6 research outputs found

    New Paths from Splay to Dynamic Optimality

    Full text link
    Consider the task of performing a sequence of searches in a binary search tree. After each search, an algorithm is allowed to arbitrarily restructure the tree, at a cost proportional to the amount of restructuring performed. The cost of an execution is the sum of the time spent searching and the time spent optimizing those searches with restructuring operations. This notion was introduced by Sleator and Tarjan in (JACM, 1985), along with an algorithm and a conjecture. The algorithm, Splay, is an elegant procedure for performing adjustments while moving searched items to the top of the tree. The conjecture, called "dynamic optimality," is that the cost of splaying is always within a constant factor of the optimal algorithm for performing searches. The conjecture stands to this day. In this work, we attempt to lay the foundations for a proof of the dynamic optimality conjecture.Comment: An earlier version of this work appeared in the Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms. arXiv admin note: text overlap with arXiv:1907.0630

    Sorting Pattern-Avoiding Permutations via 0-1 Matrices Forbidding Product Patterns

    Full text link
    We consider the problem of comparison-sorting an nn-permutation SS that avoids some kk-permutation π\pi. Chalermsook, Goswami, Kozma, Mehlhorn, and Saranurak prove that when SS is sorted by inserting the elements into the GreedyFuture binary search tree, the running time is linear in the extremal function Ex(Pπhat,n)\mathrm{Ex}(P_\pi\otimes \text{hat},n). This is the maximum number of 1s in an n×nn\times n 0-1 matrix avoiding PπhatP_\pi \otimes \text{hat}, where PπP_\pi is the k×kk\times k permutation matrix of π\pi, \otimes the Kronecker product, and hat=()\text{hat} = \left(\begin{array}{ccc}&\bullet&\\\bullet&&\bullet\end{array}\right). The same time bound can be achieved by sorting SS with Kozma and Saranurak's SmoothHeap. In this paper we give nearly tight upper and lower bounds on the density of PπhatP_\pi\otimes\text{hat}-free matrices in terms of the inverse-Ackermann function α(n)\alpha(n). \mathrm{Ex}(P_\pi\otimes \text{hat},n) = \left\{\begin{array}{ll} \Omega(n\cdot 2^{\alpha(n)}), & \mbox{for most $\pi$,}\\ O(n\cdot 2^{O(k^2)+(1+o(1))\alpha(n)}), & \mbox{for all $\pi$.} \end{array}\right. As a consequence, sorting π\pi-free sequences can be performed in O(n2(1+o(1))α(n))O(n2^{(1+o(1))\alpha(n)}) time. For many corollaries of the dynamic optimality conjecture, the best analysis uses forbidden 0-1 matrix theory. Our analysis may be useful in analyzing other classes of access sequences on binary search trees

    Improved Pattern-Avoidance Bounds for Greedy BSTs via Matrix Decomposition

    Full text link
    Greedy BST (or simply Greedy) is an online self-adjusting binary search tree defined in the geometric view ([Lucas, 1988; Munro, 2000; Demaine, Harmon, Iacono, Kane, Patrascu, SODA 2009). Along with Splay trees (Sleator, Tarjan 1985), Greedy is considered the most promising candidate for being dynamically optimal, i.e., starting with any initial tree, their access costs on any sequence is conjectured to be within O(1)O(1) factor of the offline optimal. However, in the past four decades, the question has remained elusive even for highly restricted input. In this paper, we prove new bounds on the cost of Greedy in the ''pattern avoidance'' regime. Our new results include: The (preorder) traversal conjecture for Greedy holds up to a factor of O(2α(n))O(2^{\alpha(n)}), improving upon the bound of 2α(n)O(1)2^{\alpha(n)^{O(1)}} in (Chalermsook et al., FOCS 2015). This is the best known bound obtained by any online BSTs. We settle the postorder traversal conjecture for Greedy. The deque conjecture for Greedy holds up to a factor of O(α(n))O(\alpha(n)), improving upon the bound 2O(α(n))2^{O(\alpha(n))} in (Chalermsook, et al., WADS 2015). The split conjecture holds for Greedy up to a factor of O(2α(n))O(2^{\alpha(n)}). Key to all these results is to partition (based on the input structures) the execution log of Greedy into several simpler-to-analyze subsets for which classical forbidden submatrix bounds can be leveraged. Finally, we show the applicability of this technique to handle a class of increasingly complex pattern-avoiding input sequences, called kk-increasing sequences. As a bonus, we discover a new class of permutation matrices whose extremal bounds are polynomially bounded. This gives a partial progress on an open question by Jacob Fox (2013).Comment: Accepted to SODA 202

    Optimization with pattern-avoiding input

    Full text link
    Permutation pattern-avoidance is a central concept of both enumerative and extremal combinatorics. In this paper we study the effect of permutation pattern-avoidance on the complexity of optimization problems. In the context of the dynamic optimality conjecture (Sleator, Tarjan, STOC 1983), Chalermsook, Goswami, Kozma, Mehlhorn, and Saranurak (FOCS 2015) conjectured that the amortized access cost of an optimal binary search tree (BST) is O(1)O(1) whenever the access sequence avoids some fixed pattern. They showed a bound of 2α(n)O(1)2^{\alpha{(n)}^{O(1)}}, which was recently improved to 2α(n)(1+o(1))2^{\alpha{(n)}(1+o(1))} by Chalermsook, Pettie, and Yingchareonthawornchai (2023); here nn is the BST size and α()\alpha(\cdot) the inverse-Ackermann function. In this paper we resolve the conjecture, showing a tight O(1)O(1) bound. This indicates a barrier to dynamic optimality: any candidate online BST (e.g., splay trees or greedy trees) must match this optimum, but current analysis techniques only give superconstant bounds. More broadly, we argue that the easiness of pattern-avoiding input is a general phenomenon, not limited to BSTs or even to data structures. To illustrate this, we show that when the input avoids an arbitrary, fixed, a priori unknown pattern, one can efficiently compute a kk-server solution of nn requests from a unit interval, with total cost nO(1/logk)n^{O(1/\log k)}, in contrast to the worst-case Θ(n/k)\Theta(n/k) bound; and a traveling salesman tour of nn points from a unit box, of length O(logn)O(\log{n}), in contrast to the worst-case Θ(n)\Theta(\sqrt{n}) bound; similar results hold for the euclidean minimum spanning tree, Steiner tree, and nearest-neighbor graphs. We show both results to be tight. Our techniques build on the Marcus-Tardos proof of the Stanley-Wilf conjecture, and on the recently emerging concept of twin-width; we believe our techniques to be more generally applicable
    corecore