Presentation is loading. Please wait.

Presentation is loading. Please wait.

Queues and Stacks.  Can receive multiple requests from multiple sources ◦ How do we services these requests?  First come, first serve processing 

Similar presentations


Presentation on theme: "Queues and Stacks.  Can receive multiple requests from multiple sources ◦ How do we services these requests?  First come, first serve processing "— Presentation transcript:

1 Queues and Stacks

2

3  Can receive multiple requests from multiple sources ◦ How do we services these requests?  First come, first serve processing  Priority based processing ◦ Buffering of requests, as they might arrive faster than they can be processed  You could always use a List structure, with an integer value associated with the item, and then append it to the List using the Add() method ◦ Inefficient

4  Two jobs added to List  Job 1 is processed and slot becomes available  Job 3 grabs first available slot, and Job 4 gets the next available slot  nextJobPost keeps track of the “next” job to be processed in the List

5  List will continue to grow, even if jobs are processed right away ◦ The default is to double the size, when the list requires additional “slots”  No reclaiming of the already used slots is done with Lists  If you do reclaim the “used” slots in the List, then your first-come, first-serve processing scheme will not work  A List represents a linear order

6  When adding an item, once the last item is used, the “next” will “wrap around” to the 0 th item in the array/list ◦ A “modulus” function is used to “wrap around”  What happens if all items are filled, and you still need another item? ◦ Resize the circular array…!  This is done in the Queue class

7  Add / remove buffer items ◦ First-come, first-serve (FIFO) ◦ Manage space utilization ◦ Uses Generics  Type-safe  Methods ◦ Enqueue()  Adds elements at the “tail” index  If not enough space, default growth factor of 2.0 is used to resize  Class constructor can specify other growth factor ◦ Dequeue()  Returns the current element from the “head” index  Sets the “head” element to null and increments the “head” index ◦ Peek()  Allows you to see the head element, without a dequeue, or increasing the head index counter ◦ Contains()  Determine if a specific item exists in the Queue ◦ ToArray()  Returns an array containing the Queue’s elements

8  LIFO structure  Uses a circular array, as does the Queue  Methods ◦ Push()  Adds an item to the stack ◦ Pop()  Removes and returns the item on the “top” of the stack  Size is increased, as required (same as the Queue’s growth factor)  Call Stack as used by the CLR is an example of this structure ◦ When calling a function, Push its information onto the stack ◦ When returning from that routine, Pop it from the stack and expose the routine to which it returns control

9  Problem: We often don’t know the “position” of an element within an array ◦ Potentially we process all elements before finding the one we need  Reduce the O-time to O(1) ◦ Build an array capable of holding all SS#’s ◦ Each element would hold a record based on the SS# as a “key” ◦ Waste  10 9 possible values, but you only have 1,000 employees  Utilization would be 0.0001% of the array  Hashing allows us to “compress” this ordinal indexing

10  Use the last 4 digits (or 3, or 5) of the SS# ◦ Mathematical transformation (mapping) of a nine- digit value to a four-digit value ◦ Array ranges from 0000 to 9999  Constant lookup time (O-time)  Better utilization of space  Hash table ◦ Array which uses hashing to compress the indexers  Hash function ◦ Function which performs the hashing

11  H(x) = last four digits of x  Collisions ◦ When multiple inputs to a hash function result in identical outputs  10 5 collisions for SS#’s ending in “0000” ◦ Collision of hash value results in attempting to store into a “slot” already occupied by a prior hash result

12  Collision frequency is directly correlated to the hash function ◦ SS# assumes that the last four digits are uniformly distributed  If year of birth, or geographical location alters the distribution  Increases collisions ◦ Collision avoidance is the selection of an appropriate hashing algorithm ◦ Collision resolution is locating another slot in the hashtable for entry placement

13  Linear probing ◦ If collision in slot i occurs, proceed to the next available slot (i+1), theni+2 and so on, if required  Alice = 1234, Bob=1234, Cal=1237, Danny=1235, Edward=1235  Insert Alice  Insert Bob  Insert Cal  Insert Danny  Insert Edward

14  Searching ◦ Start at the hash location, and then perform a linear search from there until the value is located  When/if you reach an empty slot your search value is NOT in that hashtable  Linear probing not very good resolution ◦ Leads to clustering of values  Ideally you’d like a uniform distribution of values  Quadratic probing ◦ Slot s is taken  Probe s+1 2, then s-1 2, then s+2 2, then s-2 2, and so on…  Can still lead to clustering

15  Rehashing ◦ Used by the.NET Framework Hashtable class ◦ Adding an item to the table  Provide item and unique key to access the item  Item and key can be of any type ◦ Retrieving item  Index the Hashtable by key

16 //Note the use of the ContainsKey() Method, which returns a Boolean using System; using System.Collections; public class HashtableDemo { private static Hashtable employees = new Hashtable(); public static void Main() { // Add some values to the Hashtable, indexed by a string key employees.Add("111-22-3333", "Scott"); employees.Add("222-33-4444", "Sam"); employees.Add("333-44-5555", "Jisun"); // Access a particular key if (employees.ContainsKey("111-22-3333")) { string empName = (string) employees["111-22-3333"]; Console.WriteLine("Employee 111-22-3333's name is: " + empName); } else Console.WriteLine("Employee 111-22-3333 is not in the hash table..."); }

17 // Step through all items in the Hashtable foreach(string key in employees.Keys) Console.WriteLine("Value at employees[\"" + key + "\"] = " + employees[key].ToString());  The order of insertion and order of keys are not necessarily the same ◦ Depends on the slot the key was stored in  depends on the hash value of the key  Depends on the collision resolution used ◦ The output from the above code results in: Value at employees["333-44-5555"] = Jisun Value at employees["111-22-3333"] = Scott Value at employees["222-33-4444"] = Sam

18  Function returns an ordinal value ◦ Slot # for the key ◦ Function can accept a key of any type ◦ GetHashCode()  Any object can be represented as a unique number

19  Rehashing (double hashing) ◦ Set of hash functions H 1 … H n ◦ H 1 is initially used  If collision, then H 2 is used, and so on  They differ by multiplicative factors ◦ Each slot in the hash table is visited exactly once when hashsize number of probes are made  For a given key, H i and H j cannot hash to the same slot in the table  This can work if the results of (1 + (((GetHash(key) >> 5) + 1) % (hashsize – 1)) and hashsize are “relatively prime”  They share no common factors  Guaranteed to be prime if hashsize is a prime number ◦ Better collision avoidance than linear or quadratic probing

20  Hashtable class ◦ Property: loadFactor  Max ratio of items in the Hash to the total slots in the table  0.5at most, half the slots can be used, and the other half must remain empty  Values range from 0.1 to 1.0  Microsoft has a default “scaling factor” of 72%  If you pass 1.0 to the loadFactor property, it’s still only 0.72 behind the scenes  Performance issue

21  Hashtable class ◦ Add() method  Performs a check against the loadFactor  If exceeded, the Hashtable is expanded ◦ Expansion  Slot count is approximately doubled  From the current prime number to the next largest prime number value  Hash value depends on the number of total slots  All values in the table need to be rehashed when the table expands  Occurs behind the scenes during Add() method

22  loadFactor ◦ Affects the size of the hash table and number of probes required on a collision  High load factor  Denser hash table, but more collisions  Expected number of probes needed when a collision happens  1/(1-loadFactor)  Default 0.72 loadFactor results in 3.5 probes per collision on average  Does not vary based on number of items in the table  Asymptotic access time is O(1)  Much more desirable that the O(n) search time for an array

23  Hashtable is “loosely-typed” structure ◦ Developer can add keys and values of any type to the table  Generics allow us to have type-safe implementations of a class  Dictionary class is a “type-safe” class ◦ Types the keys and the values ◦ You must specify the types for keys/values when creating the Dictionary instance ◦ Once created, you can add and remove items, just like the Hashtable

24  Collision resolution ◦ Different from the Hashtable ◦ Chaining is used  Secondary data structure is used for the collisions ◦ Each slot in the Dictionary contain an array of elements  A collision prepends the element to the bucket’s list

25  8 buckets (example) ◦ Employee object is added to the bucket that its key hashes to  If already occupied, item is prepended  Searching and removing items from a chained hashtable ◦ Time proportional to total items and number of buckets  O(n/m)  n=total elements  m= total buckets ◦ Dictionary class implemented  n=m at all times


Download ppt "Queues and Stacks.  Can receive multiple requests from multiple sources ◦ How do we services these requests?  First come, first serve processing "

Similar presentations


Ads by Google