A random suffix search tree is a binary search tree constructed for the suffixes X(i) = 0 (.) B(i)B(i+1)B(i+2)... of a sequence B(1), B(2), B(3),... of independent identically distributed random b-ary digits B(j). Let...
详细信息
A random suffix search tree is a binary search tree constructed for the suffixes X(i) = 0 (.) B(i)B(i+1)B(i+2)... of a sequence B(1), B(2), B(3),... of independent identically distributed random b-ary digits B(j). Let D(n) denote the depth of the node for X(n) in this tree when B(1) is uniform on Z(b). We show that for any value of b > 1, ED(n) = 2 log n + O(log(2)log n), just as for the random binary search tree. We also show that D(n)/ED(n) --> 1 in probability. (C) 2003 Wiley Periodicals, Inc.
We obtain a central limit theorem for a general class of additive parameters (costs, observables) associated to three standard Euclidean algorithms, with optimal speed of convergence. We also provide very precise asym...
详细信息
We obtain a central limit theorem for a general class of additive parameters (costs, observables) associated to three standard Euclidean algorithms, with optimal speed of convergence. We also provide very precise asymptotic estimates and error terms for the mean and variance of such parameters. For costs that are lattice (including the number of steps), we go further and establish a local limit theorem, with optimal speed of convergence. We view an algorithm as a dynamical system restricted to rational inputs, and combine tools imported from dynamics, such as transfer operators, with various other techniques: Dirichlet series, Perron's formula, quasi-powers theorems, and the saddle-point method. Such dynamical analyses had previously been used to perform the average-case analysis of algorithms. For the present (dynamical) analysis in distribution, we require estimates on transfer operators when a parameter varies along vertical lines in the complex plane. To prove them, we adapt techniques introduced recently by Dolgopyat in the context of continuous-time dynamics (Ann. Math. 147 (1998) 357). (C) 2004 Elsevier Inc. All rights reserved.
In this article we consider tries built from n strings such that each string can be chosen from a pool of k strings, each of them generated by a discrete i.i.d. source. Three cases are considered: k = 2, k is large bu...
详细信息
In this article we consider tries built from n strings such that each string can be chosen from a pool of k strings, each of them generated by a discrete i.i.d. source. Three cases are considered: k = 2, k is large but fixed, and k similar to c log n. The goal in each case is to obtain tries as balanced as possible. Various parameters such as height and fill-up level are analyzed. It is shown that for two-choice tries a 50% reduction in height is achieved when compared with ordinary tries. In a greedy online construction when the string that minimizes the depth of insertion for every pair is inserted, the height is only reduced by 25%. To further reduce the height by another 25%, we design a more refined online algorithm. The total computation time of the algorithm is O(n log n). Furthermore, when we choose the best among k >= 2 strings, then for large but fixed k the height is asymptotically equal to the typical depth in a trie. Finally, we show that further improvement can be achieved if the number of choices for each string is proportional to log n. In this case highly balanced trees can be constructed by a simple greedy algorithm for which the difference between the height and the fill-up level is bounded by a constant with high probability. This, in turn, has implications for distributed hash tables, leading to a randomized ID management algorithm in peer-to-peer networks such that, with high probability, the ratio between the maximum and the minimum load of a processor is O(1). (C) 2008 Wiley Periodicals, Inc. Random Struct. Mg.. 34, 337-367, 2009
We consider a multivariate distributional recursion of sum type, as arises in the probabilistic analysis of algorithms and random trees. We prove an upper tail bound for the solution using Chernoff's bounding tech...
详细信息
We consider a multivariate distributional recursion of sum type, as arises in the probabilistic analysis of algorithms and random trees. We prove an upper tail bound for the solution using Chernoff's bounding technique by estimating the Laplace transform. The problem is traced back to the corresponding problem for binary search trees by stochastic domination. The result obtained is applied to the internal path length and Wiener index of random b-ary recursive trees with weighted edges and random linear recursive trees. Finally, lower tail bounds for the Wiener index of these trees are given.
作者:
BUCHTA, CInstitut für Analysis
Technische Mathematik und Versicherungsmathematik Technische Universität Wien Wiedner Hauptstrasse 8-10 A-1040 Wien Austria
Any of n vectors in d -space is called maximal if none of the remaining vectors dominates it in every component. Assuming that n vectors are distributed identically and that the d components of each vector are distrib...
详细信息
Any of n vectors in d -space is called maximal if none of the remaining vectors dominates it in every component. Assuming that n vectors are distributed identically and that the d components of each vector are distributed independently and continuously, we determine the expected number of maximal vectors explicitly for any n and d . The asymptotic behaviour of this quantity as n tends to infinity, which was investigated by Bentley, Kung, Schkolnick, Thompson and Devroye, follows immediately from our result.
The Euclidean matching problem is described, and the usual Euclidean metric is given. The objective is to pair the points into m pairs so that the sum of the lengths of the lines joining the pairs is as small as poss...
详细信息
The Euclidean matching problem is described, and the usual Euclidean metric is given. The objective is to pair the points into m pairs so that the sum of the lengths of the lines joining the pairs is as small as possible. An algorithm is described which finds a matching of points in the unit square. It is proven that, under the assumption that the points are uniformly distributed in the square, the algorithm has a fast anticipated running time, and it yields a matching with value close to the optimum. This algorithm is almost identical to Supowit and Reingold's (1983), except that they concentrated on a worst-case analysis, while the present algorithm uses a probabilisticanalysis.
Exponential tail bounds are derived for solutions of max-recursive equations and for max-recursive random sequences, which typically arise as functionals of recursive structures, of random trees or in recursive algori...
详细信息
Exponential tail bounds are derived for solutions of max-recursive equations and for max-recursive random sequences, which typically arise as functionals of recursive structures, of random trees or in recursive algorithms. In particular they arise in the worst case analysis of divide and conquer algorithms, in parallel search algorithms or in the height of random tree models. For the proof we determine asymptotic bounds for the moments or for the Laplace transforms and apply a characterization of exponential tail bounds due to Kasahara (1978).
In certain problems in a variety of applied probability settings (from probabilistic analysis of algorithms to statistical physics), the central requirement is to solve a recursive distributional equation of the form ...
详细信息
In certain problems in a variety of applied probability settings (from probabilistic analysis of algorithms to statistical physics), the central requirement is to solve a recursive distributional equation of the form X-d = g((xi(i), X-i), i >= 1). Here (xi(i)) and g((.)) are given and the X-i are independent copies of the unknown distribution X. We survey this area, emphasizing examples where the function g((.)) is essentially a "maximum" or "minimum" function. We draw attention to the theoretical question of endogeny: in the associated recursive tree process X-i, are the X-i measurable functions of the innovations process (xi(i))?
We develop an algorithm for the Dutch National Flag problem that has an adjustable integer parameter smax≧0smax≧0\operatorname{smax} \geqq 0 allowing a time/space tradeoff. (Let n be the length of the input to be or...
详细信息
We prove convergence in distribution for the profile (the number of nodes at each level), normalized by its mean, of random recursive trees when the limit ratio alpha of the level and the logarithm of tree size lies i...
详细信息
We prove convergence in distribution for the profile (the number of nodes at each level), normalized by its mean, of random recursive trees when the limit ratio alpha of the level and the logarithm of tree size lies in [0, e). Convergence of all moments is shown to hold only for a E [0, 1] (with only convergence of finite moments when alpha is an element of (1, e)). When the limit ratio is 0 or 1 for which the limit laws are both constant, we prove asymptotic normality for alpha = 0 and a "quicksort type" limit law for alpha = 1, the latter case having additionally a small range where there is no fixed limit law. Our tools are based on the contraction method and method of moments. Similar phenomena also hold for other classes of trees;we apply our tools to binary search trees and give a complete characterization of the profile. The profiles of these random trees represent concrete examples for which the range of convergence in distribution differs from that of convergence of all moments.
暂无评论