The list update problem consists in maintaining a dictionary as an unsorted linear list. Any request specifies an item to be found by sequential scanning through the list. After an item has been found, the list may be rearranged in order to reduce the cost of processing a sequence of requests. Several kinds of adversaries can be considered to analyze the behavior of heuristics for this problem. The move-to-front (MTF) heuristic is 2-competitive against a strong adversary, matching the deterministic lower bound for this problem [Sleator and Tarjan (1985)]. But, for this problem, moving elements does not help the adversary. A lazy adversary has the limitation that he can use only a static arrangement of the list to process (off-line) the sequence of requests: still, no algorithm can be better than 2-competitive against the lazy adversary [Bentley and McGeogh (1985)]. In this paper we consider the weighted list update problem (WLUP), where the cost of accessing an item depends on the item itself. It is shown that MTF is not competitive by any constant factor for this problem against a lazy adversary. Two heuristics, based on the MTF strategy, are presented for WLUP: random move-to-front is randomized and uses biased coins; counting move-to-front is deterministic, and replaces coins by counters. Both are shown to be 2-competitive against a lazy adversary. This is optimal for the deterministic case. We apply this approach for searching items in a tree, proving that any c-competitive heuristic for the weighted list update problem provides a c-competitive heuristic for the tree update problem.

THE WEIGHTED LIST UPDATE PROBLEM AND THE LAZY ADVERSARY / D'Amore, Fabrizio; MARCHETTI SPACCAMELA, Alberto; Nanni, Umberto. - In: THEORETICAL COMPUTER SCIENCE. - ISSN 0304-3975. - STAMPA. - 108:2(1993), pp. 371-384. [10.1016/0304-3975(93)90201-4]

THE WEIGHTED LIST UPDATE PROBLEM AND THE LAZY ADVERSARY

D'AMORE, Fabrizio;Alberto Marchetti Spaccamela;NANNI, Umberto
1993

Abstract

The list update problem consists in maintaining a dictionary as an unsorted linear list. Any request specifies an item to be found by sequential scanning through the list. After an item has been found, the list may be rearranged in order to reduce the cost of processing a sequence of requests. Several kinds of adversaries can be considered to analyze the behavior of heuristics for this problem. The move-to-front (MTF) heuristic is 2-competitive against a strong adversary, matching the deterministic lower bound for this problem [Sleator and Tarjan (1985)]. But, for this problem, moving elements does not help the adversary. A lazy adversary has the limitation that he can use only a static arrangement of the list to process (off-line) the sequence of requests: still, no algorithm can be better than 2-competitive against the lazy adversary [Bentley and McGeogh (1985)]. In this paper we consider the weighted list update problem (WLUP), where the cost of accessing an item depends on the item itself. It is shown that MTF is not competitive by any constant factor for this problem against a lazy adversary. Two heuristics, based on the MTF strategy, are presented for WLUP: random move-to-front is randomized and uses biased coins; counting move-to-front is deterministic, and replaces coins by counters. Both are shown to be 2-competitive against a lazy adversary. This is optimal for the deterministic case. We apply this approach for searching items in a tree, proving that any c-competitive heuristic for the weighted list update problem provides a c-competitive heuristic for the tree update problem.
1993
01 Pubblicazione su rivista::01a Articolo in rivista
THE WEIGHTED LIST UPDATE PROBLEM AND THE LAZY ADVERSARY / D'Amore, Fabrizio; MARCHETTI SPACCAMELA, Alberto; Nanni, Umberto. - In: THEORETICAL COMPUTER SCIENCE. - ISSN 0304-3975. - STAMPA. - 108:2(1993), pp. 371-384. [10.1016/0304-3975(93)90201-4]
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/70294
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? 2
social impact