skip to main content
article
Free Access

A comment on the double-chained tree

Published:01 April 1972Publication History
Skip Abstract Section

Abstract

In 1963, Sussenguth [8] suggested that a file should be organized as a double-chained tree for searching and updating. Patt [5] then obtained the optimum double-chained tree under the assumption that no key may prefix another and that all terminal nodes (items of information) have equal probabilities of being searched. Stanfel [6, 7] explored the relation between the double-chained tree and variable length code [3] and solved a special integer programming problem which corresponds to the case of equal probabilities of terminal nodes and a finite set of available symbols for keys with different costs.

References

  1. 1 Hu, T. C. and Tan, K. C. Path length of binary search trees. Rep. 1111, Mathematics Res. Ct., U. of Wisc., Mar. 1971.Google ScholarGoogle Scholar
  2. 2 Hu, T. C. and Tucker, A. C. Optimum binary search trees. Rep. 1049, Mathematics Res. Ctr., U. of Wisc., Mar. 1970.Google ScholarGoogle Scholar
  3. 3 Karp, R. M. Minimum redundancy coding for the discrete, noiseless channel. IRE Trans. IT-7 (1961), 27-35.Google ScholarGoogle Scholar
  4. 4 Knuth, D. E. Fundamental Algorithms. Addison-Wesley, Reading, Mass., 1968, p. 333.Google ScholarGoogle Scholar
  5. 5 Patt, Y. Variable length tree structures having minimum average search time. Comm. ACM 12, 2 (Feb. 1969), 72-76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 Stanfel, L. E. Tree structures for optimal seaching. J. ACM 17, 3 (July 1970), 508-517. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7 Stanfel, L. E. A comment on optimum tree structures. Comm. ACM 12, 10 (Oct. 1969), 582. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 Sussenguth, E. H., Jr. Use of tree structures for processing files. Comm. ACM 6, 5 (May 1963), pp. 272-279. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A comment on the double-chained tree
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 15, Issue 4
        April 1972
        70 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/361284
        Issue’s Table of Contents

        Copyright © 1972 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 April 1972

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader