[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/28395.28436acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

Searching a two key table under a single key

Published: 01 January 1987 Publication History

Abstract

We present a method for arranging an arbitrary 2-key table as an n by 2 array such that a search can be performed under either key in O(lg2n lglg n) time. This is in sharp contrast with an Ω(√n) lower bound for the problem under a model in which all comparisons must involve the value being searched for.

References

[1]
H. Alt and K. MeNhom, Searching Semisorted TaNes, SiCOMP, vot. 14 no. 4, 1985, pp. 840-848.
[2]
H. Alt, K. MeNhom and J.I. Mum-o, Partial Match Retrieval in Implicit Data Structures, Information Processing Letters, vol. 19 no. 2, 1984, pp. 61-65.
[3]
J. Bentley, Multidimensional Binary Search Trees Used for Associative Searching, CACM 18, 9, Sept. 1975, pp. 509-516.
[4]
A. Borodin, F. Fich, F. Meyer auf der Heide, E. Upfal, and A. Wigclerson, Tradeoff Between Search and Update Time for the Implicit Dictionary Problem, Proe. ICALP, 1986, pp. 50-59.
[5]
A. Borodin, L. Guibas, N. Lynch and A. Yao, Efficient Searching Using Partial Ordering, Information Prying Letters, vol. 12 no. 2, 1981, pp. 71-75.
[6]
$. C.~k, pet~nal communication.
[7]
G.N. Frederickson, Implicit Data Structures for the Dictionary Problem, J. ACM, vol. 30 no. 1, 1983, pp. 80-94.
[8]
J.I. Munro, A Multikey Search Problem, Proc. Allerton, 1979, pp. 241- 244.
[9]
J.I. Munro, An Implicit Data Structure Supporting Insertion, Deletion and Search in 0(log2n) Time, JCSS 33, 1, Aug. 1986, pp. 66-74.
[10]
J.I. Munro and H. Suwanda, Implicit Data Structures, JCSS, vol. 21, 1980, pp. 236-250.
[11]
J.W.J. Williams, Algorithms 232: Heal:~rt, CACM 71, 1964, pp. 347- 348.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '87: Proceedings of the nineteenth annual ACM symposium on Theory of computing
January 1987
471 pages
ISBN:0897912217
DOI:10.1145/28395
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 1987

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

STOC87
Sponsor:

Acceptance Rates

STOC '87 Paper Acceptance Rate 50 of 165 submissions, 30%;
Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Upcoming Conference

STOC '25
57th Annual ACM Symposium on Theory of Computing (STOC 2025)
June 23 - 27, 2025
Prague , Czech Republic

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)71
  • Downloads (Last 6 weeks)9
Reflects downloads up to 22 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2005)The implicit dictionary problem revisitedAlgorithms and Computation10.1007/3-540-56279-6_100(479-488)Online publication date: 9-Jun-2005
  • (2005)Efficient algorithms for managing the history of evolving databasesICDT '9010.1007/3-540-53507-1_75(141-174)Online publication date: 7-Jun-2005
  • (2004)Proximity MergesortProceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms10.5555/982792.982833(291-299)Online publication date: 11-Jan-2004
  • (1988)Non-oblivious hashingProceedings of the twentieth annual ACM symposium on Theory of computing10.1145/62212.62248(367-376)Online publication date: 1-Jan-1988
  • (1988)Storing and searching a multikey tableProceedings of the twentieth annual ACM symposium on Theory of computing10.1145/62212.62245(344-353)Online publication date: 1-Jan-1988

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media