Worst-case optimal priority queues via extended regular counters

Amr Ahmed Abd Elmoneim Elmasry, Jyrki Katajainen

5 Citations (Scopus)

Abstract

We consider the classical problem of representing a collection of priority queues under the operations find-min, insert, decrease, meld, delete, and delete-min. In the comparison-based model, if the first four operations are to be supported in constant time, the last two operations must take at least logarithmic time. Brodal showed that his worst-case efficient priority queues achieve these worst-case bounds. Unfortunately, this data structure is involved and the time bounds hide large constants. We describe a new variant of the worst-case efficient priority queues that relies on extended regular counters and provides the same asymptotic time and space bounds as the original. Due to the conceptual separation of the operations on regular counters and all other operations, our data structure is simpler and easier to describe and understand. Also, the constants in the time and space bounds are smaller.

Original languageEnglish
Title of host publicationComputer Science – Theory and Applications : 7th International Computer Science Symposium in Russia, CSR 2012, Nizhny Novgorod, Russia, July 3-7, 2012. Proceedings
EditorsEdward A. Hirsch, Juhani Karhumäki, Arto Lepistö, Michail Prilutskii
Number of pages13
PublisherSpringer
Publication date2012
Pages125-137
ISBN (Print)978-3-642-30641-9
ISBN (Electronic)978-3-642-30642-6
DOIs
Publication statusPublished - 2012
EventThe 7th International Computer Science Symposium in Russia - Nizhny Novgorod, Russian Federation
Duration: 3 Jul 20127 Jul 2012
Conference number: 7

Conference

ConferenceThe 7th International Computer Science Symposium in Russia
Number7
Country/TerritoryRussian Federation
CityNizhny Novgorod
Period03/07/201207/07/2012
SeriesLecture notes in computer science
Volume7353
ISSN0302-9743

Fingerprint

Dive into the research topics of 'Worst-case optimal priority queues via extended regular counters'. Together they form a unique fingerprint.

Cite this