CSE 326: Data Structures
Practice Problems/Suggestions for Midterm
April 21, 1999

(Note that the some web browsers do not display mathematical equations correctly. If you have problems, you should consult the postscript version of these problems)

Global Comments:

Practice Problems on Recent Material (not to be turned in):

  1. Weiss, p. 175, problem 4.42
  2. Weiss, p. 204, problem 5.1.
  3. Suppose we use a random hash function h to hash n distinct keys into an array T of length m. What is the expected number of collisions? More precisely, what is the expected cardinality of {(x,y) | x ¹ y and h(x) = h(y)}? What is the worst-case number of collisions?
  4. What is the advantage of picking a hash function from a universal class of hash functions over using a fixed hash function?
  5. Consider a separate chaining hashing scheme that starts out with a table of size 100, rehashes the elements into a table twice the current size whenever the load exceeds threshold lhi, and rehashes the elements into a table half the current size, whenever the load drops below llo (and the table size is above 100). Assuming that the hash function being used distributes keys at random throughout the table, give values of lhi and llo that guarantee that the total expected cost to perform M operations (insert, delete, lookup, rehash) is O(M). Explain your answer.
  6. Weiss, p. 205, problem 5.8.
  7. When you buy a ticket in the State Lottery, you choose six different numbers between 1 and 36. The lottery officials keep a dictionary keyed on the set of six numbers chosen on each ticket. After the officials pick the winning numbers, they access this dictionary to identify the winning ticket or tickets, if any. Since millions of tickets are sold, the officials have decided to keep the dictionary in external storage with a directory in an internal hash table. Their computer consultant, S.L. Ow, has recommended that they use the hash function
    h(x1, x2, x3, x4, x5, x6) = (x1+ x2+ x3+ x4+ x5+ x6) mod m
    where m is the number of external buckets in which the records will be stored. Give a critique of this recommendation, and suggest a better alternative.

A Midterm From a Previous Quarter

  1. (4 points) Suppose you want to implement a Stack. State a reason that could cause you to choose the dynamic (``Linked'') implementation rather than the static (``Contiguous'', or array) implementation.
  2. (5 points) Show the result of deleting the key 34 from the following binary search tree. (Use ordinary binary search tree deletion exactly as presented in lecture, not AVL or splay tree deletion.)
            12
           /  \
          7   34
             /  \
            31  61
           /   /  \
          18  48  80
         /  \  \
        15  20  52
               /  \
              49  56
    
    
    
    

  3. (9 points) Consider the following AVL tree T.
            50
           /  \
         20    74
        /  \    \
      12    31   91
     /     /  \
    5    23    33
    

    1. In the figure above, label each node in T with its balance.
    2. Show the result of inserting the key 46 into the AVL tree T. (I recommend that you show your intermediate work, for the possibility of partial credit in case you make a mistake.)

  4. (5 points) During AVL insertion, we argued that no ancestor of the critical node ever changes balance or height. Given this fact, explain the exact circumstances under which the overall height of the AVL tree can ever increase.

  5. (16 points) Consider the following splay tree T.
              6
             / \
            5   13
           /   /
          4   11
         /   /  \
        3   9   12
       /   / \
      2   7  10
     /     \
    1       8
    

    1. Show the results of each of the rotations to splay the key 9 to the root. (I recommend that you show your intermediate work, for the possibility of partial credit in case you make a mistake.)
    2. In part (a), let T1 be your splay tree after the first Case I, II, or III rotation, and T2 be your splay tree after the second. Go back and label the nodes of the 3 trees T, T1, and T2 with their ranks.
    3. Suppose the Money Invariant holds for T, and suppose you were only paid $2 to splay the key 9 in T. According to the proof of the Cost of Splay Steps Lemma, for which of your two rotations (T to T1, or T1 to T2) would you have to take $1 from the tree, and from which node would the $1 come?
    4. Exactly how would the $2 you are paid for the splay in part (c) be used?

  6. (5 points) In class, a student asked why we bother to splay during a LookUp: once you've located the key in the splay tree, you know the value LookUp will return without having to splay. One reason to splay during LookUp is to achieve the self-organizing behavior (locality of reference), but there is a much more important reason. Explain what it is, and support your answer with a concrete example.

  7. (6 points) In the handout on splay trees, it was proven that you can delete key K from a splay tree if you are paid 7ëlognû+ 2 dollars (in addition to the dollars that the Money Invariant states are already in the tree). Recall that the breakdown for this figure was 3ëlognû+ 1 dollars to splay on K, another 3ëlognû+ 1 dollars to splay the left subtree on +¥, and ëlognû extra dollars to invest in the new root because it takes on new descendents. Explain why 6ëlognû+ 2 dollars is in fact sufficient for a Delete.


File translated from TEX by TTH, version 1.95.
On 11 May 1999, 04:46.