<编程珠玑>笔记 (一) 问题-算法-数据结构
1 精确描述问题
第一章强调的重点在于”精确的描述问题“,这是程序开发的第一步 -- "Problem definition"
1.1 Precise problem statement
1) input: a file containing at most 107 positive intergers (each < 107); any interger occurs twice is an error; no other data is associated with the interger
2) output: a sorted list in increasing order
3) constraints: at most 1MB available in main memory; ample disk storage; 10s ≤ runtime < several minutes (at most)
1.2 Program design
1) mergesort with work files
read the file once from the input, sort it with the aid of work files that are read and written many times, and then write it once
2) 40-pass algorithm
if we store each number in 4 bytes (32-bit int), we can store 250,000 numbers in 1MB (1 megabytes/4 bytes).
we use a program that makes 40 passes over the input files. The first pass reads 0 ~ 249,999, and the 40th pass reads 9,750,000 ~ 9,999,999
3) read once without intermediate files
only if we could represent all the integers in the input file in 1MB of main memory (即使利用下文 bitmap 结构,107个整数仍需要1.25MB > 1MB)
1.3 Implementation sketch
we use bitmap data structure to represent the file by a string of 107 bits in which the ith bit is on only if the interger i is in the file
E.g. store the set {1, 2, 3, 5, 8, 13} in a string of 20 bits
0 1 1 1 0 1 0 0 1 0 0 0 0 1 0 0 0 0 0 0
1, 2, 3, 4, 5, 6, 7, 8, 9, 10,11,12,13,14,15,16,17,18,19,20
// n is the number of bits in the vector (in this case 10,000,000) // 1) initialize set to empty , n) bit[i] = // 2) insert present elements into the set for each i in the input file bit[i] = // 3) write sorted output , n) write i on the output file
1.4 Principles
design = right problem + bitmap data structure + multiple-pass algorithm + time-space tradeoff
2 三个算法
在第二章里作者首先提出了三个问题,然后引出各自对应的算法实现。
2.1 Binary search
Given a sequential file that contain at most 4x109 integers(32-bit) in random order, find a 32-bit integer that is not in the file.
How would you solve it with ample main memory? -- bitmap (232bits)
or using several external "scratch" files but only a few hundred bytes of main memory? -- binary search 二分查找
the insight is that we can probe a range by counting the elements above
and below its midpoint: either the upper or the lower range has at most
half the elements in the total range. Because the total range has a
missing element, the smaller half must also have a missing element.
its only drawback is that the entire table must be known and sorted in advance.
2.2 Rotate -> reverse
Rotate a one-dimensional vector x of n elements left by i positions. For instance, with n=8 and i=3, the vector abcdefgh is rotated into defghabc.
Can you rotate the vector in time proportional to n using only a few dozen extra bytes of storage?
starting with ab, we reverse a to get arb, reverse b to get arbr, and then reverse the whole thing to get (arbr)r, which is exactly ba
reverse(, i-) // cbadefgh reverse(i, n-) // cbahgfed reverse(, n-) // defghabc
2.3 Signatures
Given a dictionary of English words, find all sets of anagram. For instance, "pots", "stop" and "tops" are all anagrams of each other.
3 四条原则
第三章作者给出了四条原则,并重点阐述一种编程观念 “data does indeed structure programs”
1) rework repeated code into arrays
a long stretch of similar code is often best expressed by the array
2) encapsulate complex structures 封装复杂结构
define a sophisticated data structure in abstract terms, and express those operations as a class
3) use advanced tools when possible
Hypertext, name-value pairs, spreadsheets, databases, languages are powerful tools
4) let the data structure the program
before writing code, thoroughly understand the input, the output and the intermediate data structures
4 验证正确性
在芯片设计(IC)领域有专门的职位叫做芯片验证工程师,他们常用的一种方法叫形式验证(Formal Verification),具体包括等价性检查,模型检查和定理证明。
本章所讲的程序验证方法(并非软件测试),与芯片行业的形式验证非常相似。参考芯片行业,随着分工的细化,软件领域也会出现更多的验证工程师。
4.1 Binary search
determine whether the sorted array x[0..n-1] contains the target element t
mustbe(range): the key idea is that we always know that if t is anywhere in x[0..n-1], then it must be in a certain range of x
1) sketch
/* sketch */ initialize range to ..n- loop { invariation: mustbe(range) } if range is empty, break and report that t is not in the array compute m, the middle of the range use m as a probe to shrink the range if t is found during the shrinking process, break and report its position
2) refine
/* refine */ lo = ; hi = n- loop { mustbe(lo, hi) } if lo > hi p = -; break mid = lo + (hi-lo)/ case x[mid] < t: lo = mid + x[mid] == t: p = m; break x[mid] > t: hi = mid -
3) program
/* program */ { mustbe(, n-) } lo = ; hi = n - { mustbe(lo,hi) } loop { mustbe(lo,hi) } if lo > hi { lo > hi && mustbe(lo,hi) } { t is not in the array } p = -; break { mustbe(lo,hi) && lo <= hi } m = lo + (hi-lo)/ { mustbe(lo,hi) && lo <= mid <= hi } case x[mid] < t: { mustbe(lo,hi) && cantbe(,mid) } { mustbe(mid+,hi) } lo = mid + { mustbe(lo,hi) } x[mid] == t: { mustbe(lo,hi) } p = mid; break x[m] > t: { mustbe(lo,hi) && cantbe(mid, n-) } { mustbe(lo,mid-) } hi = mid- { mustbe(lo,hi) } { mustbe(lo,hi) }
4.2 Program verification
1) assertions (inputs, variables and outputs)
2) sequential control structures
"do this statement and then that statement" -- place assertions between them and analyze each step of the program' progress individually
3) selection control structures
"if", "case": one of many choices is selected -- consider each of the several choices individually
4) iteration control structures
initialization: invariation is true when the loop is executed the first time
preservation: invariation is true before and after each iteration of loop
termination: the desired result is true whenever execution of the loop terminates
5) functions
precondition: the state(inputs, variables) must be true before it is called
postcondition: what the function will guarantee on termination
int bsearch( int t, int x[], int n ) /* precondition: x[0] <= x[1] <= ... <= x[n-1] postcondition: result == -1 => t not present in x 0 <= result < n => x[result] == t */
5 编程实现
本章紧接上一章,继续以“二分查找”为例,展示整个程序的实现过程
5.1 coding
/* return (any) position if t is in sorted x[0..n-1] or -1 if t is not present */ int binarysearch(DataType t) { int lo, hi, mid; lo = ; hi = n-; while(lo < hi) { mid = lo + (hi-lo)/; if(x[mid] < t) lo = mid + ; else if(x[mid] == t) return mid; else /* x[mid] > t */ hi = mid -; } ; }
5.2 testing
5.3 debugging
5.4 timing
<编程珠玑>笔记 (一) 问题-算法-数据结构的更多相关文章
- 【C语言编程入门笔记】排序算法之快速排序,一文轻松掌握快排!
排序算法一直是c语言重点,各个算法适应不用的环境,同时,在面试时,排序算法也是经常被问到的.今天我们介绍下快速排序,简称就是快排. 1.快速排序思想: 快排使用 分治法 (Divide and con ...
- 编程珠玑第一章的算法,Java实现,通俗易懂
该算法也就是所谓的位图算法,用一个int表示32位,也就是实际值为1~32的数. 按照书里说的, 该算法只适合内存有限,而磁盘和时间不限,且数字在1~MAX之间不重复的排序. package demo ...
- Select 选择算法 - 编程珠玑(续) 笔记
Select 算法 I 编程珠玑(续)介绍的 Quickselect 算法 选择 N 个元素中的第 K 小(大)值,是日常场景中常见的问题,也是经典的算法问题. 选取 N 个元素的数组的中的第 K 小 ...
- 《编程珠玑,字字珠玑》读书笔记完结篇——AVL树
写在最前面的 手贱翻开了<珠玑>的最后几章,所以这一篇更多是关于13.14.15章的内容.这篇文章的主要内容是“AVL树”,即平衡树,比红黑树低一个等次.捣乱真惹不起红黑树,情况很复杂:而 ...
- 【读书笔记】《编程珠玑》第一章之位向量&位图
此书的叙述模式是借由一个具体问题来引出的一系列算法,数据结构等等方面的技巧性策略.共分三篇,基础,性能,应用.每篇涵盖数章,章内案例都非常切实棘手,解说也生动有趣. 自个呢也是头一次接触编程技巧类的书 ...
- 读书笔记--编程珠玑II
学化学的应该都知道chemdraw,这是一款专门绘制化学结构的软件,什么苯环.双键各种word难以搞定的分子式,你可以轻松的用chemdraw完成,可以称得上化学工作者居家旅行必备的良药.其实早在19 ...
- 编程珠玑I算法总结
主要是根据编程珠玑后面的Algorithm附录总结了一下这本书里面的经典算法. 1 辗转相减求最大公约数 思想:最大公约数能整除i和j,则其一定也能整除i-j(if i>j) int gcd(i ...
- 学习笔记之编程珠玑 Programming Pearls
Programming Pearls (2nd Edition): Jon Bentley: 0785342657883: Amazon.com: Books https://www.amazon.c ...
- 《Clojure编程》笔记 第3章 集合类与数据结构
目录 背景简述 第3章 集合类与数据结构 3.1 抽象优于实现 3.1.1 Collection 3.1.2 Sequence 3.1.3 Associative 3.1.4 Indexed 3.1. ...
随机推荐
- Oracle数据库异机升级
环境: A机:RHEL5.5 + Oracle 10.2.0.4 B机:RHEL5.5 需求: A机10.2.0.4数据库,在B机升级到11.2.0.4,应用最新PSU补丁程序. 目录: 一. 确认是 ...
- 记一次nginx部署yii2项目时502 bad gateway错误的排查
周六闲来无事,就试着安装和部署下yii2,安装过程没什么问题,但部署到nginx上时遇到了502 bad gatewary问题,折腾了半天才搞定.这个问题是我以前在部署yii2时没有遇到过的,因此记在 ...
- 使用roslyn代替MSBuild完成解决方案编译
原本我是使用批处理调用 MSBuild 完成解决方案编译的,新版的 MSBuild 在 Visual Studio 2015 会自带安装. 当然在Visual Studio 2015 中,MSBuil ...
- golang os.OpenFile
os.O_WRONLY | os.O_CREATE | O_EXCL [如果已经存在,则失败] os.O_WRONLY | os.O_CREATE ...
- linux下操作问题与总结
一. 出现问题 :从服务器244里拷贝ajun文件到自己linux下, 出现ajun: not a regular file? 解决方案:在进行scp传输“文件夹”的时候,加上参数r. 二. ...
- powerdesigner显示列描述信息
将Comment中的字符COPY至Name中 -------------------------------------------------- Option Explicit Validati ...
- html5 canvas 详细使用教程
转载自 http://www.cnblogs.com/tim-li/archive/2012/08/06/2580252.html 前言 基本知识 绘制矩形 清除矩形区域 圆弧 路径 绘制线段 绘制贝 ...
- zepto/jQuery、AngularJS、React、Nuclear的演化
写在前面 因为zepto.jQuery2.x.x和Nuclear都是为现代浏览器而出现,不兼容IE8,适合现代浏览器的web开发或者移动web/hybrid开发.每个框架类库被大量用户大规模使用都说明 ...
- 如何用代码读取Office Online Server2016的文档的备注信息
前言 在一个项目上客户要求读取office online server 2016的对文档的备注信息,如下图: 以前思路老纠结在OOS这个在线上,总有以为这个信息存储在某个列表中,其实错了,这个备注信息 ...
- (七)Maven使用的最佳实践
这里说一下在使用Maven过程中不是必须的,但十分有用的几个实践,关键时刻或许能解决您的问题. 1.设置MAVEN_OPTS环境变量 通常需要设置MAVEN_OPTS的值为-Xms128m -Xmx5 ...