Skip to main content
Log in

Three priority queue applications revisited

  • Application Experience Section
  • Published:
Algorithmica Aims and scope Submit manuscript

Abstract

Results indicate that the two recently introduced self-adjusting heaps are the most competitive choices for the applications considered. Further, the results indicate that only some heap structures support lazymerge/lazydelete operations well, partially confirming that algorithms based on top-down skew heap compare more favorably than those based on binomial queues, that there are strong grounds for believing the conjectured amortized time bounds for pairing heap operations, and that pairing heaps are a competitive alternative to Fibonacci heaps.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Brown, M. R., Implementation and analysis of binomial queue algorithms,SIAM J. Comput.,7 (1978), 298–319.

    Article  MATH  MathSciNet  Google Scholar 

  2. Cheriton, D., and Tarjan, R. E., Finding minimum spanning trees,SIAM J. Comput.,5 (1976), 724–742.

    Article  MATH  MathSciNet  Google Scholar 

  3. deCarvahlo, M., Private communication.

  4. Eliot, B., Private communication.

  5. Fredman, M. L.,et al., The pairing heap: a new form of self-adjusting heap,Algorithmica,1 (1986), 111–129.

    Article  MATH  MathSciNet  Google Scholar 

  6. Fredman, M. L., and Tarjan, R. E., Fibonacci heaps and their uses in network optimization algorithms,Proc. 25th Annual IEEE Symp. on Foundations of Computing, 1984, pp. 338–345.

  7. Jones, D. W., An empirical comparison of priority queue and event set implementations,Comm. ACM,29 (1986), 300–311.

    Article  Google Scholar 

  8. Jones, D. W., Private communication.

  9. Knuth, D. E.,The Art of Computer Programming, Vol. 2, 2nd edn., Addison-Wesley, Reading, MA, 1973, pp. 9–24, 39–45.

    Google Scholar 

  10. Knuth, D. E.,The Art of Computer Programming, Vol. 3, 2nd edn., Addison-Wesley, Reading, MA, 1973, pp. 145–152.

    Google Scholar 

  11. Kupferschmid, M., Private communication.

  12. Sedgewick, R.,Algorithms, Addison-Wesley, Reading, MA, 1983, pp. 35–42, 398–405.

    MATH  Google Scholar 

  13. Sleator, D. D., and Tarjan, R. E., Self-adjusting binary trees,Proc. 15th ACM Symp. on Theory of Computing, 1983, pp. 235–246.

  14. Sleator, D. D., and Tarjan, R. E., Self-adjusting binary search trees,J. Assoc. Comput. Mach.,32 (1985), 652–686.

    MATH  MathSciNet  Google Scholar 

  15. Sleator, D. D., and Tarjan, R. E., Self-adjusting heaps,SIAM J. Comput.,15 (1986), 52–69.

    Article  MATH  MathSciNet  Google Scholar 

  16. Tarjan, R. E.,Data Structures and Network Algorithms, CBMS Regional Conference Series in Applied Mathematics, Vol. 44, SIAM, Philadephia, PA, 1983.

    Google Scholar 

  17. Vaucher, J., and Jones, D. W., Technical correspondence on “An empirical comparison of priority queue and event set implementations,”Comm. ACM,29 (1986), 1002–1005.

    Google Scholar 

  18. Vuillemin, J., A data structure for manipulating priority queues,Comm. ACM,21 (1978), 309–314.

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Communicated by D. T. Lee.

This work was carried out during the author's final graduate year (1987) at Rensselaer Polytechnic Institute. Though the author is currently with Thomson Financial Networks, this is an unaffiliated paper.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liao, A.M. Three priority queue applications revisited. Algorithmica 7, 415–427 (1992). https://doi.org/10.1007/BF01758771

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01758771

Key words

Navigation