To see the other types of publications on this topic, follow the link: Binary Search Trees.

Dissertations / Theses on the topic 'Binary Search Trees'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 21 dissertations / theses for your research on the topic 'Binary Search Trees.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

INAGAKI, Yasuyoshi, Tomio HIRATA, and Xuehou TAN. "Designing Efficient Geometric Search Algorithms Using Persistent Binary-Binary Search Trees." Institute of Electronics, Information and Communication Engineers, 1994. http://hdl.handle.net/2237/15061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Harmon, Dion (Dion Kane). "New bounds on optimal binary search trees." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/34268.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2006.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (p. 153-156).
Binary search trees (BSTs) are a class of simple data structures used to store and access keys from an ordered set. They have been around for about half a century. Despite their ubiquitous use in practical programs, surprisingly little is known about their optimal performance. No polynomial time algorithm is known to compute the best BST for a given sequence of key accesses, and before our work, no o(log n)-competitive online BST data structures were known to exist. In this thesis, we describe tango trees, a novel O(log log n)-competitive BST algorithm. We also describe a new geometric problem equivalent to computing optimal offline BSTs that gives a number of interesting results. A greedy algorithm for the geometric problem is shown to be equivalent to an offline BST algorithm posed by Munro in 2000. We give evidence that suggests Munro's algorithm is dynamically optimal, and strongly suggests it can be made online. The geometric model also lets us prove that a linear access algorithm described by Munro in 2000 is optimal within a constant factor. Finally, we use the geometric model to describe a new class of lower bounds that includes both of the major earlier lower bounds for the performance of offline BSTs, and construct an optimal bound in this new class.
by Dion Harmon.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
3

Goudjil, Amar. "Data structures, binary search trees, a study of random Weyl trees." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0026/MQ50778.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Goudjil, Amar. "Data structures, binary search trees : a study of random Weyl trees." Thesis, McGill University, 1998. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=21559.

Full text
Abstract:
This thesis covers the study of a particular class of binary search trees, the Weyl trees formed by consecutive insertion of numbers {theta}, {2theta}, {3theta}, ..., where theta is an irrational number from (0,1), and {x} denotes the fractional part of x. Various properties of the structure of these trees are explored and a relationship with the continued fraction expansion of theta is shown. Among these properties, an approximation of the height Hn of a Weyl tree with n nodes is given when theta is chosen at random and uniformly on (0, 1). The main result of this work is that in probability, Hn ∼ (12/pi2) log n log log n.
APA, Harvard, Vancouver, ISO, and other styles
5

Holmgren, Cecilia. "Random Records and Cuttings in Binary Search Trees." Licentiate thesis, Uppsala universitet, Analys och tillämpad matematik, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-141580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Manthey, Bodo. "Approximability of cycle covers and smoothed analysis of binary search trees." [S.l.] : [s.n.], 2005. http://deposit.ddb.de/cgi-bin/dokserv?idn=978602366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kozma, László [Verfasser], and Raimund [Akademischer Betreuer] Seidel. "Binary search trees, rectangles and patterns / László Kozma ; Betreuer: Raimund Seidel." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2016. http://d-nb.info/1114735019/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sayed, Hassan Adelyar. "The Complexity of Splay Trees and Skip Lists." Thesis, University of the Western Cape, 2008. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_6858_1263424080.

Full text
Abstract:

Our main results are that splay trees are faster for sorted insertion, where AVL trees are faster for random insertion. For searching, skip lists are faster than single class top-down splay trees, but two-class and multi-class top-down splay trees can behave better than skip lists.

APA, Harvard, Vancouver, ISO, and other styles
9

Holmgren, Cecilia. "Split Trees, Cuttings and Explosions." Doctoral thesis, Uppsala universitet, Matematiska institutionen, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-112239.

Full text
Abstract:
This thesis is based on four papers investigating properties of split trees and also introducing new methods for studying such trees. Split trees comprise a large class of random trees of logarithmic height and include e.g., binary search trees, m-ary search trees, quadtrees, median of (2k+1)-trees, simplex trees, tries and digital search trees. Split trees are constructed recursively, using “split vectors”, to distribute n “balls” to the vertices/nodes. The vertices of a split tree may contain different numbers of balls; in computer science applications these balls often represent “key numbers”. In the first paper, it was tested whether a recently described method for determining the asymptotic distribution of the number of records (or cuts) in a deterministic complete binary tree could be extended to binary search trees. This method used a classical triangular array theorem to study the convergence of sums of triangular arrays to infinitely divisible distributions. It was shown that with modifications, the same approach could be used to determine the asymptotic distribution of the number of records (or cuts) in binary search trees, i.e., in a well-characterized type of random split trees. In the second paper, renewal theory was introduced as a novel approach for studying split trees. It was shown that this theory is highly useful for investigating these types of trees. It was shown that the expected number of vertices (a random number) divided by the number of balls, n, converges to a constant as n tends to infinity. Furthermore, it was demonstrated that the number of vertices is concentrated around its mean value. New results were also presented regarding depths of balls and vertices in split trees. In the third paper, it was tested whether the methods of proof to determine the asymptotic distribution of the number of records (or cuts) used in the binary search tree, could be extended to split trees in general. Using renewal theory it was demonstrated for the overall class of random split trees that the normalized number of records (or cuts) has asymptotically a weakly 1-stable distribution. In the fourth paper, branching Markov chains were introduced to investigate split trees with immigration, i.e., CTM protocols and their generalizations. It was shown that there is a natural relationship between the Markov chain and a multi-type (Galton-Watson) process that is well adapted to study stability in the corresponding tree. A stability condition was presented to de­scribe a phase transition deciding when the process is stable or unstable (i.e., the tree explodes). Further, the use of renewal theory also proved to be useful for studying split trees with immi­gration. Using this method it was demonstrated that when the tree is stable (i.e., finite), there is the same type of expression for the number of vertices as for normal split trees.
APA, Harvard, Vancouver, ISO, and other styles
10

Love, Lorna. "The suffix binary search tree." Thesis, University of Glasgow, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.270960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Sedlář, František. "Algoritmy pro vyhledání nejdelšího shodného prefixu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236363.

Full text
Abstract:
This master's thesis explains basics of the longest prefix match (LPM) problem. It analyzes and describes chosen LPM algorithms considering their speed, memory requirements and an ability to implement them in hardware. On the basis of former findings it proposes a new algorithm Generic Hash Tree Bitmap. It is much faster than many other approaches, while its memory requirements are even lower. An implementation of the proposed algorithm has become a part of the Netbench library.
APA, Harvard, Vancouver, ISO, and other styles
12

Amri, Anis. "Autour de quelques statistiques sur les arbres binaires de recherche et sur les automates déterministes." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0301.

Full text
Abstract:
Cette thèse comporte deux parties indépendantes. Dans la première partie, nous nous intéressons à l’analyse asymptotique de quelques statistiques sur les arbres binaires de recherche (ABR). Dans la deuxième partie, nous nous intéressons à l’étude du problème du collectionneur de coupons impatient. Dans la première partie, en suivant le modèle introduit par Aguech, Lasmar et Mahmoud [Probab. Engrg. Inform. Sci. 21 (2007) 133—141], on définit la profondeur pondérée d’un nœud dans un arbre binaire enraciné étiqueté comme la somme de toutes les clés sur le chemin qui relie ce nœud à la racine. Nous analysons alors dans ABR, les profondeurs pondérées des nœuds avec des clés données, le dernier nœud inséré, les nœuds ordonnés selon le processus de recherche en profondeur, la profondeur pondérée des trajets, l’indice de Wiener pondéré et les profondeurs pondérées des nœuds avec au plus un enfant. Dans la deuxième partie, nous étudions la forme asymptotique de la courbe de la complétion de la collection conditionnée à T_n≤ (1+Λ), Λ>0, où T_n≃n ln⁡n désigne le temps nécessaire pour compléter la collection. Puis, en tant qu’application, nous étudions les automates déterministes et accessibles et nous fournissons une nouvelle dérivation d’une formule due à Korsunov [Kor78, Kor86]
This Phd thesis is divided into two independent parts. In the first part, we provide an asymptotic analysis of some statistics on the binary search tree. In the second part, we study the coupon collector problem with a constraint. In the first part, following the model introduced by Aguech, Lasmar and Mahmoud [Probab. Engrg. Inform. Sci. 21 (2007) 133—141], the weighted depth of a node in a labelled rooted tree is the sum of all labels on the path connecting the node to the root. We analyze the following statistics : the weighted depths of nodes with given labels, the last inserted node, nodes ordered as visited by the depth first search procees, the weighted path length, the weighted Wiener index and the weighted depths of nodes with at most one child in a random binary search tree. In the second part, we study the asymptotic shape of the completion curve of the collection conditioned to T_n≤ (1+Λ), Λ>0, where T_n≃n ln⁡n is the time needed to complete accessible automata, we provide a new derivation of a formula due to Korsunov [Kor78, Kor86]
APA, Harvard, Vancouver, ISO, and other styles
13

Rosati, Matteo. "Decoding protocols for classical communication on quantum channels." Doctoral thesis, Scuola Normale Superiore, 2017. http://hdl.handle.net/11384/85834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Amri, Anis. "Autour de quelques statistiques sur les arbres binaires de recherche et sur les automates déterministes." Electronic Thesis or Diss., Université de Lorraine, 2018. http://www.theses.fr/2018LORR0301.

Full text
Abstract:
Cette thèse comporte deux parties indépendantes. Dans la première partie, nous nous intéressons à l’analyse asymptotique de quelques statistiques sur les arbres binaires de recherche (ABR). Dans la deuxième partie, nous nous intéressons à l’étude du problème du collectionneur de coupons impatient. Dans la première partie, en suivant le modèle introduit par Aguech, Lasmar et Mahmoud [Probab. Engrg. Inform. Sci. 21 (2007) 133—141], on définit la profondeur pondérée d’un nœud dans un arbre binaire enraciné étiqueté comme la somme de toutes les clés sur le chemin qui relie ce nœud à la racine. Nous analysons alors dans ABR, les profondeurs pondérées des nœuds avec des clés données, le dernier nœud inséré, les nœuds ordonnés selon le processus de recherche en profondeur, la profondeur pondérée des trajets, l’indice de Wiener pondéré et les profondeurs pondérées des nœuds avec au plus un enfant. Dans la deuxième partie, nous étudions la forme asymptotique de la courbe de la complétion de la collection conditionnée à T_n≤ (1+Λ), Λ>0, où T_n≃n ln⁡n désigne le temps nécessaire pour compléter la collection. Puis, en tant qu’application, nous étudions les automates déterministes et accessibles et nous fournissons une nouvelle dérivation d’une formule due à Korsunov [Kor78, Kor86]
This Phd thesis is divided into two independent parts. In the first part, we provide an asymptotic analysis of some statistics on the binary search tree. In the second part, we study the coupon collector problem with a constraint. In the first part, following the model introduced by Aguech, Lasmar and Mahmoud [Probab. Engrg. Inform. Sci. 21 (2007) 133—141], the weighted depth of a node in a labelled rooted tree is the sum of all labels on the path connecting the node to the root. We analyze the following statistics : the weighted depths of nodes with given labels, the last inserted node, nodes ordered as visited by the depth first search procees, the weighted path length, the weighted Wiener index and the weighted depths of nodes with at most one child in a random binary search tree. In the second part, we study the asymptotic shape of the completion curve of the collection conditioned to T_n≤ (1+Λ), Λ>0, where T_n≃n ln⁡n is the time needed to complete accessible automata, we provide a new derivation of a formula due to Korsunov [Kor78, Kor86]
APA, Harvard, Vancouver, ISO, and other styles
15

Кучмій, О. О. "Реалізація телефонного довідника на структурах даних "зв’язний список" та "дерево пошуку"." Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72256.

Full text
Abstract:
Проведено інформаційний огляд існуючих можливостей створення телефонних довідників та аналіз структур даних для таких розробок. Розроблено телефонні довідники на структурах даних «зв’язний список» та «бінарне дерево пошуку».Проведено порівняльний аналіз одержаних програмних продуктів. Продемонстровано приклад роботи програми з усіма операціями та коментарями.
APA, Harvard, Vancouver, ISO, and other styles
16

Hung, Ling-Ju, and 洪綾珠. "Range Search Trees and the Maximum Agreement Subtree Problem on Binary Trees." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/92764435021626808896.

Full text
Abstract:
碩士
國立中正大學
資訊工程研究所
91
An evolutionary tree is a rooted tree. Each internal node of evolutionaty trees has at least two children and the leaves are labelled with distinct symbols representing species. Constructing evolutionary trees for species sets is a fundamental work in computing biology. Unfortunately, there is no single agreed upon method for this task, and many methods are in used. Different methods may lead to different trees for the same species. The resulting trees should be compared for consensus. It has become necessary to automate this process as the number of species under consideration has grown. We study one formalization of the problem: the maximum agreement subtree(MAST) problem. The MAST problem is as follow: given a set L and T = {T1, T2, . . . , Tk}, a profile of rooted trees with leaf-labelled by the elements of L and T1 is a 2-d tree, find a maximum cardinality subset X of L such that the topological restrictions of T1, T2, . . . , Tk are isomorphic. In this paper, we use the range search tree method to implement Bryant's[17] algorithm. The overall running time of the algorithm under our data structure is O(n2 logk n) and improving the original algorithm which runs in O(kn3).
APA, Harvard, Vancouver, ISO, and other styles
17

Lo, Wei-En, and 羅偉恩. "Fast Binary Search Packet Classification Based On Decision Trees." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/19616735166327089505.

Full text
Abstract:
碩士
國立成功大學
資訊工程學系碩博士班
96
With the rapid growth of internet requirement and the occurrence of network applications, backbone routers nowadays need to classify packets into flows in a short time. In this paper, we propose a new algorithm called fast binary search packet classification to improve the efficiency on both search speed and the memory storage. In our algorithm, we first partition the filter table with decision tree but process a binary search on leaf nodes instead of the traditional tree traversal. We use a hash- based bit selecting strategy to replace the range cutting method in order to reduce memory usage and the impact caused by unbalance environment. Our algorithm can be implemented in two schemes. Variable-selected-bit scheme chooses different bit on each node and thus has better memory utilization. Fixed-selected-bit scheme chooses same bit on each node in the same level in order to reduce the packet encoding time and then increase the search speed. At last we compare our algorithm with two well-known algorithm - HiCuts and HyperCuts. Result shows that variable- selected-bit scheme has better performance on memory usage in all kinds of filter tables than others; another fixed-selected-bit scheme performs 20% better than HiCuts on search in filter tables with uniform distribution and even more than 50% better in an unbalance environment.
APA, Harvard, Vancouver, ISO, and other styles
18

Manthey, Bodo [Verfasser]. "Approximability of cycle covers and smoothed analysis of binary search trees / Bodo Manthey." 2005. http://d-nb.info/978602366/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Archibald, Margaret Lyn. "Combinatorial problems related to sequences with repeated entries." Thesis, 2006. http://hdl.handle.net/10539/1732.

Full text
Abstract:
Student Number : 9708525G - PhD thesis - School of Mathematics - Faculty of Science
Sequences of numbers have important applications in the field of Computer Science. As a result they have become increasingly regarded in Mathematics, since analysis can be instrumental in investigating algorithms. Three concepts are discussed in this thesis, all of which are concerned with ‘words’ or ‘sequences’ of natural numbers where repeated letters are allowed: • The number of distinct values in a sequence with geometric distri- bution In Part I, a sample which is geometrically distributed is considered, with the objective of counting how many different letters occur at least once in the sample. It is concluded that the number of distinct letters grows like log n as n → ∞. This is then generalised to the question of how many letters occur at least b times in a word. • The position of the maximum (and/or minimum) in a sequence with geometric distribution Part II involves many variations on the central theme which addresses the question: “What is the probability that the maximum in a geometrically distributed sample occurs in the first d letters of a word of length n?” (assuming d ≤ n). Initially, d is considered fixed, but in later chapters d is allowed to grow with n. It is found that for 1 ≤ d = o(n), the results are the same as when d is fixed. • The average depth of a key in a binary search tree formed from a sequence with repeated entries Lastly, in Part III, random sequences are examined where repeated letters are allowed. First, the average left-going depth of the first one is found, and later the right-going path to the first r if the alphabet is {1, . . . , r} is examined. The final chapter uses a merge (or ‘shuffle’) operator to obtain the average depth of an arbitrary node, which can be expressed in terms of the left-going and right-going depths.
APA, Harvard, Vancouver, ISO, and other styles
20

Huang, Jung-Rong, and 黃俊榮. "Nonblocking Concurrent Binary Search Tree for Shared-Memory Multiprocessor." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/26538015162393547626.

Full text
Abstract:
碩士
國立交通大學
資訊工程系
87
Binary search tree is often used in operating system, database system and graph algorithm. Nonblocking algorithm guarantees that some process will complete its operation within a finite number of steps in the system. The nonblocking algorithm, in contrast to the traditional lock-based algorithm, enjoys higher concurrency and fault-tolerance. In this thesis, we propose a nonblocking concurrent binary search tree algorithm. In order to maintain the data integrity in the course of concurrent insert and delete, we use the auxiliary node in the tree structure. The algorithm maintains binary search tree property without locking. Finally, we prove the correctness of our algorithms.
APA, Harvard, Vancouver, ISO, and other styles
21

TingHuang, Po, and 黃柏庭. "Fast Decision Tree based Binary Search scheme for Packet Classification." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/53485088418884059817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography