A revisited representation of the red-black tree

Author(s):  
Lynda Bounif ◽  
Djamel Eddine Zegour
Keyword(s):  
2021 ◽  
Author(s):  
ZEGOUR Djamel Eddine

Abstract Today, Red-Black trees are becoming a popular data structure typically used to implement dictionaries, associative arrays, symbol tables within some compilers (C++, Java …) and many other systems. In this paper, we present an improvement of the delete algorithm of this kind of binary search tree. The proposed algorithm is very promising since it colors differently the tree while reducing color changes by a factor of about 29%. Moreover, the maintenance operations re-establishing Red-Black tree balance properties are reduced by a factor of about 11%. As a consequence, the proposed algorithm saves about 4% on running time when insert and delete operations are used together while conserving search performance of the standard algorithm.


2014 ◽  
Vol 77 (1-2) ◽  
pp. 95-115 ◽  
Author(s):  
Alexandre Carbon ◽  
Yves Lhuillier ◽  
Henri-Pierre Charles

Frequenz ◽  
2013 ◽  
Vol 67 (9-10) ◽  
Author(s):  
M. J. Islam ◽  
A. W. Reza ◽  
K. A. Noordin ◽  
A. S. M. Z. Kausar ◽  
H. Ramiah

IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Zhenpeng Liu ◽  
Yi Liu ◽  
Xianwei Yang ◽  
Xiaofei Li
Keyword(s):  

Author(s):  
Erick Fernando ◽  
Derist Touriano

<p>Cyber information is the solution for e-commerce, in this study we investigated the LAN is needed and seek confirmation of the decision to use the method Red-Black Tree in forming binary search tree. Given the status of the wireless modalities and development of RAID, this study used a Bayesian tool in controlling identifier-locator split (palmate). In addition, to verify that Boolean logic and the model checking can collude to address this problem. In this paper, we verify that rasterization can be made strong, cooperative, and adaptive. Furthermore, we concentrated this study can be made so that IPv6 embedded, scalable, and highly-available. Our design for investigating encrypted algorithms is dubiously promising. Finally, we introduced an analysis of journaling file systems (Palmate), which we used to validate that local-area networks and replication are often incompatible.</p>


Sign in / Sign up

Export Citation Format

Share Document