2012
DOI: 10.1007/s00453-012-9637-3
|View full text |Cite
|
Sign up to set email alerts
|

List Factoring and Relative Worst Order Analysis

Abstract: Relative worst order analysis is a supplement or alternative to competitive analysis which has been shown to give results more in accordance with observed behavior of online algorithms for a range of different online problems. The contribution of this paper is twofold. First, it adds the static list accessing problem to the collection of online problems where relative worst order analysis gives better results. Second, and maybe more interesting, it adds the non-trivial supplementary proof technique of list fac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
1

Relationship

5
1

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 29 publications
0
10
0
Order By: Relevance
“…As relative worst order analysis is getting more established as a method for analyzing online algorithms in general, it is getting increasingly important that the theoretical toolbox is extended to match the options available when carrying out competitive analysis. Recently, in [13], list factoring [1,4] was added as an analytical tool when using relative worst order analysis on list accessing problems [22,2], and here we demonstrate that access graphs can be included as another useful technique.…”
Section: Introductionmentioning
confidence: 64%
“…As relative worst order analysis is getting more established as a method for analyzing online algorithms in general, it is getting increasingly important that the theoretical toolbox is extended to match the options available when carrying out competitive analysis. Recently, in [13], list factoring [1,4] was added as an analytical tool when using relative worst order analysis on list accessing problems [22,2], and here we demonstrate that access graphs can be included as another useful technique.…”
Section: Introductionmentioning
confidence: 64%
“…The results on MOVE-TO-FRONT, FREQUENCY-COUNT, and TRANSPOSE, reported on above, as well as results on TIMESTAMP [Albers 1998], were obtained [Ehmsen et al 2013] using this tool.…”
Section: To Appear In Acm Computing Surveysmentioning
confidence: 74%
“…Extensive experiments demonstrate that MTF and FC are approximately equally good, whereas TRANS is much worse [Bentley and McGeoch 1985;Bachrach and El-Yaniv 1997]. Using RWOA, MTF and FC are equally good, whereas both WR TRANS,MTF ∈ Ω(l) and WR TRANS,FC ∈ Ω(l), so TRANS is much worse [Ehmsen et al 2013].…”
Section: List Accessingmentioning
confidence: 99%
“…Extensive experiments demonstrate that MTF and FC are approximately equally good, whereas TRANS is much worse [10,8]. Using RWOA, MTF and FC are equally good, whereas both WR TRANS,MTF ∈ Ω(l) and WR TRANS,FC ∈ Ω(l), so TRANS is much worse [38].…”
Section: Other Online Problemsmentioning
confidence: 99%
“…The results on MOVE-TO-FRONT, FREQUENCY-COUNT, and TRANSPOSE, reported on in Section 3.2, as well as results on TIMESTAMP [1], were obtained [38] using this tool.…”
Section: List Factoring For Analyzing List Accessingmentioning
confidence: 99%