Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/vbrazo/data-structures-archives
My data structures archives for an engineering management journey
https://github.com/vbrazo/data-structures-archives
algorithms data-structures tech-interviews
Last synced: about 1 month ago
JSON representation
My data structures archives for an engineering management journey
- Host: GitHub
- URL: https://github.com/vbrazo/data-structures-archives
- Owner: vbrazo
- Created: 2020-12-09T05:41:47.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2021-06-05T18:46:43.000Z (over 3 years ago)
- Last Synced: 2024-05-21T12:10:44.127Z (6 months ago)
- Topics: algorithms, data-structures, tech-interviews
- Language: Ruby
- Homepage:
- Size: 230 KB
- Stars: 4
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Data Structures Archives
This is my personal data structures archives and it's where I store my data structures research that aims to provide resources to better interview developers in my engineering management journey.
- [Data Structures](#data-structures)
- [Arrays](#arrays)
- [Strings](#strings)
- [Linked Lists](#linked-lists)
- [Stack and Queues](#stack-and-queues)
- [Hash Tables](#hash-tables)
- [Hash Set](#hash-set)
- [Hash Map](#hash-map)
- [Performance of Hash Table](#performance-of-hash-table)
- [Complexity Analysis](#complexity-analysis)
- [The Principle of Built-in Hash Table](#the-principle-of-built-in-hash-table)
- [Trees](#trees)
- [Binary Search Trees](#binary-search-trees)
- [Height-Balanced BST](#height-balanced-bst)
- [What is a Height-Balanced BST?](#what-is-a-height-balanced-bst)
- [Why Using a Height-Balanced BST?](#why-using-a-height-balanced-bst)
- [How to Implement a Height-Balanced BST?](#how-to-implement-a-height-balanced-bst)
- [N-ary Trees](#n-ary-trees)
- [Top-down solution](#top-down-solution)
- [Bottom-up solution](#bottom-up-solution)
- [Tries](#tries)
- [Performance of a Trie](#performance-of-a-trie)
- [Time complexity](#time-complexity)
- [Space complexity](#space-complexity)
- [How to represent a Trie](#how-to-represent-a-trie)
- [Array](#array)
- [Hash Map](#hash-map)
- [Complexity Analysis Comparison](#complexity-analysis-comparison)
- [Heaps](#heaps)
- [Graphs](#graphs)# Data Structures
![data-structures/data-structures.png](data_structures.png)
## Arrays
Arrays are without a doubt the most fundamental data structure in computer science. Under the hood, an array is represented as a fixed-size, contiguous block of memory with `O(1)` time to store and access an element. Because of this efficiency, many other data structures frequently use arrays for their implementation, such as strings, stacks, queues, and hash tables.
You can picture an array as a bounded row of labeled containers, starting at 0, where you can quickly put items in, take them out, or look up a value from an index (or label).
Arrays do have a few limitations. Looking up an element up by value typically requires an entire traversal of the array, unless it is sorted in some way. Deleting an element from an array means that all subsequent elements have to be shifted left by one, leading to an `O(n)` time operation. If possible, it is better to overwrite the value. Similarly, inserting an element early in the array requires the rest of the elements to be shifted right, so this should be done sparingly.
Finally, arrays have a fixed bound, which means that they may not be suitable for applications where the size of the collection of elements is not known ahead of time. In an interview setting, you should be careful of off-by-one errors that lead to trying to access an element outside the range of the array.
Python does not have native support for arrays; typically, you'll use the `list` data structure, which dynamically resizes under the hood. What this means is that you, the developer, it seems like the list is unbounded. In reality, as the list grows, the data structure may allocate a larger (typically twice the current size) array, copy of its elements to the larger one, and then use that as the underlying array.
## Strings
Strings are unavoidable part of programming. Every word in this sentence can be considered a string!
Behind the scenes, the contents of a string are typically sorted in a read-only sequential array in memory, meaning that strings are immutable. In other words, you can reassign a string variable to a new value, but you cannot change a particular character in the underlying array.
The most common operations performed on strings are indexing to get a particular character or substring, joining two strings together by concatenation, and splitting by a delimiter.
Common cases of string questions:
- string rotations
- string reversals
- prefixes
- suffixes
- sorting## Linked Lists
One way you can think of a linked list is a music playlist, where each item contains the song to be played and a `next song` button. In this abstract playlist, you cannot play any song you want; to play a given song you must play through all the songs before it first.
There are two main kinds of linked lists. Singly linked lists only contain a pointer to the next node, typically called next, and are implemented as follows:
```python
class Node:
def __init___(self, data, next=None):
self.data = data
self.next = next
```Linked lists are a recursive data structure: the type of next is another linked list node. Because of this, linked lists have no fixed size like arrays do: a new node can be initialized and appended to a linked list on the fly.
Doubly linked lists, meanwhile, have pointers to the previous and next nodes. They take up more space, but allow you to traverse backwards. The implementation for a doubly linked list looks like this:
```python
class Node:
def __init__(self, data, next=None, prev=None):
self.data = data
self.next = next
self.prev = prev
```Returning to the analogy above, a doubly linked list would mean that each song has both a `previous song` and `next song` button.
Common operations on linked lists include searching, appending, prepending, and removing nodes.
## Stack and Queues
When you find yourself needing to frequently add and remove items from a list, stacks and queues are two data structures that you should consider.
To understand how a stack works, imagine a literal stack of cafeteria trays. Adding a new one to the top, and removing the top one can be done quickly, whereas it is difficult (read: not allowed) to change trays from the middle. This property is known by the shorthand `last in, first out`, or `LIFO`.
The traditional names for these operations, as well as a method for checking the value of the top `tray`, are given in the following implementation, in which all methods are `O(1)`:
```python
class Stack:
def __init__(self):
self.stack = []def push(self, x):
# Add an item to the stack.
self.stack.append(x)def pop(self):
# Remove and return the top element.
return self.stack.pop()def peek(self):
return self.stack[-1]
```Note that a pop operation on an empty stack will result in an exception, unless there is proper error handling.
In the above implementation we have used a Python list as the underlying data structure, meaning the size of the stack will dynamically resize as necessary. Alternatively we could have used a linked list, so that new elements would be added to, and removed from, the tail of the existing chain.
A queue, on the other hand, can be thought of as a group of people standing in line, perhaps waiting to buy a book. Each person enters the line from the back, and leaves in exactly the order that they entered it, a property known as `first in, first out`, or `FIFO`.
Queues are commonly implemented as linked lists, where we enqueue and item by adding a tail node and dequeue an item by removing the head node and moving our head pointer forward.
In a double-ended queue, one can efficiently append and remove items to either side of the list.
```python
from collection import dequequeue = deque()
queue.append(4)
queue.append(5)
queue.appendleft(6)print(queue) # deque([6, 4, 5])
queue.popleft() # 6
queue.pop() # 5print(queue) # deque([4])
```The `append` and `popleft` operations above are more traditionally called enqueue and dequeue, so in the following questions we will frequently use the latter terminology. Along with pop and `appendleft`, these operations run in `O(1)` time.
When the most recent item examined is the most important, a stack is frequently a good choice. For this reason stacks often feature in depth-first search, backtracking, and syntax parsing applications.
When the order of the items you are dealing with needs to be preserved, on the other hand, a queue is preferable. Queues can be found, for example, in breadth-first search, buffers, and scheduling applications.
## Hash Tables
A hash table is a crucial tool to keep in your data structure arsenal. Simply put, hash tables associate keys with values using a hash function, allowing for `O(1)` lookup, insert, and delete times. Hash Table is a data structure which organizes data using hash functions in order to support quick insertion and search.
You may be wondering, what's the catch? For one, not everything can be hashed. It is necessary that keys be immutable, so for example Python lists cannot be used as keys. Additionally, under the hood there may be a lot of work needed to implement a rigorous hash function.
```python
d = {}d['key'] = 'value'
print(d['key']) # 'value'del d['key']
print(d['key']) # KeyError: 'key'if 'key' in d:
print(d['key'])
else:
print("key doesn't exist")
```Note from above that if a key does not exist in a dictionary, simply trying to get the value will cause a `KeyError`.
The last few lines show one way of getting around this. In the solutions that follow, we will instead use the `defaultdict` library, which allows you pass in a callable parameter when declaring a dictionary to set the default value for each key.
A common motivating example for using hash tables is the two-sum problem, stated as follows:
Given a list of numbers a number `k`, return whether any two numbers from the list add up to k. For example, given `[10, 15, 3, 7]` and `k = 17`, we should return `10 + 7 = 17`.
Instead of a brute force solution which checks all pairs of integers to search for this total, we can use the following strategy. For each value we come across, we store it in a hash table with the `True`. We then check if the `k - value` exists in the table, and if so we can return `True`.
```python
def two_sum(list, k):
seen = {}
for num in list:
if k - num in seen:
return True
seen[num] = True
return false
```This implementation cuts our time complexity down from `O(n2)` to `O(n)`, since each lookup is `O(1)`.
As the problem above demonstrates, if you want to make a solution more efficient, a dictionary should be the first tool you look for.
There are two different kinds of hash tables: `hash set` and `hash map`.
1. The **hash set** is one of the implementations of a set data structure to store no repeated values.
2. The **hash map** is one of the implementations of a map data structure to store `(key, value)` pairs.By choosing a proper hash function, the hash table can achieve wonderful performance in both insertion and search.
It is an open problem to design a hash function. The idea is to try to assign the key to the bucket as uniform as you can. Ideally, a perfect hash function will be a one-one mapping between the key and the bucket. However, in most cases a hash function is not perfect and it is a tradeoff between the amount of buckets and the capacity of a bucket.
### Hash Set
The `hash set` is one of the implementations of a `set` which is a data structure to store `no repeated values`.
```python
# 1. initialize the hash set
hashset = set()# 2. add a new key
hashset.add(3)
hashset.add(2)
hashset.add(1)# 3. remove a key
hashset.remove(2)# 4. check if the key is in the hash set
if (2 not in hashset):
print("Key 2 is not in the hash set.")# 5. get the size of the hash set
print("Size of hashset is:", len(hashset))# 6. iterate the hash set
for x in hashset:
print(x, end=" ")print("are in the hash set.")
# 7. clear the hash set
hashset.clear()
print("Size of hashset:", len(hashset))
```#### An Example
> Given an array of integers, find if the array contains any duplicates.
This is a typical problem which can be solved by a hash set.
You can simply iterate each value and insert the value into the set. If a value has already been in the hash set, there is a duplicate.
```java
/*
* Template for using hash set to find duplicates.
*/
boolean findDuplicates(List keys) {
// Replace Type with actual type of your key
Set hashset = new HashSet<>();for (Type key : keys) {
if (hashset.contains(key)) {
return true;
}
hashset.add(key);
}return false;
}
```### Hash Map
The hash map is one of the implementations of a `map` which is used to store `(key, value)` pairs.
```python
# 1. initialize a hash map
hashmap = {0 : 0, 2 : 3}# 2. insert a new (key, value) pair or update the value of existed key
hashmap[1] = 1
hashmap[1] = 2# 3. get the value of a key
print("The value of key 1 is: " + str(hashmap[1]))# 4. delete a key
del hashmap[2]# 5. check if a key is in the hash map
if 2 not in hashmap:
print("Key 2 is not in the hash map.")# 6. both key and value can have different type in a hash map
hashmap["pi"] = 3.1415# 7. get the size of the hash map
print("The size of hash map is: " + str(len(hashmap)))# 8. iterate the hash map
for key in hashmap:
print("(" + str(key) + "," + str(hashmap[key]) + ")", end=" ")print("are in the hash map.")
# 9. get all keys in hash map
print(hashmap.keys())# 10. clear the hash map
hashmap.clear();
print("The size of hash map is: " + str(len(hashmap)))
```#### Scenario I - Provide more information
The first scenario to use a hash map is that we `need more information` rather than only the key. Then we can `build a mapping relationship between key and information` by hash map.
#### An Example
> Given an array of integers, return indices of the two numbers such that they add up to a specific target.
In this example, if we only want to return true if there is a solution, we can use a hash set to store all the values when we iterate the array and check if `target - current_value` is in the hash set or not.
However, we are asked to `return more information` which means we not only care about the value but also care about the index. We need to store not only the number as the key but also the index as the value. Therefore, we should use a hash map rather than a hash set.
#### What's More
In some cases, we need more information not just to return more information but also to help us with our decisions.
In the previous examples, when we meet a duplicated key, we will return the corresponding information immediately. But sometimes, we might want to check if the value of the key is acceptable first.
#### Template
Here we provide a template for you to solve this kind of problems:
```c++
/*
* Template for using hash map to find duplicates.
* Replace ReturnType with the actual type of your return value.
*/
ReturnType aggregateByKey_hashmap(vector& keys) {
// Replace Type and InfoType with actual type of your key and value
unordered_map hashtable;
for (Type key : keys) {
if (hashmap.count(key) > 0) {
if (hashmap[key] satisfies the requirement) {
return needed_information;
}
}
// Value can be any information you needed (e.g. index)
hashmap[key] = value;
}
return needed_information;
}
```#### Scenario II - Aggregate by Key
Another frequent scenario is to `aggregate all the information by key`. We can also use a hash map to achieve this goal.
##### Example
Here is an example:
Given a string, find the first non-repeating character in it and return it's index. If it doesn't exist, return -1.
A simple way to solve this problem is to `count the occurrence` of each character first. And then go through the results to find out the first unique character.
Therefore, we can maintain a hashmap whose key is the character while the value is a counter for the corresponding character. Each time when we iterate a character, we just add the corresponding value by 1.
##### What's more
The key to solving this kind of problem is to `decide your strategy when you encounter an existing key`.
In the example above, our strategy is to count the occurrence. Sometimes, we might sum all the values up. And sometimes, we might replace the original value with the newest one. The strategy depends on the problem and practice will help you make a right decision.
##### Template
Here we provide a template for you to solve this kind of problems:
```java
/*
* Template for using hash map to find duplicates.
* Replace ReturnType with the actual type of your return value.
*/
ReturnType aggregateByKey_hashmap(List& keys) {
// Replace Type and InfoType with actual type of your key and value
Map hashmap = new HashMap<>();
for (Type key : keys) {
if (hashmap.containsKey(key)) {
hashmap.put(key, updated_information);
}
// Value can be any information you needed (e.g. index)
hashmap.put(key, value);
}
return needed_information;
}
```#### Design a key
In the previous problems, the choice of key is comparatively straightforward. Unfortunately, sometimes you have to think it over to `design a suitable key` when using a hash table.
##### Example
Let's look at an example:
> Given an array of strings, group anagrams together.
As we know, a hash map can perform really well in grouping information by key. But we cannot use the original string as key directly. We have to design a proper key to present the type of anagrams. For instance, there are two strings "eat" and "ate" which should be in the same group. While "eat" and "act" should not be grouped together.
##### Solution
Actually, `designing a key` is to `build a mapping relationship by yourself` between the original information and the actual key used by hash map. When you design a key, you need to guarantee that:
1. All values belong to the same group will be mapped in the same group.
2. Values which needed to be separated into different groups will not be mapped into the same group.This process is similar to design a hash function, but here is an essential difference. `A hash function satisfies the first rule but might not satisfy the second one`. But your mapping function should satisfy both of them.
In the example above, our mapping strategy can be: sort the string and use the sorted string as the key. That is to say, both "eat" and "ate" will be mapped to "aet".
The mapping strategy can be really `tricky` sometimes.
### Performance of Hash Table
#### Complexity Analysis
If there are `M` keys in total, we can achieve the space complexity of `O(M)` easily when using a hash table.
However, you might have noticed that the time complexity of hash table has a strong relationship with the design.
Most of us might have used an array in each bucket to store values in the same bucket. Ideally, the bucket size is small enough to be regarded as a constant. The time complexity of both insertion and search will be `O(1)`.
But in the worst case, the maximum bucket size will be `N`. And the time complexity will be `O(1)` for insertion but `O(N)` for search.
#### The Principle of Built-in Hash Table
The typical design of built-in hash table is:
The key value can be any hashable type. And a value which belongs to a hashable type will have a hashcode. This code will be used in the mapping function to get the bucket index.
Each bucket contains an array to store all the values in the same bucket initially.
If there are too many values in the same bucket, these values will be maintained in a height-balanced binary search tree instead.
The average time complexity of both insertion and search is still `O(1)`. And the time complexity in the worst case is `O(log N)` for both insertion and search by using height-balanced BST. It is a trade-off between insertion and search.
## Trees
A tree is a recursive data structure consisting of a root node (typically shown at the top) with zero or more `child` nodes, where each child node acts as the root of a new tree.
For example, below is a binary tree rooted at 7. Binary here means simply that each node is only allowed to have up to two `leaf` nodes.
5 - -1
/
7 - 10 - 4
\
40Note that we make no restriction at the moment as to the values of the tree.
Trees are directed and acyclic: the connections between parents and children always flow downward, so that it is impossible to form a loop. Further, in contrast to a typical family tree, two parents can never have the same child.
Common operations in tree involve:
- inserting, searching for, and deleting a particular node
- finding subtrees, or a subset of nodes that form their own tree
- determining the distance or relationship between two nodesTypically to answer these questions you will need to perform a recursive tree traversal, which comes in three flavors:
- in-order: Traverse left node, then current node, then right
- pre-order: Traverse current node, then left node, then right
- post-order: Traverse left node, then right node, then currentFor the tree above, for example, the three traversals would generate the following orders, respectively:
- [4, 10, 40, 7, -1, 5]
- [7, 10, 4, 40, 5, -1]
- [4, 40, 10, -1, 5, 7]Other terminology to watch in trees:
- A node A is called an `ancestor` of a node B if it can be found on the path from the root to B.
- The height or depth of a tree is the length of the longest path from the root to any leaf.
- A full binary tree is a binary tree in which every non-leaf node has exactly two children.
- A complete binary tree is one in which all levels except for the bottom one are full, and all nodes on the bottom level are filled in left to right.To implement a tree, we begin by defining a Node class and then using it to build `Tree` class:
```python
class Node:
def __init__(self, data, left=None, right=None):
self.data = data
self.left = left
self.right = right
```The implementation of a given tree will often depend on the tree's application, and the particular traversal algorithm chosen.
Trees can represent a wide variety of objects: animal classification schemas, an HTML document object model, moves in a chess game, or a Linux file system are a few. In general when you are faced with hierarchical data, trees are a great data structure to choose.
## Binary Search Trees
A binary search tree, or BST, is a binary tree search whose node values are guaranteed to stay in sorted order; that is, an in-order traversal of its nodes will create a sorted list. For example, here is a BST of integers rooted at 7:
6
/
5 - -1
/
7 - 10 - 25Similar to how a sorted array offers more efficient search times over unsorted arrays, BSTs provide several improvements over standard binary trees.
In particular, insert, find, and delete operations all run in `O(h)` time, where h is the height of the tree. If an efficient implementation is used to maintain the height of the tree around `O(log n)`, where n is the number of nodes, then these operations will be all be logarithmic in n.
```python
class Node:
def __init__(self, data, left=None, right=None):
self.data = data
self.left = left
self.right = rightclass BST:
def __init__(self):
self.root = Nonedef insert(self, x):
if not self.root:
self.root = Node(x)
else:
self._insert(x, self.root)def _insert(self, x, root):
if x < root.data:
if not root.left:
root.left = Node(x)
else:
self.insert(x, root.left)
else:
if not root.right:
root.right = Node(x)
else:
self.insert(x, root.right)def find(self, x):
if not self.root:
return False
else:
return self._find(x, self.root)def _find(self, x, root):
if not root:
return False
elif x == root.data:
return True
elif x < root.data:
return self._find(x, root.left)
else:
return self._find(x, root.right)
```Note that, as is common in recursive implementation, we use a helper function to properly define our insert and find methods.
The most common questions on binary search trees will ask you to search for elements, add and remove elements, and determine whether a tree is indeed a BST.
- [Strings](#strings)
- [In-order](data-structures/binary_tree/README.md)
- [Post-order](data-structures/binary_tree/README.md)
- [Pre-order](data-structures/binary_tree/README.md)### Height-Balanced BST
A height-balanced BST is a special form of BST which aims at improving the performance. It is useful to understand the general idea of a height-balanced BST and how height-balanced BSTs can help you in your algorithm designs.
#### What is a Height-Balanced BST
Terminology used in trees:
- Depth of node - the number of edges from the tree's root node to the node
- Height of node - the number of edges on the longest path between that node and a leaf
- Height of Tree - the height of its root nodeA height-balanced (or self-balancing) binary search tree is a binary search tree that automatically keeps its height small in the face of arbitrary item insertions and deletions. That is, the height of a balanced BST with N nodes is always `log n`. Also, the height of the two subtrees of every node never differs by more than 1.
As we mentioned before, the height of a balanced BST with N nodes is always `log N`. We can calculate the total number of nodes and the height of the tree to determine if this BST is a height-balanced BST.
Also, in the definition, we mentioned a property of height-balanced BST: the depth of the two subtrees of every node never differ by more than 1. We can also validate the tree recursively according to this rule.
#### Why Using a Height-Balanced BST
When we analyze the time complexity of search, insertion and deletion operations, it is worth noting that the height of the tree is the most important factor. Taking search operation as an example, if the height of the BST is `h`, the time complexity will be `O(h)`. The height of the BST really matters.
So let's discuss the relationship between the number of nodes `N` and the height of the tree `h`. For a height-balanced BST, as we discussed in the previous section, `h => log2N`. But for a normal BST, in the worst case, it can degenerate into a chain.
Therefore, the height of a BST with `N` nodes can vary from `log N` to `N`. That is, the time complexity of search operation can vary from `log N` to `N`. It is a huge difference in the performance.
Therefore, a height-balanced BST play an important role in improving the performance.
#### How to Implement a Height-Balanced BST
There are several different implementations for height-balanced BSTs. The details of these implementations are different but they have similar goals:
- The data structure should satisfy the binary search property and the height-balanced property.
- The data structure should support the basic operations of BST, including search, insertion and deletion within `O(log N)` time even in worst case.## N-ary Trees
A binary tree can be traversed in preorder, inorder, postorder or level-order. Among these traversal methods, preorder, postorder and level-order traversal are suitable to be extended to an N-ary tree.
### Top-down solution
"Top-down" means that in each recursion level, we will visit the node first to come up with some values, and pass these values to its children when calling the function recursively.
A typical "top-down" recursion function `top_down(root, params)` works like this:
```python
# 1. return specific value for null node
# 2. update the answer if needed // answer <-- params
# 3. for each child node root.children[k]:
# 4. ans[k] = top_down(root.children[k], new_params[k]) // new_params <-- root.val, params
# 5. return the answer if needed // answer <-- all ans[k]
```### Bottom-up solution
"Bottom-up" means that in each recursion level, we will firstly call the functions recursively for all the children nodes and then come up with the answer according to the return values and the value of the root node itself.
A typical "bottom-up" recursion function `bottom_up(root)` works like this:
```python
# 1. return specific value for null node
# 2. for each child node root.children[k]:
# 3. ans[k] = bottom_up(root.children[k]) // call function recursively for all children
# 4. return answer // answer <- root.val, all ans[k]
```## Tries
A `Trie` is a special form of a `Nary tree`. Typically, a trie is used to `store strings`. Each Trie node represents `a string` (`a prefix`). Each node might have several children nodes while the paths to different children nodes represent different characters. And the strings the child nodes represent will be the `origin string` represented by the node itself plus `the character on the path`.
A trie is a kind of tree whose nodes typically represent string, where every descendant of a node shares a common prefix. For this reason tries are often referred to as prefix trees.
d - o - g
/
- c - a - t
\ \
\ o - a - t
\
b - e - a - rFollowing all paths from the root to each leaf spells out all the words that this trie contains, in this case "bear", "cat, "coast", and "dog".
There are two main methods used with tries:
- `insert(word)`: add a word to the trie.
- `find(word)`: check if a word or prefix exists in the trie.One important property of Trie is that all the descendants of a node have a common prefix of the string associated with that node. That's why Trie is also called prefix tree.
Each one of these methods will run `O(k)`, where `k` is the length of the word.
Tries can be implemented in several ways, but in an interview setting the simplest way is to use a nested dictionary, where each key maps to a dictionary whose keys are successive letters in a given word.
Here is a basic implementation of a trie in Python:
```python
ENDS_HERE = '#'class Trie:
def __init__(self):
self._trie = {}def insert(self, text):
trie = self._trie
for char in text:
if char not in trie:
trie[char] = {}
trie = trie[char]
trie[ENDS_HERE] = Truedef find(self, prefix):
trie = self._trie
for char in prefix:
if char in trie:
trie = trie[char]
else:
return None
return trie
```Trie is widely used in various applications, such as autocomplete, spell checker, etc.
### Performance of a Trie
Let's discuss the complexity of this algorithm.
### Time complexity
If the longest length of the word is `N`, the height of Trie will be `N + 1`. Therefore, the time complexity of all insert, search and startsWith methods will be `O(N)`.
### Space complexity
If we have `M` words to insert in total and the length of words is at most N, there will be at most `M*N` nodes in the worst case (any two words don't have a common prefix).
Let's assume that there are maximum `K` different characters (K is equal to 26 in this problem, but might differs in different cases). So each node will maintain a map whose size is at most K.
Therefore, the space complexity will be `O(M*N*K)`.
It seems that Trie is really space consuming, however, the real space complexity of Trie is much smaller than our estimation, especially when the distribution of words is dense.
You can also implement it by the array which will achieve a slightly better time performance but a slightly lower space performance.
### How to represent a Trie
#### Array
The first solution is to use an `array` to store children nodes.
For instance, if we store strings which only contains letter a to z, we can declare an array whose size is 26 in each node to store its children nodes. And for a specific character c, we can use c - 'a' as the index to find the corresponding child node in the array.
It is really fast to visit a child node. It is comparatively easy to visit a specific child since we can easily transfer a character to an index in most cases. But not all children nodes are needed. So there might be some waste of space.
#### Hash Map
The second solution is to use a `hashmap` to store children nodes.
We can declare a hashmap in each node. The key of the hashmap are characters and the value is the corresponding child node.
It is even easier to visit a specific child directly by the corresponding character. But it might be a little slower than using an array. However, it saves some space since we only store the children nodes we need. It is also more flexible because we are not limited by a fixed length and fixed range.
You might wonder why not use a hash table to store strings. Let's do a brief comparison between these two data structures. We assume there are N keys and the maximum length of a key is M.
#### Complexity Analysis Comparison
###### Time Complexity
The time complexity to search in hash table is typically `O(1)`, but will be `O(log n)` in the worst time if there are too many collisions and we solve collisions using height-balanced BST.
The time complexity to search in Trie is `O(M)`.
The hash table wins in most cases.
###### Space Complexity
The space complexity of hash table is `O(M * N)`. If you want hash table to have the same function with Trie, you might need to store several copies of the key. For instance, you might want to store "a", "ap", "app", "appl" and also "apple" for a keyword "apple" in order to search by prefix. The space complexity can be even much larger in that case.
The space complexity of Trie is `O(M * N)` as we estimated above. But actually far smaller than the estimation since there will be a lot of words have the similar prefix in real cases.
## Heaps
A heap is a tree that satisfied the (aptly named) heap property, which comes in two flavors:
- In a max-heap, the parent node's value is always greater than or equal to its child node(s)
- In a mix-heap, the parent node's value is always smaller than or equal to its child node(s)Note that, unlike with BSTs, it is possible for a left child to have a greater value (in the case of a min-heap) or for a right child to have a smaller value (in the case of a max-heap).
While it is possible for parent nodes to have more than two children, almost all interview questions will deal with binary heaps, so we will make that assumption throughout the following problems. In the following explanation we will also assume that we are dealing with a min-heap, but the same principles apply for max-heaps.
For example, here is a heap of integers:
31
/
10 - 14 - 26
\
19 - 42We can represent a heap in a more space-efficient way by using an array. In this style, the two child nodes of a parent node located at index `i` can be found at indices `2i + 1` and `2i + 2`, like so:
` 10 | 14 | 19 | 26 | 31 | 42 `
When using an array to represent a heap, the heap must be filled in level by level, left to right.
Whenever you are asked to find the top k or minimum k values, a heap should be the first thing that comes to mind. Heaps are closely tied to the heapsort sorting algorithm, priority queue implementations, and graph algorithms such as Dijkstra's algorithm, which we will explore in alter chapters.
You should be familiar with the following heap operations:
- insert(heap, x): add an element x to the heap, `O(log n)`
- delete-min(heap): remove the lowest node, `O(log n)`
- heapify(array): convert an array into a heap by repeated insertions, `O(n log n)`In the solutions that follow we will make use of Python's `heapq` module to implement the methods above. The corresponding operations are as follows:
- heapq.heappush(heap, x)
- heapq.heappop(heap)
- heapq.heapify(array)## Graphs
Graphs are ones of the most important and widely used data structures. Website links, friend connections, and map routes all rely on graph representations, along with countless other applications.
Formally, graphs are defined as a set of vertices connected by edges. If these edges go in one direction, the graph is said to be directed, otherwise it is undirected. Each edge can additionally be associated with a number that represents its "cost" and "benefit".
An example fo directed graph would be followers on Twitter. Just because you follow Elon Musk does not mean he follows you back. On the other hand, friend connections on Facebook are undirected.
Mathematicians working in a graph theory have names for many different graph concepts. We don't need of know all of them, but a few will be useful for the explanation that follow:
- neighbor of X: any vertex connected to X by an edge
- path: a route of edges that connects two vertices
- cycle: a path that beings and end on the same vertex
- direted acyclic graph (DAG): a directed graph that does not contain any cycles
- connected graph: a graph in which there is always a path between any two verticesAnother classic example is of a (directed) graph is airline routes. In the following diagram, we see that there are flights between JFK and SFO, ORL and LAX, and so on, and each one has an associated plane ticket cost. This graph has several cycles since it is indeed possible to start and end at JFK after following several edges.
LAX -- DFW
| \ |
| \ |
| \ |
JFK-- ORL
| /
| /
| /
| /
SFOGraphs can be represented in two main ways: adjacency lists and adjacency matrices.
An adjacency list is essentially a dictionary mapping each vertex to the other vertices between which there is an edge. For the airline diagram above this would be as follows:
```python
{
'JFK': ['SFO', 'LAK'],
'SFO': ['ORL'],
'ORL': ['JFK', 'LAX', 'DFW'],
'LAX': ['DFW']
}
```On the other hand, in an adjacency matrix, each vertex is associated with a row and column of N x N matrix, and `matrix[i][j]` will be 1 if there is an edge from i to j, else 0.
This would look like the following:
```python
indices = {
'JFK': 0,
'SFO': 1,
'ORL': 2,
'LAX': 3,
'DFW': 4
}graph = [
[0, 1, 0, 1, 0],
[0, 0, 1, 0, 0],
[1, 0, 0, 1, 1],
[0, 0, 0, 0, 1],
[0, 0, 0, 0, 0]
]
```In general, the adjacency list representation is more space efficient if there are not that many edges (also knows as a sparse graph), whereas an adjacency matrix has faster lookup times to check if a given edge exists but uses more space.
You should know the two main traversal methods for graphs: depth-first search (DFS) and breadth-first search (BFS).
Below is a typical DFS implementation. Note the recursive aspect: for each vertex we visit, we call our function again on each of its neighbors.
```python
def DFS(graph, start, visited=set()):
visited.add(start)
for neighbor in graph[start]:
if neighbor not in visited:
DFS(graph, neighbor, visited)
return visited
```BFS, on the other hand, relies on a queue. For each item that we pop off the queue, we find its unvisited neighbors and add them to the end of the queue.
```python
from collections import dequedef BFS(graph, start, visited={}):
queue = deque([start])while queue:
vertex = queue.popleft()
visited.add(vertex)
for neighbor in graph[vertex]:
if neighbor not in visited:
queue.append(neighbor)
return visited
```Both of these of these algorithms run in `O(V + E)` time and `O(V)` space in the worst case.