• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Fu Jianqing, Wu Chunming, Wu Jiyi, Ping Lingdi. Reverse Hash Chain Traversal Based on Binary Tree[J]. Journal of Computer Research and Development, 2012, 49(2): 294-303.
Citation: Fu Jianqing, Wu Chunming, Wu Jiyi, Ping Lingdi. Reverse Hash Chain Traversal Based on Binary Tree[J]. Journal of Computer Research and Development, 2012, 49(2): 294-303.

Reverse Hash Chain Traversal Based on Binary Tree

More Information
  • Published Date: February 14, 2012
  • An algorithm improving the time and space complexity of reverse Hash chain traversal is proposed. By mapping the traversal of a reverse Hash chain to the postorder traversal of a binary tree, the proposed algorithm reduces the product of the total times of Hash operations and the storage space required to O(n(lb n)2), where n is the length of the reverse Hash chain. Analysis and proof using the property of the binary tree show that the proposed algorithm requires to save only 「lb n +1 nodes at the same time, and needs no more than (「lb n/2+1)n times of Hash operations totally. Compared with other algorithms, the proposed one can be applied to Hash chains with any length, eliminating the limitation that the length of chain must be of 2 integerth power. Then an advanced algorithm is proposed by mapping the traversal of a reverse Hash chain to the postorder traversal of a kary tree, where k is an integer no less than 3, and the space required is reduced to 「log\-k[(k-1)n+1], but the times of Hash operations required is raised to [(「log\-k[(k-1)n+1]-1)k/2+1]n. Finally, another advanced algorithm is proposed by splitting Hash chain to p part before traversing, where p is an integer no less than 2. The times of Hash operations required is reduced to「(lb(n/p)/2+1)n, but the space required is raised to (「lb(n/p)+1)p.
  • Related Articles

    [1]Jia Naizheng, Xue Can, Yang Liu, Wang Zhi. A Near-Ultrasonic Robust Indoor Localization Method Based on Stacking Ensemble Learning[J]. Journal of Computer Research and Development, 2025, 62(2): 488-502. DOI: 10.7544/issn1000-1239.202330882
    [2]Tan Hongze, Wang Jian. A Return Address Predictor Based on Persistent Stack[J]. Journal of Computer Research and Development, 2023, 60(6): 1337-1345. DOI: 10.7544/issn1000-1239.202111274
    [3]Feng Wei, Hang Wenlong, Liang Shuang, Liu Xuejun, Wang Hui. Deep Stack Least Square Classifier with Inter-Layer Model Knowledge Transfer[J]. Journal of Computer Research and Development, 2019, 56(12): 2589-2599. DOI: 10.7544/issn1000-1239.2019.20180741
    [4]Wu Fusheng, Zhang Huanguo. Key Agreement Protocols of Non-Signature Authentication Based on Binary Tree[J]. Journal of Computer Research and Development, 2017, 54(12): 2797-2804. DOI: 10.7544/issn1000-1239.2017.20160791
    [5]Zhang Hui, Zheng Jiping, Han Qiuting. BTreeU-Topk: Binary-Tree Based Top-k Query Algorithms on Uncertain Data[J]. Journal of Computer Research and Development, 2012, 49(10): 2095-2105.
    [6]Xie Haibin, Wu Chenggang, Cui Huimin, Li Jing. Disposing X86 FPU Stack in Binary Translation[J]. Journal of Computer Research and Development, 2007, 44(11): 1946-1954.
    [7]Dandan, Li Zusong, Wang Jian, Zhang Longbing, Hu Weiwu, Liu Zhiyong. Adaptive Stack Cache with Fast Address Generation[J]. Journal of Computer Research and Development, 2007, 44(1): 169-176.
    [8]Yu Yaxin, Wang Guoren, Zhang Haining, and Li Jianxin. An Index for Supporting XML Structural Join Efficiently and Effectively—CATI[J]. Journal of Computer Research and Development, 2007, 44(1): 111-118.
    [9]Xu Zhen, Li Lan, Feng Dengguo. An Access Control Model for DBMS Based on Dynamic Context Stack[J]. Journal of Computer Research and Development, 2005, 42(12): 2093-2099.
    [10]Li Heng, Zhu Jingbo, and Yao Tianshun. Combined Multiple Classifiers Based on a Stacking Algorithm and Their Application to Chinese Text Chunking[J]. Journal of Computer Research and Development, 2005, 42(5): 844-848.

Catalog

    Article views (1063) PDF downloads (498) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return