您的位置:首页 > 理论基础 > 数据结构算法

算法和数据结构的实际应用

2016-07-25 20:44 363 查看
Algorithms that are the main driver behind a system are, in my opinion, easier to find in non-algorithms courses for the same reason theorems with immediate applications are easier to find in applied mathematics rather than pure mathematics courses. It is rare
for a practical problem to have the exact structure of the abstract problem in a lecture. To be argumentative, I see no reason why fashionable algorithms course material such as Strassen's multiplication, the AKS primality test, or the Moser-Tardos algorithm
is relevant for low-level practical problems of implementing a video database, an optimizing compiler, an operating system, a network congestion control system or any other system. The value of these courses is learning that there are intricate ways to exploit
the structure of a problem to find efficient solutions. Advanced algorithms is also where one meets simple algorithms whose analysis is non-trivial. For this reason, I would not dismiss simple randomized algorithms or PageRank.

I think you can choose any large piece of software and find basic and advanced algorithms implemented in it. As a case study, I've done this for the Linux kernel, and shown a few examples from Chromium.


Basic Data Structures and Algorithms in the Linux kernel

Links are to the source code on github.

Linked list, doubly
linked list, lock-free linked
list.

B+ Trees with
comments telling you what you can't find in the textbooks.

A relatively simple B+Tree implementation. I have written it as a learning exercise to understand how B+Trees work. Turned out to be useful as well.

...

A tricks was used that is not commonly found in textbooks. The lowest values are to the right, not to the left. All used slots within a node are on the left, all unused slots contain NUL values. Most operations simply loop once over all slots and terminate
on the first NUL.

Priority sorted lists used
for mutexes, drivers,
etc.

Red-Black trees are used for
scheduling, virtual memory management, to track file descriptors and directory entries,etc.

Interval trees

Radix trees, are used
for memory management, NFS related lookups and networking related
functionality.

A common use of the radix tree is to store pointers to struct pages;

Priority
heap, which is literally, a textbook implementation, used in the control
group system.

Simple insertion-only static-sized priority heap containing pointers, based on CLR, chapter 7

Hash
functions, with a reference to Knuth and to a paper.

Knuth recommends primes in approximately golden ratio to the maximum integer representable by a machine word for multiplicative hashing. Chuck Lever verified the effectiveness of this technique:

http://www.citi.umich.edu/techreports/reports/citi-tr-00-1.pdf

These primes are chosen to be bit-sparse, that is operations on them can use shifts and additions instead of multiplications for machines where multiplications are slow.

Some parts of the code, such as this
driver, implement their own hash function.

hash function using a Rotating Hash algorithm

Knuth, D. The Art of Computer Programming, Volume 3: Sorting and Searching, Chapter 6.4. Addison Wesley, 1973

Hash tables used to implement inodes, file
system integrity checks etc.

Bit arrays, which are used
for dealing with flags, interrupts, etc. and are featured in Knuth Vol. 4.

Semaphores and spin
locks

Binary search is used for interrupt
handling, register
cache lookup, etc.

Binary
search with B-trees

Depth
first search and variant used in directory
configuration.

Performs a modified depth-first walk of the namespace tree, starting (and ending) at the node specified by start_handle. The callback function is called whenever a node that matches the type parameter is found. If the callback function returns a non-zero value,
the search is terminated immediately and this value is returned to the caller.

Breadth
first search is used to check correctness of locking at runtime.

Merge sort on linked lists is used
for garbage
collection, file
system management, etc.

Bubble
sort is amazingly implemented too, in a driver library.

Knuth-Morris-Pratt
string matching,

Implements a linear-time string-matching algorithm due to Knuth, Morris, and Pratt [1]. Their algorithm avoids the explicit computation of the transition function DELTA altogether. Its matching time is O(n), for n being length(text), using just an auxiliary
function PI[1..m], for m being length(pattern), precomputed from the pattern in time O(m). The array PI allows the transition function DELTA to be computed efficiently "on the fly" as needed. Roughly speaking, for any state "q" = 0,1,...,m and any character
"a" in SIGMA, the value PI["q"] contains the information that is independent of "a" and is needed to compute DELTA("q", "a") 2.
Since the array PI has only m entries, whereas DELTA has O(m|SIGMA|) entries, we save a factor of |SIGMA| in the preprocessing time by computing PI rather than DELTA.

[1] Cormen, Leiserson, Rivest, Stein Introdcution to Algorithms, 2nd Edition, MIT Press

[2] See finite automation theory

Boyer-Moore
pattern matching with references and recommendations for when to prefer the alternative.

Implements Boyer-Moore string matching algorithm:

[1] A Fast String Searching Algorithm, R.S. Boyer and Moore. Communications of the Association for Computing Machinery, 20(10), 1977, pp. 762-772.http://www.cs.utexas.edu/users/moore/publications/fstrpos.pdf

[2] Handbook of Exact String Matching Algorithms, Thierry Lecroq, 2004 http://www-igm.univ-mlv.fr/~lecroq/string/string.pdf

Note: Since Boyer-Moore (BM) performs searches for matchings from right to left, it's still possible that a matching could be spread over multiple blocks, in that case this algorithm won't find any coincidence.

If you're willing to ensure that such thing won't ever happen, use the Knuth-Pratt-Morris (KMP) implementation instead. In conclusion, choose the proper string search algorithm depending on your setting.

Say you're using the textsearch infrastructure for filtering, NIDS or

any similar security focused purpose, then go KMP. Otherwise, if you really care about performance, say you're classifying packets to apply Quality of Service (QoS) policies, and you don't mind about possible matchings spread over multiple fragments, then go
BM.


Data Structures and Algorithms in the Chromium Web Browser

Links are to the source code on Google code. I'm only going to
list a few. I would suggest using the search feature to look up your favourite algorithm or data structure.

Splay trees.

The tree is also parameterized by an allocation policy (Allocator). The policy is used for allocating lists in the C free store or the zone; see zone.h.

Voronoi
diagrams are used in a demo.

Tabbing
based on Bresenham's algorithm.

There are also such data structures and algorithms in the third-party code included in the Chromium code.

Binary
trees

Red-Black
trees

Conclusion of Julian Walker

Red black trees are interesting beasts. They're believed to be simpler than AVL trees (their direct competitor), and at first glance this seems to be the case because insertion is a breeze. However, when one begins to play with the deletion algorithm, red black
trees become very tricky. However, the counterweight to this added complexity is that both insertion and deletion can be implemented using a single pass, top-down algorithm. Such is not the case with AVL trees, where only the insertion algorithm can be written
top-down. Deletion from an AVL tree requires a bottom-up algorithm.

...

Red black trees are popular, as most data structures with a whimsical name. For example, in Java and C++, the library map structures are typically implemented with a red black tree. Red black trees are also comparable in speed to AVL trees. While the balance
is not quite as good, the work it takes to maintain balance is usually better in a red black tree. There are a few misconceptions floating around, but for the most part the hype about red black trees is accurate.

AVL
trees

Rabin-Karp string
matching is used for compression.

Compute
the suffixes of an automaton.

Bloom
filter implemented by Apple Inc.

Bresenham's
algorithm.


Programming Language Libraries

I think they are worth considering. The programming languages designers thought it was worth the time and effort of some engineers to implement these data structures and algorithms so others would not have to. The existence of libraries is part of the reason
we can find basic data structures reimplemented in software that is written in C but less so for Java applications.

The C++ STL includes lists, stacks, queues, maps, vectors,
and algorithms for sorting, searching and heap manipulation.

The Java API is very extensive and covers much more.

The Boost
C++ library includes algorithms like Boyer-Moore and Knuth-Morris-Pratt string matching algorithms.


Allocation and Scheduling Algorithms

I find these interesting because even though they are called heuristics, the policy you use dictates the type of algorithm and data structure that are required, so one need to know about stacks and queues.

Least Recently Used can be implemented in multiple ways. A list-based
implementation in the Linux kernel.

Other possibilities are First In First Out, Least Frequently Used, and Round Robin.

A variant of FIFO was used by the VAX/VMS system.

The Clock algorithm by Richard
Carr is used for page frame replacement in Linux.

The Intel i860 processor used a random replacement policy.

Adaptive Replacement Cache is used in some
IBM storage controllers, and was used in PostgreSQL though only
briefly due to patent concerns.

The Buddy memory allocation algorithm, which
is discussed by Knuth in TAOCP Vol. 1 is used in the Linux kernel, and the jemalloc concurrent allocator used by FreeBSD and infacebook.


Core utils in *nix systems

grep and awk both implement the Thompson-McNaughton-Yamada construction of NFAs from regular
expressions, which apparently even beats the Perl implementation.

tsort implements topological sort.

fgrep implements the Aho-Corasick
string matching algorithm.

GNU grep, implements
the Boyer-Moore algorithm according to the author Mike Haertel.

crypt(1) on Unix implemented a variant of the encryption algorithm in the Enigma machine.

Unix
diff implemented by Doug McIllroy, based on a prototype co-written with James Hunt, performs better than the standard dynamic programming algorithm used to compute Levenshtein distances. The Linux
version computes the shortest edit distance.


Cryptographic Algorithms

This could be a very long list. Cryptographic algorithms are implemented in all software that can perform secure communications or transactions.

Merkle trees, specifically the Tiger Tree Hash variant, were
used in peer-to-peer applications such as GTK Gnutella and LimeWire.

MD5 is used to provide a checksum for software packages and is used
for integrity checks on *nix systems (Linux
implementation) and is also supported on Windows and OS X.

OpenSSL implements many cryptographic algorithms including AES, Blowfish,
DES, SHA-1, SHA-2, RSA, DES, etc.


Compilers

LALR parsing is implemented by yacc and bison.

Dominator algorithms are used in most optimizing compilers based on SSA form.

lex and flex compile regular expressions into NFAs.


Compression and Image Processing

The Lempel-Ziv algorithms for the GIF image format are implemented
in image manipulation programs, starting from the *nix utility convert to complex programs.

Run length encoding is used to generate PCX files (used by the original Paintbrush program), compressed BMP files and TIFF files.

Wavelet compression is the basis for JPEG 2000 so all digital cameras that produce JPEG 2000 files will be implementing this algorithm.

Reed-Solomon error correction is implemented in the
Linux kernel, CD drives, barcode readers and was combined with convolution for image transmission from Voyager.


Conflict Driven Clause Learning

Since the year 2000, the running time of SAT solvers on industrial benchmarks (usually from the hardware industry, though though other sources are used too) has decreased nearly exponentially every year. A very important part of this development is the Conflict
Driven Clause Learning algorithm that combines the Boolean Constraint Propagation algorithm in the original paper of Davis Logemann and Loveland with the technique of
clause learning that originated in constraint programming and artificial intelligence research. For specific, industrial modelling, SAT is considered an easy problem (see
this discussion). To me, this is one of the greatest success stories in recent times because it combines algorithmic advances spread over several years, clever engineering ideas, experimental evaluation, and a concerted communal effort to solve the problem.
The CACM article by Malik and Zhang is a good read. This
algorithm is taught in many universities (I have attended four where it was the case) but typically in a logic or formal methods class.

Applications of SAT solvers are numerous. IBM, Intel and many other companies have their own SAT solver implementations. The package
manager in OpenSUSE also uses a SAT solver.
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签: