Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| courses:cs211:winter2018:journals:hornsbym:chapter_2 [2018/01/16 05:04] – [Section 2.2(Asymptotic Order of Growth)] hornsbym | courses:cs211:winter2018:journals:hornsbym:chapter_2 [2018/01/30 04:21] (current) – hornsbym | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Chapter 2 ====== | ====== Chapter 2 ====== | ||
| - | <Enter overview | + | These two sections |
| ===== Section 2.1(Computational Tractability) ===== | ===== Section 2.1(Computational Tractability) ===== | ||
| This section is all about efficiency, even taking several attempts at defining it. The first attempt reads as follows:\\ | This section is all about efficiency, even taking several attempts at defining it. The first attempt reads as follows:\\ | ||
| Line 19: | Line 19: | ||
| This section looks at how an algorithm' | This section looks at how an algorithm' | ||
| \\ | \\ | ||
| - | The book then goes on to mention some of the properties of the asymptotic growth rates. It discusses transitivity, | + | The book then goes on to mention some of the properties of the asymptotic growth rates. It discusses transitivity, |
| - | + | \\ | |
| + | ===== Section 2.3 (Implementing Stable Matching Algorithm) ===== | ||
| + | This section practically applies all of the ideas we have discussed thus far. It proves that the Stable Matching problem can be solved by an algorithm that runs in O(n< | ||
| + | \\ | ||
| + | But first, the book discusses the nuances of two basic data structures that will be imperative to this algorithm: array lists and linked lists. Array lists are good for finding the // | ||
| + | \\ | ||
| + | This section goes on to give a basic implementation of the algorithm. In order to keep runtime under O(n< | ||
| + | (1) Identify a free man. | ||
| + | (2) For any given man, identify the highest-ranked woman to whom he has not yet proposed. | ||
| + | (3) For any given woman, we must be able to identify whether or not she has a partner, and identify her partner. | ||
| + | (4) When presented two men, decide which of the two a given woman prefers. | ||
| + | If these four operations can be performed in constant time, the algorithm will perform correctly in O(n< | ||
| + | \\ | ||
| + | Overall, this section was more interesting than others because it practically applied the theories and proofs we have discussed. | ||
| + | \\ | ||
| + | ===== Section 2.4(Common Running Times) ===== | ||
| + | This section covers the primary running times, and how to achieve them. Throughout the section, it primarily compares each running time to the "brute force" method.\\ | ||
| + | \\ | ||
| + | It starts off with the most intuitive running time, linear (O(//n//)). This algorithm is relatively easy to achieve, as just limiting the algorithm to one pass over the data. A single for-loop will result in linear running time, as long as there is not another loop nested within.\\ | ||
| + | \\ | ||
| + | The next running time discussed is O(//n// log //n//). This running time is marginally worse than linear. Algorithms that operate under this running time usually sort the data first in O(log //n//) time, and then deal with the sorted data in O(//n//) time. The result yields O(//n// log //n//).\\ | ||
| + | \\ | ||
| + | The section then discusses quadratic running time (O(// | ||
| + | \\ | ||
| + | Next, the section moves on to running times beyond polynomial. These running times are too inefficient to handle any significant amount of data. An example of this is exponential running time, which happens when we have to iterate over every subset of a a data set. This causes us to have to perform O(2< | ||
| + | \\ | ||
| + | Section 2.4 ends with a brief discussion of sub-linear running times, most notably logarithmic time (O(log// | ||
| + | \\ | ||
| + | ===== Section 2.5(Priority Queues)===== | ||
| + | This section mainly discusses the priority queue and its implementation.\\ | ||
| + | \\ | ||
| + | The optimal data structure for implementing a priority queue, according to this section, is a //heap//. Heaps are tree structures in which each node can have two children, each one being equal or higher in value. Because of this form, we can access the lowest value in constant time because the root node, by definition, is the lowest value.\\ | ||
| + | \\ | ||
| + | Throughout the process of working with the heap, its structure will inevitably become compromised from either adding an item of a lower value to a leaf node or by removing an item from higher in the tree. We fix these issues with the heapify-up and heapify-down methods. Heapify-up works by switching the problem node up towards the root node, until it reaches a point where it is no longer lower than its parent node. This is primarily used for reorganizing a heap in which a low number has been added to the frontier. Heapify-down works by doing the opposite; we switch a parent node with the lower of its two children, and repeat the process until either the node is higher than both of its new children or it becomes a leaf node.\\ | ||
| + | \\ | ||
| + | Both of these methods run in O(log//n//) time. This is possible because of the heaps structure; since each layer of the heap grows twice as large as the previous one, the structure of the heap itself becomes log//n// relative to the entire number of nodes. So when we traverse up or down the entire depth of the tree, we can only traverse log//n// times.\\ | ||
| + | \\ | ||
| + | Other than when the heap is initialized, | ||
