Selection from read-only memory with limited workspace

Amr Elmasry, Daniel Dahl Juhl, Jyrki Katajainen, Srinivasa Rao Satti

7 Citations (Scopus)

Abstract

In the classic selection problem the task is to find the kth smallest of N elements. We study the complexity of this problem on a space-bounded random-access machine: The input is given in a read-only array and the capacity of workspace is limited. We prove that the linear-time prune-and-search algorithm-presented in most textbooks on algorithms-can be adjusted to use O(N) bits instead of Θ(N) words of extra space. Prior to our work, the best known algorithm by Frederickson could perform the task with O(N) bits of extra space in O(N log N) time. In particular, our result separates the space-restricted random-access model and the multi-pass streaming model (since we can bypass the Ω(N log N) lower bound known for the latter model). We also generalize our algorithm for the case when the size of the workspace is O(S) bits,. The running time of our generalized algorithm is, slightly improving over the bound of Frederickson's algorithm. Of independent interest, the wavelet stack-a structure we used for repeated pruning-may also be useful in other applications.

Original languageEnglish
Title of host publicationComputing and Combinatorics : 19th International Conference, COCOON 2013, Hangzhou, China, June 21-23, 2013. Proceedings
EditorsDing-Zhu Du, Guochuan Zhang
Number of pages11
PublisherSpringer
Publication date2013
Pages147-157
ISBN (Print)978-3-642-38767-8
ISBN (Electronic)978-3-642-38768-5
DOIs
Publication statusPublished - 2013
Event19th International Conference on Computing and Combinatorics - Hangzhou, China
Duration: 21 Jun 201323 Jun 2013
Conference number: 19

Conference

Conference19th International Conference on Computing and Combinatorics
Number19
Country/TerritoryChina
CityHangzhou
Period21/06/201323/06/2013
SeriesLecture notes in computer science
Volume7936
ISSN0302-9743

Fingerprint

Dive into the research topics of 'Selection from read-only memory with limited workspace'. Together they form a unique fingerprint.

Cite this