Index structures for path expressions

T Milo, D Suciu - International Conference on Database Theory, 1999 - Springer
In recent years there has been an increased interest in managing data that does not conform
to traditional data models, like the relational or object oriented model. The reasons for this …

[PDF][PDF] Signature files: An access method for documents and its analytical performance evaluation

C Faloutsos, S Christodoulakis - ACM Transactions on Information …, 1984 - dl.acm.org
The signature-file access method for text retrieval is studied. According to this method,
documents are stored sequentially in the" text file." Abstractions (" signatures") of the …

[PDF][PDF] Asymptotic enumeration methods

AM Odlyzko - Handbook of combinatorics, 1995 - Citeseer
Asymptotic enumeration methods provide quantitative information about the rate of growth of
functions that count combinatorial objects. Typical questions that these methods answer …

Mellin transforms and asymptotics: Finite differences and Rice's integrals

P Flajolet, R Sedgewick - Theoretical Computer Science, 1995 - Elsevier
High order differences of simple number sequences may be analysed asymptotically by
means of integral representations, residue calculus, and contour integration. This technique …

Asymptotic fringe distributions for general families of random trees

D Aldous - The Annals of Applied Probability, 1991 - JSTOR
Consider some model of random finite trees of increasing size. It often happens that the
subtree at a uniform random vertex converges in distribution to a limit random tree. We …

Burst tries: a fast, efficient data structure for string keys

S Heinz, J Zobel, HE Williams - ACM Transactions on Information …, 2002 - dl.acm.org
Many applications depend on efficient management of large sets of distinct strings in
memory. For example, during index construction for text databases a record is held for each …

Average-case analysis of algorithms and data structures

JS Vitter, P Flajolet - Algorithms and Complexity, 1990 - Elsevier
Publisher Summary This chapter discusses the analytic methods for average-case analysis
of algorithms, with special emphasis on the main algorithms and data structures used for …

Universal limit laws for depths in random trees

L Devroye - SIAM Journal on Computing, 1998 - SIAM
Random binary search trees, b-ary search trees, median-of-(2k+ 1) trees, quadtrees, simplex
trees, tries, and digital search trees are special cases of random split trees. For these trees …

Branching processes and their applications in the analysis of tree structures and tree algorithms

L Devroye - Probabilistic methods for algorithmic discrete …, 1998 - Springer
We give a partial overview of some results from the rich theory of branching processes and
illustrate their use in the probabilistic analysis of algorithms and data structures. The …

Asymptotic behavior of the Lempel-Ziv parsing scheme and digital search trees

P Jacquet, W Szpankowski - Theoretical Computer Science, 1995 - Elsevier
The Lempel-Ziv parsing scheme finds a wide range of applications, most notably in data
compression and algorithms on words. It partitions a sequence of length n into variable …