We present the zipper tree, an O(log log n)-competitive online binary search tree that performs each access in O(log n) worst-case time. This shows that for binary search trees, optimal worst-case access time and near-optimal amortized access time can be guaranteed simultaneously.The problem we consider in this paper is whether it is possible to combine the best of these bounds-that is, whether an O(log log n)-competitive BST algorithms that performs each access in optimal O(log n) worst-case time exists. We answer it affirmatively by presenting a data structure achieving these complexities. It is based on the overall framework of tango treeshowever, where tango trees use red-black trees [6] for storing what is called preferred paths, we develop a specialized BST representation of the preferred paths, tuned to the purpose. This representation is the main technical contribution, and its description takes up the bulk of the paper.In the journal version of their seminal paper on tango trees, Demaine et al. suggested that such a structure exists. Specifically, in the further work section, the authors gave a short sketch of a possible solution. Their suggested approach, however, relies on the existence of a BST supporting dynamic finger, split and merge in O(log r) worst-case time where r is 1 plus the rank difference between the accessed element and the previously accessed element. Such a BST could indeed be used for the auxiliary tree representation of preferred paths. However, the existence of such a structure (in the BST-model) is an open problem. Consequently, since the publication of their work, the authors have revised their stance and consider the problem solved in this paper to be an open problem [7]. Recently, Woo [13] made some progress concerning the existence of a BST having the dynamic finger property in worst-case. He developed a BST algorithm satisfying, based on empirical evidence, the dynamic finger property in worst-case. Unfortunately this BST algorithm does not allow insertion/deletion or split/merge operations, thus it cannot be used to maintain the preferred paths in a tango tree.After the publication of the tango tree paper, two other O(log log n)-competitive BSTs have been introduced by Derryberry et al. [4,11] and Georgakopoulos [5]. The multi-splay trees [4] are based on tango trees, but instead of using red-black trees as auxiliary trees, they use splay trees [10]. As a consequence, multi-splay trees can be shown [4,11] to satisfy additional properties, including the scanning and working-set bounds of splay trees, while maintaining O(log log n)-competitiveness. Georgakopoulos uses the interleave lower bound of Demaine et al. to develop a variation of splay trees called chain-splay trees that achieves O(log log n)competitiveness while not maintaining any balance condition explicitly. However, neither of these two structures achieves a worst-case single access time of O(log n). A data structure achieving the same running time as tango trees alongside O(log n) worst-case single access time wa...
We show that the Yao graph Y 4 in the L 2 metric is a spanner with stretch factor 8(29+23 √ 2). Enroute to this, we also show that the Yao graph Y ∞ 4 in the L ∞ metric is a planar spanner with stretch factor 8.In the appendix, we improve the stretch factor and show that, in fact, Y k is a spanner for any k ≥ 7. Recently, Molla [4] showed that Y 2 and Y 3 are not
We show that the Yao graph Y4 in the L2 metric is a spanner with stretch factor [Formula: see text]. Enroute to this, we also show that the Yao graph [Formula: see text] in the L∞ metric is a plane spanner with stretch factor 8.
Consider a rooted tree T of arbitrary maximum degree d representing a collection of n web pages connected via a set of links, all reachable from a source home page represented by the root of T. Each web page i carries a weight wi representative of the frequency with which it is visited. By adding hotlinks-shortcuts from a node to one of its descendents-we wish to minimize the expected number of steps l needed to visit pages from the home page, expressed as a function of the entropy H(p) of the access probabilities p. This paper introduces several new strategies for effectively assigning hotlinks in a tree. For assigning exactly one hotlink per node, our method guarantees an upper bound on l of 1.141H(p)+1 if d > 2 and 1.08H(p)+2/3 if d = 2. We also present the first efficient general methods for assigning at most k hotlinks per node in trees of arbitrary maximum degree, achieving bounds on l of at most 2H(p) log(k+1) and H(p) log(k+d)−log d , respectively. Finally, we present an algorithm implementing these methods in O(n log n) time, an improvement over the previous O(n 2) time algorithms.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.