hashing, hash tables. hashCodes, and all types of maps

Ace your homework & exams now with Quizwiz!

continuity

"A hash function that is used to search for similar (as opposed to equivalent) data must be as continuous as possible; two inputs that differ by a little should be mapped to equal or nearly equal hash values."[

how many references must you change to insert a link at the end of a singly linked list

1

necessary properties of a hash function

1) . Determinism 2) . Uniformity 3) Defined range 4) Data normalization 5) continuity 6) Non-invertible

how many references must you change to insert a link in the middle of a singly linked list

2

Uniformity

A good hash function should map the expected inputs as evenly as possible over its output range - That is, every hash value in the output range should be generated with roughly the same probability - The reason for this last requirement is that the cost of hashing-based methods goes up sharply as the number of collisions—pairs of inputs that are mapped to the same hash value—increases. If some hash values are more likely to occur than others, a larger fraction of the lookup operations will have to search through a larger set of colliding table entries. When testing a hash function, the uniformity of the distribution of hash values can be evaluated by the chi-squared test.

hash function

A hash function is any function that can be used to map data of arbitrary size onto data of a fixed size. The values returned by a hash function are called hash values, hash codes, digests, or simply hashes

set

A set is like a hash map except it only stores keys, without values. in java we use hash maps to implement this

queue

FIFO

three types of maps in java

HashMap, TreeMap, and LinkedHashMap

Non-invertible

In cryptographic applications, hash functions are typically expected to be practically non-invertible, meaning that it is not realistic to reconstruct the input datum x from its hash value h(x) alone without spending great amounts of computing time (see also One-way function)

example of data normalization

In some applications, the input data may contain features that are irrelevant for comparison purposes. For example, when looking up a personal name, it may be desirable to ignore the distinction between upper and lower case letters

stack

LIFO

Search algorithms that use hashing consist of two separate parts

The first step is to compute a hash function that transforms the search key into an array index. Ideally, different keys would map to different indices. This ideal is generally beyond our reach, so we have to face the possibility that two or more different keys may hash to the same array index. Thus, the second part of a hashing search is a collision-resolution process that deals with this situation

purpose of hash table

The purpose of a hash table is to have O(c) constant time complexity in adding and getting the elements With a hash table if you want to retrieve an element you just pass the key and the hash function will return you the desired element

hash collisions

Typically, the domain of a hash function (the set of possible keys) is larger than its range (the number of different table indices), and so it will map several different keys to the same index which could result in collisions. So then, each slot of a hash table is associated with (implicitly or explicitly) a set of records, rather than a single record. For this reason, each slot of a hash table is often called a bucket, and hash values are also called bucket listing[citation needed] or a bucket index.

dynamic hash table

When the hash function is used to store values in a hash table that outlives the run of the program, and the hash table needs to be expanded or shrunk, the hash table is referred to as a dynamic hash table.

HashMap

a collection class that is designed to store elements as key-value pairs

dequeue

a double-ended queue is an abstract data type that generalizes a queue, for which elements can be added to or removed from either the front or back. use a double-ended linked list to implement this

hash function (in terms of tables)

a function which when given a key, generates an address in the table. - allows for fast access into an array

which of the following is not true, a reference object to a class object: a) can be used to access public methods in the object b) has a size dependent on its class c) has the data type the class d) does not hold the object itself

b

which of the following is not true, iterators would be useful if you wanted to: a) do an insertion sort on a linked list b) insert a new link at the beginning of a list c) swap two links at arbitrary locations d) delete all links with a certain key valur

b

when you create a reference to a link in a linked list, it ___________

can refer to any link you want

assuming current points to the next-to-last link in a singly linked list, what statement will delete the last link from the list

current.next = null

should we use a single or double-ended linked list when implementing a queue

double, its more efficient

of the list discussed in this chapter, which one would be best for implementing a queue

double-ended list

access to the links in a linked list is usually through the __________ link

first

HashSet

is a regular set - all objects in a set are distinct. HashSet stores and retrieves elements by their content, which is internally converted into an integer by applying a hash function. Elements from a HashSet are retrieved using an Iterator. The order in which elements are returned depends on their hash codes

when all references to a link are changed to refer to something else, what happens to the link

java's garbage collection process destroys it

assuming a copy takes longer than a comparison, is it faster to delete an item with a certain key from a linked list or from an unsorted array

linked list

would better to use a linked list or array to implement a stack

linked list because it uses memory more efficiently

what is java's answer to dictionaries

maps

Determinism

meaning that for a given input value it must always generate the same hash value - This requirement excludes hash functions that depend on external variable parameters, such as pseudo-random number generators or the time of day.

can a map in java contain duplicate keys

no

is the map interface a subtype of the collection interface

no

how many times would you need to traverse a singly linked list to delete the item with the largest key

once if the link contains a previous reference

maps

provide a way of looking up one thing based on the value of another.

hashCode() in java

provides a numeric representation of an object

separate chaining collision resolution

putting the keys that collide in a linked list. A hash table then is an array of lists

in the insertFirst() method in the linkedList.java program the statement newLink.next = first; means that:

the next field of the new link will refer to the old first link

collision

when two objects have the same hash value


Related study sets

Life and Death Decisions Midterm 2

View Set

CBA-396 International Business Test #3 JSU (Lenn Rainwater)

View Set

CH 4: Discounted Cash Flow Valuation

View Set

AP Biology: Plats, Chapter 11 - The Leaf

View Set

Critical Care: Chapter 19: Endocrine Alterations

View Set

Women during the French Revolution

View Set

History of Graphic Design Exam 1

View Set

Module 2.10: Mutual Funds and Other Investments

View Set

Semester #1, Unit #2 Multiple Choice Study Guide- A.P. Biology

View Set

Anatomy and Physiology Unit 1 Practice quiz

View Set