Fibonacci heap explained
Fibonacci heap |
Type: | heap |
Invented By: | Michael L. Fredman and Robert E. Tarjan |
Invented Year: | 1984 |
Insert Avg: | Θ(1) |
Delete Min Avg: | O(log n) |
Find Min Avg: | Θ(1) |
Decrease Key Avg: | Θ(1) |
Merge Avg: | Θ(1) |
In computer science, a Fibonacci heap is a data structure for priority queue operations, consisting of a collection of heap-ordered trees. It has a better amortized running time than many other priority queue data structures including the binary heap and binomial heap. Michael L. Fredman and Robert E. Tarjan developed Fibonacci heaps in 1984 and published them in a scientific journal in 1987. Fibonacci heaps are named after the Fibonacci numbers, which are used in their running time analysis.
The amortized times of all operations on Fibonacci heaps is constant, except delete-min.[1] Deleting an element (most often used in the special case of deleting the minimum element) works in
amortized time, where
is the size of the heap. This means that starting from an empty data structure, any sequence of
a insert and
decrease-key operations and
b delete-min operations would take
worst case time, where
is the maximum heap size. In a binary or binomial heap, such a sequence of operations would take
time. A Fibonacci heap is thus better than a binary or binomial heap when
is smaller than
by a non-constant factor. It is also possible to merge two Fibonacci heaps in constant amortized time, improving on the logarithmic merge time of a binomial heap, and improving on binary heaps which cannot handle merges efficiently.
Using Fibonacci heaps improves the asymptotic running time of algorithms which utilize priority queues. For example, Dijkstra's algorithm and Prim's algorithm can be made to run in
time.
Structure
A Fibonacci heap is a collection of trees satisfying the minimum-heap property, that is, the key of a child is always greater than or equal to the key of the parent. This implies that the minimum key is always at the root of one of the trees. Compared with binomial heaps, the structure of a Fibonacci heap is more flexible. The trees do not have a prescribed shape and in the extreme case the heap can have every element in a separate tree. This flexibility allows some operations to be executed in a lazy manner, postponing the work for later operations. For example, merging heaps is done simply by concatenating the two lists of trees, and operation decrease key sometimes cuts a node from its parent and forms a new tree.
However, at some point order needs to be introduced to the heap to achieve the desired running time. In particular, degrees of nodes (here degree means the number of direct children) are kept quite low: every node has degree at most
and the size of a subtree rooted in a node of degree
is at least
, where
is the
th
Fibonacci number. This is achieved by the rule: at most one child can be cut off each non-root node. When a second child is cut, the node itself needs to be cut from its parent and becomes the root of a new tree (see Proof of degree bounds, below). The number of trees is decreased in the operation
delete-min, where trees are linked together.
As a result of a relaxed structure, some operations can take a long time while others are done very quickly. For the amortized running time analysis, we use the potential method, in that we pretend that very fast operations take a little bit longer than they actually do. This additional time is then later combined and subtracted from the actual running time of slow operations. The amount of time saved for later use is measured at any given moment by a potential function. The potential
of a Fibonacci heap is given by
,
where
is the number of trees in the Fibonacci heap, and
is the number of marked nodes. A node is marked if at least one of its children was cut, since this node was made a child of another node (all roots are unmarked). The amortized time for an operation is given by the sum of the actual time and
times the difference in potential, where
c is a constant (chosen to match the constant factors in the
big O notation for the actual time).
Thus, the root of each tree in a heap has one unit of time stored. This unit of time can be used later to link this tree with another tree at amortized time 0. Also, each marked node has two units of time stored. One can be used to cut the node from its parent. If this happens, the node becomes a root and the second unit of time will remain stored in it as in any other root.
Operations
To allow fast deletion and concatenation, the roots of all trees are linked using a circular doubly linked list. The children of each node are also linked using such a list. For each node, we maintain its number of children and whether the node is marked.
Find-min
We maintain a pointer to the root containing the minimum key, allowing
access to the minimum. This pointer must be updated during the other operations, which adds only a constant time overhead.
Merge
The merge operation simply concatenates the root lists of two heaps together, and setting the minimum to be the smaller of the two heaps. This can be done in constant time, and the potential does not change, leading again to constant amortized time.
Insert
The insertion operation can be considered a special case of the merge operation, with a single node. The node is simply appended to the root list, increasing the potential by one. The amortized cost is thus still constant.
Delete-min
The delete-min operation does most of the work in restoring the structure of the heap. It has three phases:
- The root containing the minimum element is removed, and each of its
children becomes a new root. It takes time
to process these new roots, and the potential increases by
. Therefore, the amortized running time of this phase is
.
- There may be up to
roots. We therefore decrease the number of roots by successively linking together roots of the same degree. When two roots have the same degree, we make the one with the larger key a child of the other, so that the minimum heap property is observed. The degree of the smaller root increases by one. This is repeated until every root has a different degree. To find trees of the same degree efficiently, we use an array of length
in which we keep a pointer to one root of each degree. When a second root is found of the same degree, the two are linked and the array is updated. The actual running time is
, where
is the number of roots at the beginning of the second phase. In the end, we will have at most
roots (because each has a different degree). Therefore, the difference in the potential from before to after this phase is
. Thus, the amortized running time is
. By choosing a sufficiently large
such that the terms in
cancel out, this simplifies to
.
- Search the final list of roots to find the minimum, and update the minimum pointer accordingly. This takes
time, because the number of roots has been reduced.Overall, the amortized time of this operation is
, provided that
. The proof of this is given in the following section.
Decrease-key
If decreasing the key of a node
causes it to become smaller than its parent, then it is cut from its parent, becoming a new unmarked root. If it is also less than the minimum key, then the minimum pointer is updated.
We then initiate a series of cascading cuts, starting with the parent of
. As long as the current node is marked, it is cut from its parent and made an unmarked root. Its original parent is then considered. This process stops when we reach an unmarked node
. If
is not a root, it is marked. In this process we introduce some number, say
, of new trees. Except possibly
, each of these new trees loses its original mark. The terminating node
may become marked. Therefore, the change in the number of marked nodes is between of
and
. The resulting change in potential is
. The actual time required to perform the cutting was
. Hence, the amortized time is
, which is constant, provided
is sufficiently large.
Proof of degree bounds
The amortized performance of a Fibonacci heap depends on the degree (number of children) of any tree root being
, where
is the size of the heap. Here we show that the size of the (sub)tree rooted at any node
of degree
in the heap must have size at least
, where
is the
th
Fibonacci number. The degree bound follows from this and the fact (easily proved by induction) that
for all integers
, where
\varphi=(1+\sqrt5)/2 ≈ 1.618
is the
golden ratio. We then have
, and taking the log to base
of both sides gives
as required.
Let
be an arbitrary node in a Fibonacci heap, not necessarily a root. Define
to be the size of the tree rooted at
(the number of descendants of
, including
itself). We prove by induction on the height of
(the length of the longest path from
to a descendant leaf) that
, where
is the degree of
.
Base case: If
has height
, then
, and
.
Inductive case: Suppose
has positive height and degree
. Let
be the children of
, indexed in order of the times they were most recently made children of
(
being the earliest and
the latest), and let
be their respective degrees.
We claim that
for each
. Just before
was made a child of
,
were already children of
, and so
must have had degree at least
at that time. Since trees are combined only when the degrees of their roots are equal, it must have been the case that
also had degree at least
at the time when it became a child of
. From that time to the present,
could have only lost at most one child (as guaranteed by the marking process), and so its current degree
is at least
. This proves the claim.
Since the heights of all the
are strictly less than that of
, we can apply the inductive hypothesis to them to get
The nodes
and
each contribute at least 1 to
, and so we have
where the last step is an identity for Fibonacci numbers. This gives the desired lower bound on
.
Performance
Although Fibonacci heaps look very efficient, they have the following two drawbacks:[2]
- They are complicated to implement.
- They are not as efficient in practice when compared with theoretically less efficient forms of heaps.[3] In their simplest version, they require manipulation of four pointers per node, whereas only two or three pointers per node are needed in other structures, such as the binomial heap, or pairing heap. This results in large memory consumption per node and high constant factors on all operations.
Although the total running time of a sequence of operations starting with an empty structure is bounded by the bounds given above, some (very few) operations in the sequence can take very long to complete (in particular, delete-min has linear running time in the worst case). For this reason, Fibonacci heaps and other amortized data structures may not be appropriate for real-time systems.
It is possible to create a data structure which has the same worst-case performance as the Fibonacci heap has amortized performance. One such structure, the Brodal queue, is, in the words of the creator, "quite complicated" and "[not] applicable in practice." Invented in 2012, the strict Fibonacci heap[4] is a simpler (compared to Brodal's) structure with the same worst-case bounds. Despite being simpler, experiments show that in practice the strict Fibonacci heap performs slower than more complicated Brodal queue and also slower than basic Fibonacci heap.[5] [6] The run-relaxed heaps of Driscoll et al. give good worst-case performance for all Fibonacci heap operations except merge.[7] Recent experimental results suggest that the Fibonacci heap is more efficient in practice than most of its later derivatives, including quake heaps, violation heaps, strict Fibonacci heaps, and rank pairing heaps, but less efficient than pairing heaps or array-based heaps.
External links
Notes and References
- Third edition p. 518.
- Fredman . Michael L. . Michael Fredman . Sedgewick . Robert . Robert Sedgewick (computer scientist) . Sleator . Daniel D. . Daniel Sleator . Tarjan . Robert E. . Robert Tarjan . 10.1007/BF01840439 . 1–4 . Algorithmica . 111–129 . The pairing heap: a new form of self-adjusting heap . 1 . 1986. 23664143 .
- http://www.cs.princeton.edu/~wayne/kleinberg-tardos/pdf/FibonacciHeaps.pdf, p. 79
- 10.1145/2213977.2214082 . Strict Fibonacci heaps . Proceedings of the 44th symposium on Theory of Computing - STOC '12 . 1177 . 2012 . Brodal . G. S. L. . Lagogiannis . G. . Tarjan . R. E. . 978-1-4503-1245-5 .
- Book: Mrena. Michal. Sedlacek. Peter. Kvassay. Miroslav. 2019 International Conference on Information and Digital Technologies (IDT) . Practical Applicability of Advanced Implementations of Priority Queues in Finding Shortest Paths . June 2019. Zilina, Slovakia. IEEE. 335–344. 10.1109/DT.2019.8813457. 9781728114019. 201812705.
- Larkin . Daniel . Sen . Siddhartha . Tarjan . Robert . 2014 . A Back-to-Basics Empirical Study of Priority Queues . Proceedings of the Sixteenth Workshop on Algorithm Engineering and Experiments . 61–72 . 1403.0252 . 2014arXiv1403.0252L . 10.1137/1.9781611973198.7 . 978-1-61197-319-8 . 15216766.
- Driscoll . James R. . Gabow . Harold N. . Shrairman . Ruth . Tarjan . Robert E. . November 1988 . Relaxed heaps: An alternative to Fibonacci heaps with applications to parallel computation . Communications of the ACM . 31 . 11 . 1343–1354 . 10.1145/50087.50096 . 16078067 . free .