Data Structures and Algorithms
University of Washington, Winter 2023
This is CSE 373 Winter 2023 at the University of Washington. Looking for Spring 2023?
Husky Maps is a web app for mapping the world, searching for places, and navigating around Seattle. All these features are powered by the sociotechnical infrastructure of data structures and algorithms, programming abstractions designed by software engineers to represent data and automate processes. In your prior programming experience, you learned how to implement specifications by writing Java programs that used data structures to solve problems. In this course, you’ll learn how to answer the why question: Why did we choose to write the specification that way?
There are many decisions to make when designing a software system, and many of these decisions have significant consequences on qualities of a system. In this course, we’ll focus on learning data structures as implementations of abstract data types. An abstract data type describes what you can do with a data type, but not how the data type is implemented; a data structure provides both a description of functionality and a specific implementation of functionality. As a cultural idea that took hold in the 1970s, abstraction enabled computer scientists to think of their algorithms less as custom solutions made from scratch and more as templates adapted to address a particular problem.
Data Structures and Algorithms presents a selection of these cultural ideas in a way intended to help you design, analyze, and evaluate software systems. Learning these ideas can enable fuller participation in the community of computing professionals. This 10-week course is organized around four 2-week historical case study projects and a final portfolio. By the end of the course, you’ll have retraced the history of invention for 4 abstract data types, 12 implementations of them, and 7 real-world problems that they address:
- Deque data structures for browsing history.
- Autocomplete data structures and algorithms for search suggestions and DNA indexing.
- Priority queue data structures for content moderation and shortest paths.
- Shortest paths and graph data structures for seam carving and navigation directions.
- Portfolio assembling all of your work throughout the quarter.
What will you learn?
Deques
Data Structures
- 1/4
- Welcome
- PrjDeques
- 1/5
- SecData Structures
- 1/6
- Self-Introduction Video
Sorting Algorithms
- 1/9
- Compare and contrast runtime analysis, asymptotic analysis, and case analysis.
- Analyze the order of growth of a function as constant, linear, or quadratic.
- Identify big-theta asymptotic notation for the order of growth of a function.
- 1/11
- Describe the problem of sorting, ordering relations, and stability.
- Trace each iteration of selection sort and insertion sort.
- Identify a run of selection sort and insertion sort on an array.
- 1/12
- SecSorting Algorithms
- 1/13
- Analyze the runtime of a recursive algorithm using recurrences.
- Trace the recursive execution of merge sort.
- Identify a run of merge sort on an array.
Autocomplete
Search Trees
- 1/16
- Holiday
- 1/18
- Identify a best/worst-case height BST insertion order for given elements.
- Trace the search and insertion procedures in a BST and a TST.
- Explain in plain English the TST collection or traversal algorithm.
- PrjAutocomplete
- 1/19
- SecSearch Trees
- 1/20
- Identify element promotions during the 2-3 tree insertion process.
- Identify an insertion order that will increase the height of a 2-3 tree.
- Analyze the best-case and worst-case height of a 2-3 tree.
- AsmAssessment 1
Isomorphism
- 1/23
- Given a 2-3 tree, identify its corresponding LLRB tree (and vice-versa).
- Apply rotations and color flips for a single LLRB tree insertion.
- Using 1-1 correspondence, give the LLRB tree for a series of insertions.
- 1/25
- Compare comparison sorting algorithms on efficiency and stability.
- Given the runtime of a partitioning algorithm, describe the runtime of quicksort.
- Describe the search trees analogies for quicksort algorithms.
- 1/26
- SecIsomorphism
- 1/27
- Explain the worst-case lower bound for comparison sorting.
- Describe counting sort, MSD radix sort, and LSD radix sort.
- Explain how the subsort is used in MSD and LSD radix sort.
Priority Queues
Heaps and Hashing
- 1/30
- Apply sink/swim operations to trace heap element insertion and removal.
- Identify possible binary heap indices for the n-th smallest value.
- Given an array index, find the parent, left child, and right child indexes.
- 2/1
- Explain and trace hash table algorithms such as insertion and search.
- Evaluate how a hash table will behave in response to a given data type.
- Analyze the runtime of a hash table with a given bucket data structure.
- PrjPriority Queues
- 2/2
- SecHeaps and Hashing
- 2/3
- Describe how abstractions can embody values and structure social relations.
- Identify the affordances of a program abstraction such as a class or interface.
- Evaluate affordances by applying the 3 value-sensitive design principles.
- AsmAssessment 2
Midterm Interview
- 2/6
- Inclusive Design
- Slides
- Identify assumptions about users embedded in the design of a technology.
- Given an assumption, explain a scenario where the user experience breaks down.
- Given an assumption, identify multiple ways to make the design more inclusive.
- Midterm Interview
- 2/8
- Coded Bias
- 2/9
- SecMidterm Interview
- 2/10
- Coded Bias
Graphs
- 2/13
- Identify the features and representation for an example graph or graph problem.
- Analyze the runtime of a graph representation in terms of vertices and edges.
- Analyze the affordances of a graph interface or method for a particular problem.
- 2/15
- Trace and explain each data structure in BFS and DFS graph traversal.
- Analyze the runtime of a graph algorithm in terms of vertices and edges.
- Define an appropriate graph abstraction for a given image processing problem.
- 2/16
- SecGraphs
- 2/17
- Trace Prim’s algorithm to find a minimum spanning tree in a graph.
- Compare and contrast Prim’s algorithm and breadth-first search.
- Apply the super-source node pattern to simplify graph problems.
Shortest Paths
Graph Algorithms
- 2/20
- Holiday
- 2/22
- Trace Dijkstra’s and the topological sorting algorithm for shortest paths trees.
- Explain why Dijkstra’s algorithm might not work with negative edge weights.
- Explain the runtime for Dijkstra’s algorithm in terms of priority queue operations.
- PrjShortest Paths
- 2/23
- SecGraph Algorithms
- 2/24
- Identify whether a recursive algorithm can be rewritten using DP.
- Explain how unique paths can be counted using recursion and DP.
- Explain how a min-cost seam can be found using recursion and DP.
- AsmAssessment 3
Applications
- 2/27
- Trace Kruskal’s algorithm to find a minimum spanning tree in a graph.
- Compare Kruskal’s algorithm runtime on different disjoint sets implementations.
- Describe opportunities to improve algorithm efficiency by identifying bottlenecks.
- 3/1
- System Design
- Explain the principle of composition in program design and in system design.
- Explain the limits of monolithic system architecture design.
- Identify data structures used in database, storage, and load-balancing systems.
- 3/2
- SecApplications
- 3/3
- Iterative Design
Final Portfolio
Conclusion
- 3/6
- Today in Tech: Misinformation & Disinformation
- 3/8
- Ask us anything
- 3/9
- SecConclusion
- 3/10
- Conclusion
Why should we learn?
The education you receive in this course can help prepare you for programming jobs, but this isn’t the only purpose for learning computer science.1 Education is not only about yourself and your personal gain, but also about all of us and our capacity to live together as a community.
The University of Washington acknowledges the Coast Salish peoples of this land, the land which touches the shared waters of all tribes and bands within the Duwamish, Puyallup, Suquamish, Tulalip and Muckleshoot nations. Among the traditions of the Coast Salish peoples is a value for the connectedness between all living things and a recognition of the unique ways that each of us comes to know something.2
Modern education has the idea that we all need to know the same thing. At the end of the lesson, everyone will know the same thing. That’s why we have tests, that’s why we have quizzes, that’s why we have homework: to ensure we all know the same thing. And that’s powerful—that’s important—within a certain context.
But for native culture, the idea that each listener divines or finds their own answer, their own meaning, their own teaching from the story is equally powerful—that each person needs to be able to look at the world and define it for themselves within their culture and then also find a way to live in that world according to the teachings of their people in their culture.
Our course emphasizes the following values and policies.
- We are responsible for each others’ success
- Everyone has a right to feel like they belong in this course. We’ll need to act with compassion and caring to collaborate with each other. Although we will need more than just unexamined commitments to collaboration, listening, empathy, mindfulness, and caring,3 the following guidelines offer a starting point for ensuring compassion toward each other.4
- Listen with intention to understand first and form an opinion only after you fully understand.
- Take responsibility for the intended and unintended effects of your words and actions on others.
- Mindfully respond to others’ ideas by acknowledging the unique value of each contribution.
You should expect and demand to be treated by your classmates and teachers with respect. If any incident occurs that challenges this commitment to a supportive, diverse, inclusive, and equitable environment, please let the instructor know so the issue can be addressed. Should you feel uncomfortable bringing up an issue with the instructor directly, meet our advisors during quick questions or contact the College of Engineering.
- We recognize everyone has unique circumstances
- Do not hesitate to contact the instructor by private discussion post or appointment. The sooner we are made aware of your circumstances, the more we can help. Extenuating circumstances include work-school balance, familial responsibilities, religious observations, military duties, unexpected travel, or anything else beyond your control that may negatively impact your performance in the class.
- It is the policy and practice of the University of Washington to create inclusive and accessible learning environments consistent with federal and state law. If you have already established accommodations with Disability Resources for Students (DRS), activate your accommodations via myDRS so we can discuss how they will be implemented in this course. If you have a temporary health condition or permanent disability that requires accommodations, contact DRS directly to set up an Access Plan.
- Washington state law requires that UW develop a policy for accommodation of student absences or significant hardship due to reasons of faith or conscience, or for organized religious activities. The UW’s policy, including more information about how to request an accommodation, is available at Religious Accommodations Policy. Accommodations must be requested within the first two weeks of this course using the Religious Accommodations Request form.
- It is the policy and practice of the University of Washington to create inclusive and accessible learning environments consistent with federal and state law. If you have already established accommodations with Disability Resources for Students (DRS), activate your accommodations via myDRS so we can discuss how they will be implemented in this course. If you have a temporary health condition or permanent disability that requires accommodations, contact DRS directly to set up an Access Plan.
- We believe everyone wants to learn
- Education is about shaping your identity as much as it is about learning things. In school, the consequences of making mistakes are relatively small. But the habits you form now—repeated over days, weeks, months, or years—determine who you will be in the future. Now is the best time to practice honest habits.
- We ask that you do not claim to be responsible for work that is not yours. When you receive substantial help from someone else, include a citation. Don’t request a copy of someone else’s work, don’t provide your work to another student, and don’t post your solutions publicly.
- Academic honesty reflects the trust (or the lack thereof) between students and teachers. We do our best to design the course in ways that ensure trust, but we know our systems are not perfect. If you submit work in violation of these policies but bring it to the attention of the instructor within 72 hours, you may resubmit your own work without further consequence. Rather than blame students, we want to fix or replace broken systems that compel students to lose trust.
- We ask that you do not claim to be responsible for work that is not yours. When you receive substantial help from someone else, include a citation. Don’t request a copy of someone else’s work, don’t provide your work to another student, and don’t post your solutions publicly.
How will you learn?
In a traditional classroom, you attend class while a teacher lectures until time is up. Then, you go home and do the important work of applying concepts toward practice problems or assignments on your own. Finally, you take an exam to show what you know.
Today, we know that there are more effective ways to learn science, engineering, and mathematics.5 Think of learning computer science as learning how to ride a bike. Quite a few people know how to ride a bike. But how many of them learned to ride a bike through 50 minutes of lecture three times a week? Probably no one—learning to ride a bike requires riding an actual bike!
Likewise, learning computer science requires deliberate practice: a learning cycle that starts with sustained motivation, then presents tasks that build on prior knowledge, and concludes with immediate, personalized feedback. Each module in the course will involve several different activities that are designed so that we can make the most of our class time together.
- On your own before class, prepare for learning by completing the pre-class preparation.
- Lessons are designed to introduce all the concepts for the entire week’s classes.
- In Canvas, open the weekly Lessons and add an annotation or reply to an annotation.
- In your team during class and quiz section, collaborate on the in-class guided practice.
- Class meetings are designed to deepen, complicate, and connect ideas across the course.
- In Canvas, your section TAs will observe your learning and record your Teamwork.
- On your own after class, record a video showing what you learned in the past two weeks.
- Your videos emphasize not only problem solving skills, but also communication skills.
- In Canvas, demonstrate your learning by explaining your work for each Assessment.
- In your team throughout the module, apply your learning by collaborating on the project.
- Projects are designed to integrate and situate what you learned in real-world problems.
- In Canvas, demonstrate your learning by assembling a Project Presentation video.
Communicating your ideas and explaining your problem solving process is important in this course. We ask students to record their own screenshared and voiced videos because they provide rich information about your solution process and authenticate your assessment. But we know that visual or voiceover presentations are not accessible or equitable for everyone. If for any reason a voiceover presentation won’t work for you, we would be happy to work with you to find a better way to communicate your ideas and explain your problem solving process. You do not need to disclose why you feel uncomfortable, but we were thinking about people with vision impairment, gender and voice dysphoria, limited access to resources, or complicated living situations when designing this policy.
Expect to spend 4 hours in class and 8 hours outside of class working on this course. Some weeks may require more or less time than other weeks. If you find the workload is significantly exceeding this expectation, talk to your TA.
- 9:30 AM
- 10:00 AM
- 10:30 AM
- 11:00 AM
- 11:30 AM
- 12:00 PM
- 12:30 PM
- 1:00 PM
- 1:30 PM
- 2:00 PM
- 2:30 PM
- 3:00 PM
- 3:30 PM
- 4:00 PM
- 4:30 PM
- 5:00 PM
Monday
- Office Hours1:30 PM–3:30 PMSAV 155
- Lecture3:30 PM–4:30 PMGUG 220
Tuesday
- Office Hours9:30 AM–11:30 AMCSE 560
- Office Hours1:30 PM–5:30 PMCSE 560
Wednesday
- Office Hours11:30 AM–3:30 PMSAV 155
- Lecture3:30 PM–4:30 PMGUG 220
Thursday
- Sections9:30 AM–4:30 PM
- Office Hours3:30 PM–5:30 PMCSE 560
Friday
- Office Hours1:30 PM–3:30 PMSAV 139
- Lecture3:30 PM–4:30 PMGUG 220
Saturday
- Office Hours1:30 PM–3:30 PMZoom
How is this course graded?
Grading in this course encourages learning through deliberate practice by emphasizing revision and resubmission of work. All coursework is designed around feedback loops where you try something, get feedback, then try again. Grades are based on what you eventually learn through this process. Only the requirements listed under a Canvas module count toward your final grade.
- 1.0 or greater
- Completion of all requirements in the Deques module.
- Completion of all requirements in the Autocomplete module.
- 2.0 or greater
- Completion of all requirements in the Deques module.
- Completion of all requirements in the Autocomplete module.
- Completion of all requirements in the Priority Queues module.
- Completion of all requirements in the Autocomplete module.
- 3.0 or greater
- Completion of all requirements in the Deques module.
- Completion of all requirements in the Autocomplete module.
- Completion of all requirements in the Priority Queues module.
- Completion of all requirements in the Shortest Paths module.
- Completion of all requirements in the Autocomplete module.
- 4.0
- Completion of all requirements in the Deques module.
- Completion of all requirements in the Autocomplete module.
- Completion of all requirements in the Priority Queues module.
- Completion of all requirements in the Shortest Paths module.
- Highest marks across all parts of the Portfolio.
- Completion of all requirements in the Autocomplete module.
Evaluating Approaches to Teaching Data Structures and Algorithms
You are being asked to participate in a research study to find out more about how pedagogical and curricular approaches affect the student experience in an undergraduate Data Structures and Algorithms course. You have been asked to participate in this study because you are a student in a class that is being studied or used as a control. The purpose of this study is to create knowledge that has the potential to improve the educational experience for students at the University of Washington and beyond.
- What will you be asked to do?
- If you agree to be in this study, your data from this class including surveys/evaluations, coursework, course forum discussion, and online learning management system engagement will be included in the analysis. Your participation involves only agreeing to let us use your data in our analysis. You will not be asked to do anything beyond normal educational practice.
- What will happen to the information you provide?
- Data from participants will be retained only for research purposes and stored using codes that provide a degree of confidentiality. Your instructor will not know whether you are participating in this study until after final grades have been posted.
- What can you do if you want more information?
- Talk to the study team. Kevin Lin is the lead researcher at the University of Washington for this study and can be contacted at kevinl@cs.uw.edu.
- Talk to someone else. If you want to talk with someone who is not part of the study team about the study, your rights as a research subject, or to report problems or complaints about the study, contact the UW Human Subjects Division at hsdinfo@uw.edu or 206-543-0098.
- What are my options for participation?
- If you consent to participate in this study and are at least 18 years old, no action is needed.
- Participation in research is voluntary. You may withdraw at any time without penalty.
- If you decide to withdraw from the research, complete the online opt-out form.
Mark Guzdial. 2021. Computer science was always supposed to be taught to everyone, and it wasn’t about getting a job. ↩
Roger Fernandes. 2012. Roger Fernandes: Artist/Storyteller/Educator. ↩
Brian Arao and Kristi Clemens. 2013. “From Safe Spaces to Brave Spaces: A New Way to Frame Dialogue Around Diversity and Social Justice” in The Art of Effective Facilitation. ↩
Asao B. Inoue. 2019. “Sample Charter for Compassion” in Labor-Based Grading Contracts: Building Equity and Inclusion in the Compassionate Writing Classroom. ↩
Scott Freeman, Sarah L. Eddy, Miles McDonough, Michelle K. Smith, Nnadozie Okoroafor, Hannah Jordt, and Mary Pat Wenderoth. 2014. Active learning increases student performance in science, engineering, and mathematics. ↩
Explore CSE 373
- Assessments - Evaluate and explain your learning.
- Docs - Documentation for the project scaffold.
- Lessons - Learning materials and resources.
- Projects - Project instructions and specifications.
- Staff - All the teaching and learning assistants.