

[2211.04112] Improved Pattern-Avoidance Bounds for Greedy BSTs via Matrix Decomp...
source link: https://arxiv.org/abs/2211.04112
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

[Submitted on 8 Nov 2022]
Improved Pattern-Avoidance Bounds for Greedy BSTs via Matrix Decomposition
Greedy BST (or simply Greedy) is an online self-adjusting binary search tree defined in the geometric view ([Lucas, 1988; Munro, 2000; Demaine, Harmon, Iacono, Kane, Patrascu, SODA 2009). Along with Splay trees (Sleator, Tarjan 1985), Greedy is considered the most promising candidate for being dynamically optimal, i.e., starting with any initial tree, their access costs on any sequence is conjectured to be within O(1) factor of the offline optimal. However, in the past four decades, the question has remained elusive even for highly restricted input.
In this paper, we prove new bounds on the cost of Greedy in the ''pattern avoidance'' regime. Our new results include:
The (preorder) traversal conjecture for Greedy holds up to a factor of O(2^{\alpha(n)}), improving upon the bound of 2^{\alpha(n)^{O(1)}} in (Chalermsook et al., FOCS 2015). This is the best known bound obtained by any online BSTs.
We settle the postorder traversal conjecture for Greedy.
The deque conjecture for Greedy holds up to a factor of O(\alpha(n)), improving upon the bound 2^{O(\alpha(n))} in (Chalermsook, et al., WADS 2015).
The split conjecture holds for Greedy up to a factor of O(2^{\alpha(n)}).
Key to all these results is to partition (based on the input structures) the execution log of Greedy into several simpler-to-analyze subsets for which classical forbidden submatrix bounds can be leveraged. Finally, we show the applicability of this technique to handle a class of increasingly complex pattern-avoiding input sequences, called k-increasing sequences.
As a bonus, we discover a new class of permutation matrices whose extremal bounds are polynomially bounded. This gives a partial progress on an open question by Jacob Fox (2013).
Comments: | Accepted to SODA 2023 |
Subjects: | Data Structures and Algorithms (cs.DS) |
Cite as: | arXiv:2211.04112 [cs.DS] |
(or arXiv:2211.04112v1 [cs.DS] for this version) | |
https://doi.org/10.48550/arXiv.2211.04112 |
Recommend
-
6
Posted 2 months ago2020-09-21T22:00:00+02:00 by Peter Steinberger Updated 2 months ago2020-09-22T12:34:00+02:00
-
12
More corporate IT avoidance by geeky employees This is a story about what happens when you have a whole bunch of techs who do all sorts of web hosting work and an IT department which is more of a liability than an asset. It's abo...
-
7
'Champions League of tax avoidance:' Uber used 50 Dutch shell companies to dodge taxes on nearly $6 billion in revenue, report says Tyler Sonnemaker May 12, 2021, 2:52 AM
-
9
Automatic Keyboard Avoidance for UIKit In iOS 14, Apple shows their love to SwiftUI by giving it automatic keyboard avoidance, it is turned on by default, meaning all your SwiftUI views can get this awesome feature automatically once...
-
8
DJI Mini 3 Pro leak shows obstacle avoidance sensors and a slightly bigger battery It will still weigh less than 250 grams By...
-
8
Computer Science > Computational Complexity [Submitted on 2 May 2022] Improved Low-Depth Set-Multil...
-
8
(Photo illustration: Michelle Urra) The Pivot to Web3 Is Going to Get People HurtIt can feel as if the entire world is bolting on crypto tokens and NFTs. Many in the industry worry the gold rush is a...
-
3
Microsoft’s DirectStorage 1.1 will soon boost PC game load times with GPU decompressionMicrosoft’s DirectStorage 1.1 will soon boost PC game load times with GPU decompression / Microsoft wants to offload game...
-
5
[AGC057D] Sum Avoidance
-
4
[Submitted on 25 Jul 2022] Improved Bounds for Sampling Solutions of Random CNF Formulas Download PDF...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK