(1)
 
insert
   
O
(1)
  
O
(
n
)
  
O
(log 
n
)
min
   
O
(
n
)
  
O
(1)
  
O
(1)
 
removeMin
  
O
(
n
)
  
O
(1)
  
O
(log 
n
)
remove
   
O
(1)
  
O
(1)
  
O
(log 
n
)
replaceKey
  
O
(1)
  
O
(
n
)
  
O
(log 
n
)
replaceValue
  
O
(1)
  
O
(1)
  
O
(1)
Slide Note
Embed
Share

Explore the concepts of priority queues, heaps, and related data structures in Java Collections Framework. Learn about the Priority Queue class, Entry ADT, Comparator ADT, and Total Order Relations, along with their practical applications in process scheduling and more.

  • Java Collections
  • Priority Queues
  • Heaps
  • Data Structures
  • Algorithms

Uploaded on Sep 10, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Priority Queues & Heaps Chapter 9

  2. The Java Collections Framework (Ordered Data Types) Iterable Interface Abstract Class Collection Class List Abstract Collection Queue Abstract List Abstract Queue Priority Queue Abstract Sequential List Vector Array List Stack Linked List

  3. The Priority Queue Class Based on priority heap Elements are prioritized based either on natural order a comparator, passed to the constructor. Provides an iterator

  4. Priority Queue ADT A priority queue stores a collection of entries Each entry is a pair (key, value) Main methods of the Priority Queue ADT insert(k, x) inserts an entry with key k and value x removeMin() removes and returns the entry with smallest key Additional methods min() returns, but does not remove, an entry with smallest key size(), isEmpty() Applications: Process scheduling Standby flyers

  5. Total Order Relations Keys in a priority queue can be arbitrary objects on which an order is defined Mathematical concept of total order relation Reflexive property: x x Antisymmetric property: x y y x x = y Two distinct entries in a priority queue can have the same key Transitive property: x y y z x z

  6. Entry ADT An entry in a priority queue is simply a key- value pair As a Java interface: /** * Interface for a key-value Methods: * pair entry getKey(): returns the key for this entry **/ public interface Entry { public Object getKey(); public Object getValue(); } getValue(): returns the value for this entry

  7. Comparator ADT A comparator encapsulates the action of comparing two objects according to a given total order relation A generic priority queue uses an auxiliary comparator The comparator is external to the keys being compared When the priority queue needs to compare two keys, it uses its comparator The primary method of the Comparator ADT: compare(a, b): Returns an integer i such that i < 0 if a < b i = 0 if a = b i > 0 if a > b an error occurs if a and b cannot be compared.

  8. Example Comparator /** Comparator for 2D points under the standard lexicographic order. */ public class Lexicographic implements Comparator { int xa, ya, xb, yb; public int compare(Object a, Object b) throws ClassCastException { xa = ((Point2D) a).getX(); ya = ((Point2D) a).getY(); xb = ((Point2D) b).getX(); yb = ((Point2D) b).getY(); if (xa != xb) return (xa - xb); else return (ya - yb); } } /** Class representing a point in the plane with integer coordinates */ public class Point2D protected int xc, yc; // coordinates public Point2D(int x, int y) { xc = x; yc = y; } public int getX() { return xc; } public int getY() { return yc; } } {

  9. Sequence-based Priority Queue Implementation with an unsorted list Implementation with a sorted list 4 5 2 3 1 1 2 3 4 5 Performance: Performance: insert takes O(1) time since we can insert the item at the beginning or end of the sequence insert takes O(n) time since we have to find the right place to insert the item removeMin and min take O(1) time, since the smallest key is at the beginning removeMin and min take O(n) time since we have to traverse the entire sequence to find the smallest key Is this tradeoff inevitable?

  10. Heaps Goal: O(log n) insertion O(log n) removal Remember that O(log n) is almost as good as O(1)! e.g., n = 1,000,000,000 log n 30 There are min heaps and max heaps. We will assume min heaps.

  11. Min Heaps A min heap is a binary tree storing keys at its nodes and satisfying the following properties: Heap-order: for every internal node v other than the root key(v) key(parent(v)) (Almost) complete binary tree: let h be the height of the heap for i = 0, , h 1, there are 2i nodes of depth i at depth h 1 the internal nodes are to the left of the external nodes 2 Only the rightmost internal node may have a single child 5 6 9 7 The last node of a heap is the rightmost node of depth h

  12. Height of a Heap Theorem: A heap storing nkeys has height O(log n) Proof: (we apply the complete binary tree property) Let h be the height of a heap storing n keys Since there are 2i keys at depth i=0, , h 1 and at least one key at depth h, we have n 1 + 2 + 4 + + 2h 1 + 1 Thus, n 2h, i.e., h log n depth keys 0 1 1 2 h 1 2h 1 h 1

  13. Heaps and Priority Queues We can use a heap to implement a priority queue We store a (key, element) item at each internal node We keep track of the position of the last node For simplicity, we will typically show only the keys in the pictures (2, Sue) (5, Pat) (6, Mark) (9, Jeff) (7, Anna)

  14. Insertion into a Heap Method insert of the priority queue ADT involves inserting a new entry with key k into the heap 2 5 6 z 9 7 The insertion algorithm consists of two steps new node Store the new entry at the next available location 2 5 6 Restore the heap-order property z 9 7 1

  15. Upheap After the insertion of a new key k, the heap-order property may be violated Algorithm upheap restores the heap-order property by swapping k along an upward path from the insertion node Upheap terminates when the key k reaches the root or a node whose parent has a key smaller than or equal to k Since a heap has height O(log n), upheap runs in O(log n) time 2 1 5 1 5 2 9 7 6 9 7 6

  16. Removal from a Heap Method removeMin of the priority queue ADT corresponds to the removal of the root key from the heap 2 5 6 w The removal algorithm consists of three steps 9 7 last node Replace the root key with the key of the last node w 7 Remove w 5 6 w Restore the heap-order property 9 new last node

  17. Downheap After replacing the root key with the key k of the last node, the heap-order property may be violated Algorithm downheap restores the heap-order property by swapping key k along a downward path from the root Note that there are, in general, many possible downward paths which one do we choose? ? ? 7 5 6 w 9

  18. Downheap We select the downward path through the minimum-key nodes. Downheap terminates when key k reaches a leaf or a node whose children have keys greater than or equal to k Since a heap has height O(log n), downheap runs in O(log n) time 7 5 5 6 7 6 w w 9 9

  19. Array-based Heap Implementation We can represent a heap with n keys by means of an array of length n + 1 Links between nodes are not explicitly stored The cell at rank 0 is not used 2 5 6 The root is stored at rank 1. For the node at rank i 9 7 the left child is at rank 2i the right child is at rank 2i + 1 the parent is at rank floor(i/2) if 2i + 1 > n, the node has no right child 2 5 6 9 7 0 1 2 3 4 5 if 2i > n, the node is a leaf

  20. Constructing a Heap A heap can be constructed by iteratively inserting entries: example. What is the running time? n T(n) nlogn. logi i=1 Can we do better?

  21. Bottom-up Heap Construction We can construct a heap storing n keys using a bottom-up construction with log n phases 2i 1 2i 1 In phase i, each pair of heaps with 2i 1 keys are merged with an additional node into a heap with 2i+1 1 keys 2i+1 1

  22. Merging Two Heaps 3 2 We are given two heaps and a new key k 8 5 4 6 We create a new heap with the root node storing k and with the two heaps as subtrees 7 3 2 8 5 4 6 We perform downheap to restore the heap- order property 2 3 4 8 5 7 6

  23. Example 16 15 4 12 6 7 23 20 25 5 11 27 16 15 4 12 6 7 23 20

  24. Example (contd.) 25 5 11 27 16 15 4 12 6 9 23 20 15 4 6 20 16 25 5 12 11 9 23 27

  25. Example (contd.) 7 8 15 4 6 20 16 25 5 12 11 9 23 27 4 6 15 5 8 20 16 25 7 12 11 9 23 27

  26. Example (end) 10 4 6 15 5 8 20 16 25 7 12 11 9 23 27 4 5 6 15 7 8 20 16 25 10 12 11 9 23 27

  27. Bottom-Up Heap Construction Analysis In the worst case, each added node gets downheaped to the bottom of the heap. We analyze the run time by considering the total length of these downward paths through the binary tree as it is constructed. For convenience, we can assume that each path first goes right and then repeatedly goes left until the bottom of the heap (this path may differ from the actual downheap path, but this will not change the run time)

  28. Analysis By assumption, each downheap path has the form RLL L. Each internal node thus originates a single right-going path. In addition, note that there is a unique path (sequence of R,L moves) from the root to each node in the tree. Thus each node can be traversed by at most one left-going path. Since each node is traversed by at most two paths, the total length of the paths is O(n) Thus, bottom-up heap construction runs in O(n) time Bottom-up heap construction is faster than n successive insertions (O(nlogn)).

  29. Bottom-Up Heap Construction Uses downHeap to reorganize the tree from bottom to top to make it a heap. Can be written concisely in either recursive or iterative form.

  30. Iterative MakeHeap MakeHeap(A,n) <pre-cond>:A[1 n] is a balanced binary tree <post-cond>:A[1 n] is a heap for i n /2 < LI >:All subtrees rooted at i +1 n are heaps DownHeap(A,i,n) downto 1

  31. Recursive MakeHeap Get help from friends

  32. Recursive MakeHeap Invoke as MakeHeap (A, 1, n) MakeHeap(A,i,n) <pre-cond>:A[i n] is a balanced binary tree <post-cond>:The subtree rooted at i is a heap if i n / 4 then MakeHeap(A,LEFT (i),n) MakeHeap(A,RIGHT (i),n) Downheap(A,i,n) i n /4 is grandp aren t f o n n /2 is p arent of n n Iterative and recursive methods perform exactly the same downheaps but in a different order. Thus both constructions methods are O(n).

  33. Iterative vs Recursive MakeHeap Recursive and Iterative MakeHeap do essentially the same thing: Heapify from bottom to top. Difference: Recursive is depth-first Iterative is breadth-first

  34. 3 a Adaptable Priority Queues 5 g 4 e

  35. Recall the Entry and Priority Queue ADTs An entry stores a (key, value) pair within a data structure Priority Queue ADT: insert(k, x) inserts an entry with key k and value x Methods of the entry ADT: removeMin() removes and returns the entry with smallest key getKey(): returns the key associated with this entry min() returns, but does not remove, an entry with smallest key getValue(): returns the value paired with the key associated with this entry size(), isEmpty()

  36. Finding an entry in a heap by key Note that we have not specified any methods for removing or updating an entry with a specified key. These operations require that we first find the entry. In general, this is an O(n) operation: in the worst case, the whole tree must be explored.

  37. Motivating Example Suppose we have an online trading system where orders to purchase and sell a given stock are stored in two priority queues (one for sell orders and one for buy orders) as (p,s) entries: The key, p, of an order is the price The value, s, for an entry is the number of shares A buy order (p,s) is executed when a sell order (p ,s ) with price p <p is added (the execution is complete if s >s) A sell order (p,s) is executed when a buy order (p ,s ) with price p >p is added (the execution is complete if s >s) What if someone wishes to cancel their order before it executes? What if someone wishes to update the price or number of shares for their order?

  38. Additional Methods of the Adaptable Priority Queue ADT remove(e): Remove from P and return entry e. replaceKey(e,k): Replace with k and return the old key; an error condition occurs if k is invalid (that is, k cannot be compared with other keys). replaceValue(e,x): Replace with x and return the old value.

  39. Example Operation insert(5,A) insert(3,B) insert(7,C) Output e1 e2 e3 e2 3 e1 3 C e2 P (5,A) (3,B),(5,A) (3,B),(5,A),(7,C) (3,B),(5,A),(7,C) (3,B),(5,A),(7,C) (3,B),(7,C) (7,C),(9,B) (7,D),(9,B) (7,D) min() key(e2) remove(e1) replaceKey(e2,9) replaceValue(e3,D) remove(e2)

  40. Locating Entries In order to implement the operations remove(e), replaceKey(e,k), and replaceValue(e,x), we need a fast way of locating an entry e in a priority queue. We can always just search the entire data structure to find an entry e, but this takes O(n) time. Using location-aware entries, this can be reduced to O(1) time.

  41. Location-Aware Entries A location-aware entry identifies and tracks the location of its (key, value) object within a data structure

  42. List Implementation A location-aware list entry is an object storing key value position (or rank) of the item in the list In turn, the position (or array cell) stores the entry Back pointers (or ranks) are updated during swaps trailer nodes/positions header 5 d 8 b 2 c 4 a entries

  43. Heap Implementation A location-aware heap entry is an object storing 2 d key value 4 a 6 b position of the entry in the underlying heap In turn, each heap position stores an entry Back pointers are updated during entry swaps 8 g 5 e 9 c

  44. Performance Times better than those achievable without location-aware entries are highlighted in red: Method Unsorted List Sorted List Heap size, isEmpty O(1) O(1) O(1) insert O(1) O(n) O(log n) min O(n) O(1) O(1) removeMin O(n) O(1) O(log n) remove O(1) O(1) O(log n) replaceKey O(1) O(log n) O(n) replaceValue O(1) O(1) O(1)

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#