scholarly journals The Buffer Tree: A New Technique for Optimal I/O Algorithms

1996 ◽  
Vol 3 (28) ◽  
Author(s):  
Lars Arge

In this paper we develop a technique for transforming an internal-memory tree data structure into an external-memory structure. We show how the technique can be used to develop a search tree like structure, a priority queue, a (one-dimensional) range tree and a segment tree, and give examples of how these structures can be used to develop efficient I/O algorithms. All our algorithms are either extremely simple or straightforward generalizations of known internal-memory algorithms - given the developed external data structures. We believe that algorithms relying on the developed structure will be of practical interest due to relatively small constants in the asymptotic bounds.

1994 ◽  
Vol 1 (16) ◽  
Author(s):  
Lars Arge

In this paper we develop a technique for transforming an internal memory datastructure into an external storage data structure suitable for plane-sweep algorithms. We use this technique to develop external storage versions of the range tree and the segment tree. We also obtain an external priority queue. Using the first two structures, we solve the orthogonal segment intersection, the isothetic rectangle intersection, and the batched range searching problem in the optimal number of I/O-operations. Unlike previously known I/O-algorithms the developed algorithms are straightforward generalizations of the ordinary internal memory plane-sweep algorithms. Previously almost no dynamic data structures were known for the model we are working in.


Cryptography ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 4
Author(s):  
Bayan Alabdullah ◽  
Natalia Beloff ◽  
Martin White

Data security has become crucial to most enterprise and government applications due to the increasing amount of data generated, collected, and analyzed. Many algorithms have been developed to secure data storage and transmission. However, most existing solutions require multi-round functions to prevent differential and linear attacks. This results in longer execution times and greater memory consumption, which are not suitable for large datasets or delay-sensitive systems. To address these issues, this work proposes a novel algorithm that uses, on one hand, the reflection property of a balanced binary search tree data structure to minimize the overhead, and on the other hand, a dynamic offset to achieve a high security level. The performance and security of the proposed algorithm were compared to Advanced Encryption Standard and Data Encryption Standard symmetric encryption algorithms. The proposed algorithm achieved the lowest running time with comparable memory usage and satisfied the avalanche effect criterion with 50.1%. Furthermore, the randomness of the dynamic offset passed a series of National Institute of Standards and Technology (NIST) statistical tests.


2013 ◽  
Vol 722 ◽  
pp. 64-67
Author(s):  
Zhi Jing Liu

The C8051F02x microcomputer and its saving structure are introduced, I/O function expanding and connecting are analyzed for its data. The exterior data and the structure of the memory are elaborated with the technique expanding request. Access or expansion of external data memory, external memory interfaces (EMIF). Its data memory address space can be flexibly implemented by the on-chip internal memory can be extended to chip memory. EMIF can be configured as address / data multiplexed or non-multiplexed mode. When big capacity FLASH memorizer is needed, this paper provides a realistic design and methodology for microcomputer and string big capacity FLASH of total line, through the setup and analysis of the SPI of the C8051F02x MCU inner part.


1999 ◽  
Vol 10 (01) ◽  
pp. 1-17 ◽  
Author(s):  
SEONGHUN CHO ◽  
SARTAJ SAHNI

We show that the leftist tree data structure may be adapted to obtain data structures that permit the double-ended priority queue operations Insert, DeleteMin, DeleteMax, and Merge to be done in O( log n) time where n is the size of the resulting queue. The operations FindMin and FindMax can be done in O(1) time. Experimental results are also presented.


Author(s):  
Nicholas Whitlock ◽  
José C. Luís ◽  
Sam Shannon ◽  
Mark Alano ◽  
COP 4520

We investigated the binary search tree data structure proposed in the publication, Efficient Lock-Free Binary Search Trees by Bapi Chatterjee, Nhan Nguyen and Philipas Tsigas. We will explore its correctness, progression factor, and the linearizability of its operations and report our findings. With a lock-free algorithm, software engineers will be able to use a thread-safe binary search tree that is capable of the many different operations that are normally available on a binary search tree. This includes the basic, primitive operations of Add(), Contains(), and Remove(), without the performance loss of using a binary search tree that uses object locking. An implementation of a binary search tree that uses locks to promote thread-safety takes a performance loss due to the threads waiting when another thread holds the lock and causing contention. The approach outlined in the aforementioned paper claims to have several key fundamental improvements over existing lock-free binary search tree algorithms. This implementation of the binary search tree eliminates contention in Contains() operations where, if a node was modified while a Contains() operation took place, the program would restart any current operation from the root of the tree. This happens because the thread can no longer reliably confide in the traversal of the tree and must restart its search. This is taxing to the performance of a binary search tree and an inefficient design can underperform a sequential implementation. Among other improvements, the authors of this paper claim that their algorithm is linearizable and has improved disjoint-access parallelism compared to similar existing algorithms.


1980 ◽  
Vol 2 (2) ◽  
pp. 102-121 ◽  
Author(s):  
Behzad Noorbehesht ◽  
Gail Flesher ◽  
Glen Wade

The spatial response of resonant piezoelectric plates used in various acoustic imaging systems is of significant practical interest and is closely related to the resolving ability of these systems. In a certain class of applications, in order to achieve the desired transducing action, the faces of the plate are only partially electroded. There, it is advantageous to be able to predict and control the spatial distribution of the acoustic output from the knowledge of the spatial distribution of the electrodes. A new technique is presented for determining the spatial distribution of the acoustic output of an arbitrarily electroded piezoelectric plate. This technique regards the transducer as a linear spatial system, with the electrode pattern considered as the input and the resulting acoustic particle displacement pattern immediately in front of the transducer in the propagation medium as the output. Once the spatial transfer function or the spatial impulse response of the system is known, the output for any electrode configuration can be found using Fourier techniques. Experimental measurements of the output of several piezoelectric plates due to different electrode patterns compare closely with calculations based on the above theory.


2019 ◽  
Vol 13 (2) ◽  
pp. 101-107
Author(s):  
Shailender Kumar ◽  
Preetam Kumar ◽  
Aman Mittal

Background: A Window Aggregate function belongs to a class of functions, which have emerged as a very important tool for Big Data Analytics. They lend support in analysis and decisionmaking applications. A window aggregate function aggregates and returns the result by applying the function over a limited number of tuples corresponding to current tuple and hence lending support for big data analytics. We have gone through different patents related to window aggregate functions and its optimization. The cost associated with Big data analytics, especially the processing of window functions is one of the major limiting factors. However, now a number of optimizing techniques have evolved for both single as well as multiple window aggregate functions. Methods: In this paper, the authors have discussed various optimization techniques and summarized the latest techniques that have been developed over a period through intensive research in this area. The paper tried to compare various techniques based on certain parameters like the degree of parallelism, multiple window function support, execution time etc. Results: After analyzing all these techniques, segment tree data structure seems better technique as it outperforms other techniques on different grounds like efficiency, memory overhead, execution speed and degree of parallelism. Conclusion: In order to optimize the window aggregate function, segment tree data structure technique is a better technique, which can certainly improve the processing of window aggregate function specifically in big data analytics.


2007 ◽  
Vol 18 (02) ◽  
pp. 295-317
Author(s):  
TOBIAS LAUER ◽  
THOMAS OTTMANN ◽  
AMITAVA DATTA

We show that two data structures, min-augmented range tree and priority search pennant, efficiently support all the required operations for updatable IP router tables and argue that both structures are better suited for the one-dimensional dynamic IP lookup problem than the priority search tree (PST) used in a previous solution. It is possible to maintain both structures in time O(1) after a rotation, while PST with n elements may require Ω( log n) steps for a single rotation. Therefore, the proposed structures can be balanced using a larger class of rebalancing schemes compared to PST. Both structures are also of interest independently of the IP lookup problem and may be used as attractive implementations of priority search queues in other contexts as well.


Sign in / Sign up

Export Citation Format

Share Document