Use an open-addressed hashing table of size m

Assignment Help Basic Computer Science
Reference no: EM13341137

1)Suppose that we use an open-addressed hashing table of size m to store n ? m / 2 items. Assuming uniform hashing, show that for i = 1, 2, ..., n, the probability is at most 2?k that the i-th
insertion requires strictly more than k probes.

(2) [10 points] Discuss the difficulties of deletion operation in hashing. Again use open-addressed hashing
instead of chaining. Give a deletion algorithm for linear probing.

(3) [10 points] In this assignment, you are going to find out the performance of (open-addressed) hashing by simulation. You should design a hash table of size approximately 200, a hash function of your own design (you are not allowed to use the ones in the notes nor those in the textbook), and test the hashing table at 10% increment of the load factor until 90% and then increase it by 1% until 95% or the algorithm failed somehow. The test should show the average "probes" required to insert a new element into the table. You will be given a list of words as the elements. If the word was already in the table, ignore it. Otherwise add it to the table. Use two strategies to resolve collisions: (1) linear probing, and (2) your own design. Produce a comparison of the two strategies to see if they are significantly different. Explain why if necessary. Assume the file name "q5.dat" for input data.

4) Show that the notion of a randomly chosen binary search tree on n keys, where each binary search tree of n keys is equally likely to be chosen, is different from the notion of a randomly built binary search tree given in this section. (Hint: List the possibilities when n D 3.)

5)What is the asymptotic performance of TREE-INSERT when used to insert n items with identical keys into an initially empty binary search tree?

Reference no: EM13341137

Questions Cloud

Spam is email still a useful information service : Given all the problems with spam is email still a useful information service? Research other networked services available on Linux servers and compare them with email. (500 words)
Use a triangle to indicate the challenges and bus processes : Use a triangle to indicate the challenges and bus processes changes
Necessarily memorize to the best of the machine abilities : If a researcher uses computer models for studying the memorization capabilities of the human mind, do the programs developed for the machine necessarily memorize to the best of the machine's abilities? Explain.
The built in python string functions : letterCount(letter, myString) This function should take a single letter, and then a string. It should return the number of times letter occurs in myString. So the call letterCount('h', 'hello') should return 1, and the call letterCount('a', 'aa..
Use an open-addressed hashing table of size m : 1)Suppose that we use an open-addressed hashing table of size m to store n ? m / 2 items. Assuming uniform hashing, show that for i = 1, 2, ..., n, the probability is at most 2?k that the i-th insertion requires strictly more than k probes.
Provide analysis on the difference between batch : Provide analysis on the difference between batch, visual basic, and powershell scripts then analyze when you would use each scripts and for what purpose. I.E. Batch for reception, powershell and VBScript for Administioration.
How long is your commute to work : Survey Questions - When writing survey questions it is very important to be careful how you word your questions. For example, if someone is asked, "How long is your commute to work," you might get answers that say how long it takes someone to ..
Staples : Staples
Memos are an important part of business communications : Memos are an important part of business communications. Being able to write a clear and concise memo is an important skill. For this assignment, create a one-page professional memo designed to introduce yourself to your instructor. While writi..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describe two different kinds of communication software

Is Web search a database query? Explain your answer.

  Create a second array to solve

Hence, the first item in the array should become the last one, and the last one in the array should become the first one, etc. You may NOT create a second array to solve this problem!

  Display a graphical representation of the binary search tree

The program should display a graphical representation of the binary search tree. Show all the leaf nodes; Show all the nodes in PreOrder, InOrder and PostOrder traversals.

  Identifying and describing how information is used

Write a 700- to 1,050-word paper identifying and describing how information is used and how it flows in an organization.

  Describe areas where you disagreement between sources

IT engagement model and management. Include any information you believe adds to the material in the text. Describe any areas where you see disagreement between the sources.

  Techniques attacker use to access information on system

Recognize all potential security threats on home personal computer. Recognize some of techniques the attacker might use to access some information on system.

  Prove that p(y|x=x)~bin(n-x,b/1-a)

Prove that p(y|X=x)~Bin(n-x,b/1-a) where x,y,z have multinomial distribution with parameters a,b,c and n.

  Write the definition of function dashedline

Write down the definition of a function dashedLine, with one parameter, an int. If parameter is negative or zero, function does nothing. Otherwise it prints complete line terminated by new line character to standard output consisting of dashes

  Identification of the concept of a target audience

You are working on a new Web site for Cruzes, Inc. The Web site is aimed at providing travel information to consumers interested in cruises. When meeting with Jason, the marketing manager of Cruzes, Inc

  Give cfg for the following language

Give CFG for the language L={x %u03F5 {0,1}*/x has unequal number of 0's and 1's}

  Describe how technical goals can be coupled with information

Describe how technical goals can be coupled with information assurance and security considerations in a network design project.

  Alter table statement that adds a new column

alter table statement that adds a new column, DuesPaid, to the individuals table. Use the bit data type, disallow null values, and assign a default Boolean value of False.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd