C Programming - Data Structures and Algorithms
C Programming - Data Structures and Algorithms
An introduction to elementary
programming concepts in C
Jack Straub, Instructor
Version 2.07 DRAFT
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
ii 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
Table of Contents
1. BASICS....................................................................................................13
1.1 Objectives...................................................................................................................................... 13
1.2 Typedef.......................................................................................................................................... 13
1.2.1 Typedef and Portability ............................................................................................................. 13
1.2.2 Typedef and Structures.............................................................................................................. 14
1.2.3 Typedef and Functions .............................................................................................................. 14
3. SORTING.................................................................................................41
3.1 Objectives...................................................................................................................................... 41
3.5 Mergesort...................................................................................................................................... 42
4. MODULES ...............................................................................................47
4.1 Objectives...................................................................................................................................... 47
iv 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
5.4.2 The List ADT ............................................................................................................................ 55
5.4.3 Implementation Choices............................................................................................................ 60
6. STACKS ..................................................................................................69
6.1 Objectives...................................................................................................................................... 69
v 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
7.5 A More Robust Priority Queue Implementation..................................................................... 104
vi 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
QUIZZES ..........................................................................................................159
Quiz 1......................................................................................................................................................... 159
vii 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
Quiz 6......................................................................................................................................................... 164
viii 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
Course Overview
C Programming: Data Structures and Algorithms is a ten week course, consisting of
three hours per week lecture, plus assigned reading, weekly quizzes and five homework
projects. This is primarily a class in the C programming language, and introduces the
student to data structure design and implementation.
Objectives
Upon successful completion of this course, you will have demonstrated the following
skills:
• The ability to write C-language code according to a project specification;
• The ability to develop C-language modules following standard industry practices
and conventions; and
• The ability to properly design data structures and the algorithms to transform
them.
In order to receive credit for this course, you must meet the following criteria:
• Achieve 80% attendance in class;
• Achieve a total of 70% on the final examination; and
• Satisfactorily complete all projects.
Instructor
Jack Straub
425 888 9119 (9:00 a.m. to 3:00 p.m. Monday through Friday)
jstraub@centurytel.net
http://faculty.washington.edu/jstraub/
Text Books
Required
No text book is required. However it is strongly recommended that you acquire one of the
data structures text books listed below; at least one of your projects will require you to do
your own research on a data structure not covered in class.
Recommended
C A Reference Manual, Fifth Edition by Samuel P. Harbison, and Guy L. Steele Jr.,
Prentice Hall, 2002
C Primer Plus, Fourth Edition by Stephen Prata, Sams Publishing, 2002
Recommended Data Structures Textbooks
Data Structures and Program Design in C, Second Edition by Robert Kruse et al.;
Prentice Hall, 1997
Fundamentals of Data Structures in C by Ellis Horowitz, Sartaj Sahni and Susan
Anderson-Freed; W. H. Freeman, 1992
Algorithms in C, Third Edition Parts 1 - 4 by Robert Sedgewick; Addison-Wesley, 1998
Introduction ix 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
Course Outline
Week Topics Assigned Reading Work Due
10 Wrap up
Introduction x 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
Recommended Reading
Topics Assigned Reading
Week 1 Basic Skills, Core Module H&S Sections 5.10, 5.4.1, 5.8
Prata pp. 569 - 571, 475 - 481
Week 10 Wrap up
Introduction xi 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
1. Basics
We will begin this section by reviewing C skills that are particularly important to the
study of data structures and algorithms, including typedefs, pointers and arrays, and
dynamic memory allocation. Next we will define a set of utilities that will be useful in
implementing the data structures that we will discuss in the remainder of the course. By
the end of this section you will be ready to complete your first project.
1.1 Objectives
At the conclusion of this section, and with the successful completion of your first project,
you will have demonstrated the ability to:
• Use typedef to declare the basic types used to represent a data structure;
• Use dynamic memory allocation to create the components of a data structure; and
• Implement core utilities to serve as the foundation of a software development
project.
1.2 Typedef
In most C projects, the typedef statement is used to create equivalence names for other C
types, particularly for structures and pointers, but potentially for any type. Using typedef
equivalence names is a good way to hide implementation details. It also makes your code
more readable, and improves the overall portability of your product.
struct address_s
{
char *street;
char *city;
char *region;
char *country;
char *postal_code;
};
parameters; the first is type int, and the second is pointer to function with one parameter
of type int that returns void; the return value of signal is pointer to function with one
parameter of type int that returns void. The prototype for signal is usually declared like
this:
void (*signal(
int sig,
void (*func)(int)))(int);
This prototype is much easier to decipher if we just declare and use an equivalence for
type pointer to function with one parameter of type int that returns void:
typedef void SIG_PROC_t( int );
typedef SIG_PROC_t *SIG_PROC_p_t;
SIG_PROC_p_t signal(
int sig,
SIG_PROC_p_t func
);
typedef int COMPARE_PROC_t( const void *, const void * );
typedef COMPARE_PROC_t *COMPARE_PROC_p_t;
number of elements in the array. As illustrated in Figure 1-5, this macro allows us to
dynamically determine the size of an array.
The ability to dynamically allocate memory accounts for much of the power of C. It also
accounts for much of the complexity of many C programs, and, subsequently, is the
source of many of their problems. One of the biggest problems associated with
dynamically allocated memory comes from trying to deal with allocation failure. Many
organizations effectively short-circuit this problem by writing cover routines for the
dynamic memory allocation routines that do not return when an error occurs; instead,
they abort the program. In Figure 1-6 we see a cover for malloc; writing cover routines
for calloc and realloc is left as an exercise for the student.
data type declarations. A module consists of a minimum of three files, a private header
file, a public header file and a principal source file. In this section we will develop the
core module, which will contain a collection of facilities to assist us in writing code
throughout the remainder of the course. The name of the module will be CDA (short for
C: Data Structures and Algorithms) and will consist of the following three files:
• cdap.h (the private header file),
• cda.h (the public header file) and
• cda.c (the principal source file)
#include <stdlib.h>
return mem;
}
return mem;
}
The cover routines for calloc and realloc will be called CDA_calloc and CDA_realloc,
respectively, and are left as an exercise for the student. The cover routine for free is
called CDA_free, and is shown in Figure 1-8. Outside of the cover routines in cda.c,
none of the code that we write in this class will ever make direct use of the standard
memory allocation routines. Instead, they will make use of the CDA covers.
Instead of:
assert( size <= MAXIMUM_SIZE );
Use:
CDA_ASSERT( size <= MAXIMUM_SIZE );
• CDA_CARD is simply a generic implementation of the CARD macro that
we saw in Section 0. For example:
int inx = 0;
int iarr[10];
for ( inx = 0 ; inx < CDA_CARD( iarr ) ; ++inx )
iarr[inx] = -1;
• CDA_NEW is a macro to encapsulate what we call a new operation; that is,
the allocation of memory to serve as a data structure instance, or a
component of a data structure instance. For example:
Instead of:
ADDRESS_p_t address = CDA_malloc( sizeof(ADDRESS_t) );
Use:
ADDRESS_p_t address = CDA_NEW( ADDRESS_t );
• CDA_NEW_STR and CDA_NEW_STR_IF encapsulate the operations
needed to make a copy of a string. This is an important activity, because
what we call a string in C is merely the address of an array of type char. If
you try to store such an address in a data structure you leave yourself open
to problems because that memory typically belongs to someone else, and it
can be modified or deallocated at any time; so, before storing a string in a
data structure, you must be certain that it occupies memory that you
control. CDA_NEW_STR unconditionally makes a copy of a string;
CDA_NEW_STR_IF evaluates to NULL if the target string is NULL, and
to CDA_NEW_STR if the string is non-NULL. Here is an example of their
use:
Instead of:
if ( string == NULL )
copy = NULL;
else
{
copy = CDA_malloc( strlen( string ) + 1 );
strcpy( copy, string );
}
Use:
copy = CDA_NEW_STR_IF( string );
Part 2: Common or Convenient Type Declarations
This part of the public header file consists of the declaration of a Boolean type to
help make our code more readable, plus declarations of types to represent integers
of a specific size to help make our code more portable. The representative integer
types will be:
1.6 Activity
Interactively develop a module to encapsulate a timer.
2.1 Objectives
At the conclusion of this section, and with the successful completion of your second
project, you will have demonstrated the ability to:
• Formally define the enqueuable item and doubly linked list structures; and
• Implement a circular, doubly linked list data structure.
2.2 Overview
There are several ways to implement a doubly linked list. The common feature of all such
implementations is that a doubly linked list consists of zero or more enqueuable items.
An enqueuable item consists of, at a minimum, two pointers; when an enqueuable item is
enqueued, one pointer provides a forward link to the next item in the list (if any) and the
other a backward link to the previous item in the list (if any). Figure 2-1 portrays three
The specific implementation that we will consider in this course is a doubly linked list
that is anchored by a queue head, and that is circular. The anchor consists of, at a
minimum, a forward/backward link pair. The forward link points to the first item in the
list, and the backward link points to the last item in the list. The list is circular because
the forward link of the last item in the list, and the backward link of the first item in the
list point to the anchor. This arrangement is illustrated in Figure 2-2.
Anchor
Additional Additional
Data Data
Before we go on, a quick word about the picture shown in Figure 2-2. This is the
standard way of representing a doubly linked list, but it sometimes leads to confusion
among students. In particular, it is easy to interpret the drawing as if the backward link of
an item held the address of the backward link of the previous item. This is not so; the
forward and backward links of an item always contain the base addresses of the structures
it links to. A slightly more realistic representation of a linked list can be seen in Figure
2-3; however, this representation is harder to draw and harder to read, so the style of
representation used in Figure 2-2 is the one that we will use for the remainder of this
course.
Anchor
Additional Additional
Data Data
2.3 Definitions
In this section we will discuss formal definitions for the elements of our implementation
of a linked list. Specifically, we need to define exactly what we mean by a doubly linked
list, an anchor and an enqueuable item; we also have to strictly define the states that these
items may occupy.
Now that we know what an enqueuable item looks like, we have to define the states that
such an item can occupy. In this case there are only two: an enqueuable item may be
enqueued or unenqueued. We define an enqueued item as one whose flink and blink point
to other enqueuable items; when an item is unenqueued, its flink and blink point to itself.
This is illustrated in Figure 2-5.
2.3.2 Anchor
An anchor is a struct consisting of a flink, a blink and a name; in other words, it is an
enqueuable item with no application data. The declaration of the anchor type is shown
below:
typedef ENQ_ITEM_t ENQ_ANCHOR_t, *ENQ_ANCHOR_p_t;
2.3.4 Methods
In this class we will define the following operations that may be performed on a doubly
linked list, and the elements that belong to a doubly linked list:
• Create a new doubly linked list
• Create a new enqueuable item
• Test whether an item is enqueued
• Test whether a list is empty
• Add an item to the head of a list
• Add an item to the tail of a list
• Add an item after a previously enqueued item
• Add an item before a previously enqueued item
• Dequeue an item from a list
• Dequeue the item at the head of a list
list->flink = list;
list->blink = list;
list->name = CDA_NEW_STR_IF( name );
return list;
}
return rcode;
}
2.3.16 ENQ_GET_HEAD: Get the Address of the Item at the Head of a List
This method returns the address of the item at the head of a list without dequeing it. It is
so straightforward that many list implementations don’t bother with it. In this class,
however, we will concentrate on providing all operations on a data structure from within
the module that owns the data structure. We will, in this case, follow a middle ground;
rather than implement the method as a procedure, we will make it a macro.
Note: Some students are confused by the synopsis, below, thinking that it
shows the prototype of a function, contradicting the above statement that this
will be implemented as a macro. This is not true. This is merely a standard
why of summarizing how a method is used, whether its implementation is as a
function, or a function-like macro. See, for example, the documentation for
getc macro in Chapter 15 of Harbison & Steele.
Synopsis:
ENQ_ITEM_p_t ENQ_GET_HEAD( ENQ_ANCHOR_p_t list );
Where:
list -> list to interrogate
Returns:
If queue is nonempty, the address of the first list item;
Otherwise the address of the list
Notes:
None
Here’s the implementation of the method.
#define ENQ_GET_HEAD( list ) ((list)->flink)
2.3.17 ENQ_GET_TAIL: Get the Address of the Item at the Tail of a List
This method, also a macro, is nearly identical to ENQ_GET_HEAD.
Synopsis:
ENQ_ITEM_p_t ENQ_GET_TAIL( ENQ_ANCHOR_p_t list );
Where:
list -> list to interrogate
2.3.18 ENQ_GET_NEXT: Get the Address of the Item After a Given Item
Given an item, this method, implemented as a macro, returns the address of the next item
in the list without dequeing it.
Synopsis:
ENQ_ITEM_p_t ENQ_GET_NEXT( ENQ_ITEM_p_t item );
Where:
item -> item to interrogate
Returns:
If there is a next item, the address of the next item;
Otherwise the address of the list that item belongs to
Notes:
None
The implementation of this method is left to the student. It should be implemented as a
macro.
2.3.19 ENQ_GET_PREV: Get the Address of the Item Before a Given Item
Given an item, this macro returns the address of the previous item in the list without
dequeing it.
Synopsis:
ENQ_ITEM_p_t ENQ_GET_PREV( ENQ_ITEM_p_t item );
Where:
item -> item to interrogate
Returns:
If there is a previous item, the address of the previous item;
Otherwise the address of the list that item belongs to
Notes:
None
The implementation of this method is left to the student. It should be implemented as a
macro.
return NULL;
}
return list;
}
4. The module must have a print method that will print, alphabetically, the name of each
employee, their total receipts and tips, and the average amount of each check and tip.
Here is an example of the output of the print method:
Brenda
Total receipts: 328.99 (Average: 82.25)
Total tips: 62.00 (Average: 15.50)
Tom
Total receipts: 321.23 (Average: 160.62)
Total tips: 64.00 (Average: 32.00)
Terry
Total receipts: 138.15 (Average: 46.05)
Total tips: 46.00 (Average: 15.34)
Alice has decided that she will implement the accumulation method by allocating a
bucket for each employee as the employee is “discovered,” that is, when the
accumulation method has been passed the name of an employee for whom a bucket has
not already been allocated. Each time a new receipt is received for a known employee,
the amount of the receipt will be accumulated in the existing bucket. She has also decided
that she will store each bucket in a list of some kind, in alphabetical order. Here is the
pseudocode for the accumulation method, which Alice has decided to call addReceipt:
addReceipt( name, check, tip )
for each bucket in list
if bucket-name == name
add check to bucket
add tip to bucket
increment # receipts in bucket
else if bucket-name > name
allocate new-bucket
add check to new-bucket
add tip to new-bucket
set # receipts in new-bucket = 1
add new-bucket to list before bucket
else
next bucket
if no bucket in list satisfies the above:
allocate new-bucket
add check to new-bucket
add tip to new-bucket
set # receipts in new-bucket = 1
add new-bucket to end of list
Alice has decided to create and maintain her list using the ENQ module. That means that
her remaining three methods will be implemented rather simply, as follows:
1. The initialization method will create the list.
2. The print method will traverse the list from front to back, printing out the
employee information found in each bucket.
3. The shutdown method will destroy the list.
In keeping with local project standards, Alice now has to select a name for her module,
and create public and private header files for it. She has chosen the name TIPS. Her
public and private header files (with comments removed to save space) follow:
Section 2: Doubly Linked Lists 36 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
/* TIPS Private Header File */
#ifndef TIPSP_H
#define TIPSP_H
#include <tips.h>
void TIPS_addReceipt(
const char *waitress,
double check,
double tip
);
void TIPS_close(
void
);
void TIPS_init(
void
);
void TIPS_printReceipts(
void
);
Alice has only one decision left: how to implement her “bucket.” She knows that this will
be a data structure with fields for accumulating checks, tips, and check count. Since she
has decided to implement her list via the ENQ module, she knows that her bucket will
have to be an enqueuable item, as defined by the ENQ module; that is, it will have to
have as its first member an ENQ_ITEM_t structure. Alice’s implementation of the TIPS
source file is shown below.
#include <cda.h>
#include <enq.h>
#include <tipsp.h>
switch ( result )
{
case FOUND_EXACT:
receipts->checkTotal += check;
receipts->tipTotal += tip;
++receipts->numReceipts;
break;
case FOUND_GREATER:
bucket = (RECEIPTS_p_t)ENQ_create_item( waitperson, sizeof(RECEIPTS_t) );
bucket->checkTotal = check;
bucket->tipTotal = tip;
bucket->numReceipts = 1;
ENQ_add_before( (ENQ_ITEM_p_t)bucket, (ENQ_ITEM_p_t)receipts );
break;
case NOT_FOUND:
bucket = (RECEIPTS_p_t)ENQ_create_item( waitperson, sizeof(RECEIPTS_t) );
bucket->checkTotal = check;
bucket->tipTotal = tip;
bucket->numReceipts = 1;
ENQ_add_tail( anchor, (ENQ_ITEM_p_t)bucket );
break;
default:
CDA_ASSERT( CDA_FALSE );
break;
}
}
2.5 Activity
Discuss the concept of subclassing, and ways of implementing it in C.
3. Sorting
In this section we will discuss sorting algorithms in general, and three sorting algorithms
in detail: selection sort, bubble sort and mergesort.
3.1 Objectives
At the conclusion of this section, and with the successful completion of your third
project, you will have demonstrated the ability to:
• Define the differences between the selection sort, bubble sort and mergesort
sorting algorithms; and
• Implement a traditional mergesort algorithm.
3.2 Overview
The effort to bring order to the vast amounts of data that computers collect is reflective of
humankind’s eons long effort to organize and catalog information. The two main reasons
to sort data are:
• To prepare organized reports; and
• To pre-process data to reduce the time and/or complexity of a second pass
analysis process.
The main problem with sorts is that they tend to be time consuming. There have been
many clever optimized sorting algorithms developed, but they tend to introduce so much
coding complexity that they are hard to understand and implement. It would be nice if
these optimized algorithms could be packaged as general utilities and used by developers
without having to understand their details, and sometimes they are; but there are two
reasons why this isn’t always practical:
• The most efficient optimizations usually take into account detailed knowledge of
the data being sorted. For example, sorting the results of a chemical analysis
might take into account expectations about the distribution of data based on
previous experience.
• Some knowledge of the format of the data structures being sorted is required by
the implementation. For example, the excellent implementation of quick sort in
the C Standard Library function qsort requires that data be organized in an array,
therefore it cannot be used to sort a linked list.
We will now discuss the details of several common sorting techniques. As a project you
will implement the mergesort algorithm as a mechanism to sort generalized arrays.
passes through the list, each member percolates or bubbles to its ordered position at the
beginning of the list. The pseudocode looks like this:
numElements = number of structures to be sorted
for ( inx = 0 ; inx < numElements - 1 ; ++inx )
for ( jnx = numElements - 1 ; jnx != inx ; --jnx )
if ( element( jnx ) < element( jnx - 1 ) )
swap( element( jnx ), element( jnx - 1 ) )
3.5 Mergesort
The main idea behind the mergesort algorithm is to recursively divide a data structure in
half, sort each half independently, and then merge the results. Since the data structure
needs to be split, this algorithm works best with well-organized, contiguous structures
such as arrays. To mergesort an array, divide the array in half, and independently sort the
two halves. When each half has been sorted, merge the results into a temporary buffer,
then copy the contents of the buffer back to the original array. Here is the pseudocode for
sorting an array:
mergesort( array, numElements )
if ( numElements > 1 )
lowHalf = numElements / 2
highHalf = numElements - lowHalf
array2 = array + lowHalf
mergesort( array, lowHalf )
mergesort( array2, highHalf )
• If we have a pointer to the first byte of one element in the array, and we increase
the value of the pointer by the size of an element, we will have a new pointer to
the next element of the array.
Now we can solve pointer arithmetic problems such as array2 = array + lowHalf with
code like this:
typedef unsigned char BYTE_t;
void mergesort( void *array,
size_t num_elements,
size_t element_size,
(other parameters)
)
{
if( num_elements > 1 )
{
size_t lowHalf = num_elements / 2;
size_t highHalf = num_elements - lowHalf;
BYTE_t *array1 = array;
BYTE_t *array2 = array1 + lowHalf * element_size;
. . .
4. Modules
In this section we will discuss how projects are modularized. We will concentrate on the
way in which individual programs are organized into source code modules, including
public, private and local data structures and methods. You will be introduced to common
industry conventions for naming and controlling the modules and their constituent parts.
4.1 Objectives
At the conclusion of this section, and with the successful completion of your third
project, you will have demonstrated the ability to:
• Organize a program into modules;
• Apply naming and access control conventions to modules; and
• Identify the difference between public, private and local data structures and
methods.
4.2 Overview
The successful completion of a large, complex project is almost always accomplished by
breaking the project into smaller, more easily digested pieces. This process, which
Douglas Hoffstadter so aptly described as “chunking,” is formally called modularization,
and some of the pieces that result from the process are often referred to as modules.
The process of modularization begins at a very high level. Figure 4-1 shows how a
theoretical General Administration System is broken into three executable processes for
encapsulating general ledger, accounts payable/receivable and inventory control
functionality. The general ledger process is broken into chunks of functionality
representing general ledger utilities (GL), user interface (UI), database (DB) and error
(ERR) processing. The error chunk is further broken into sets of source files for
performing signal processing, stack dumping and error reporting. The chunking process
continues from there, as the source files declare data structures, subroutines, sub-
subroutines, etc.
For our purposes, we will define a C Source Module as beginning at the next to last level
of the tree, with GL, UI, DB and ERR each representing a separate module. In the next
section we will discuss the components of the C source module.
is, declarations and methods that can be used or called from outside the module. These
public declarations and methods are often called an application programmer’s interface,
or API for short.
General
Administration
GL UI DB ERR
The mechanism for publishing public data is the module’s public header file. A module
typically only has one public header file, which contains prototypes for all public
methods, and declarations of data structures, data types and macros required to interact
with those methods. To use an example from the C Standard Library, we might say that
the string handling module is represented by the public header file string.h.
It is very important to do a thorough job of defining a public API before beginning
implementation. Other programmers, sometimes hundreds of them, working outside your
module are going to be using your API, and if you decide to change it in mid-
development you will have an impact on each of them.
5.1 Objectives
At the conclusion of this section, and with the successful completion of your third
project, you will have demonstrated the ability to:
• Define the term abstract data type;
• Describe the list ADT; and
• Create a module that implements an abstract data type.
5.2 Overview
An abstract data type is a set of values and associated operations that may be performed
on those values. The classic example of an abstract data type is the set of integers, and
associated operations that may be performed on integers, such as addition, subtraction,
multiplication, etc. Another example of the abstract data type is the array, in conjunction
with the array operator, []. In C, operations may be implemented using built-in
operators or methods. Table 1 shows, in part, how the operations for the abstract data
type int are implemented.
Addition +
Subtraction -
Multiplication *
Division /
Modulus %
Increment ++
Decrement --
Absolute abs()
Value
An operation performed on one or more valid members of the set of values must yield
another member of the set; in the set int, for example, 3 + 5 yields 8. When an operation
is attempted on a member that is not a member of the set; or when the result of an
operation falls outside of the set; an exception is said to occur. For example, in the
context of the int ADT, the attempt to compute the square root of -1 leads to an
exception. When an exception occurs, the abstract data type implementation should
handle the exception. Exception handling is discussed in Section 5.3, below.
To implement an abstract data type in C that is not provided by the compiler or standard
library, the programmer:
1. Carefully defines the set of values that are to be associated with the ADT;
2. Fully defines the operations that may be performed within the context of the
ADT;
3. Declares a set of data structures to represent the ADT’s legal values; and
4. Implements individual methods to perform the defined operations.
As we have defined it in this class, a module is an excellent vehicle for representing an
ADT; two examples are our implementation of stacks and hash tables.
production. This is how the ENQ module’s add-head method deals with an attempt to add
an item that is already enqueued.
Returning an error value is often the best way to handle an exception, but has its
drawbacks. Many times an error return is so rare, and so devastating that it is hard to test;
the classic example of this is an error return from malloc. Often an inexperienced (or
careless) programmer has neglected to check for an error return. In this case, the program
failure, when it finally occurs, may be many statements after the actual flaw, and can be
very difficult to debug. In cases such as these, the method that detects the exception may
be better off throwing it.
Throwing the exception involves raising a signal. One way to do this is to call the
standard library routine abort, which, in most implementations, raises SIGABRT. Any
signal can be raised by calling the standard library function raise. In many ways throwing
an exception in a method is the best way to handle rare errors; if a user of the method
really needs to know that an error occurred, he or she can define a signal handler to trap
the signal. Figure 5-1 shows an example of a routine that locks a system resource, and
then calls a method that may throw an exception; if the exception is thrown, the user traps
it, unlocks the system resource, and then re-raises the signal. This is also called catching
the exception.
#include <signal.h>
typedef void SIG_PROC_t( int sig );
typedef SIG_PROC_t *SIG_PROC_p_t;
. . .
if ( (old_sigint = signal( SIGINT, trap_sigint )) == SIG_ERR )
abort();
SYS_lock_res( SYS_RESOURCE_OPEN );
queue_id = SYS_open_queue( “PROCESS_STREAM” );
SYS_unlock_res( SYS_RESOURCE_OPEN );
if ( signal( SIGINT, old_sigint ) == SIG_ERR )
abort();
. . .
A more sophisticated routine might attempt to recover from the thrown exception by
saving the system state using setjmp, then executing a longjmp to restore the system
state. This mechanism should only be used when recovery from an exception is
absolutely crucial, and the programmer knows exactly how to use it.
where i is the square root of -1. The addition of two complex numbers, (a1 + ib1) +
(a2 + ib2) is defined as:
(a1 + a2) + i(b1 + b2)
To implement this functionality in C, we might declare the data type and method shown
in Figure 5-2.
typedef struct cpx_num_s
{
double real;
double imaginary;
} CPX_NUM_t, *CPX_NUM_p_t;
CPX_NUM_p_t
CPX_compute_neg( CPX_NUM_p_t cpx )
/* returns -cpx */
CPX_NUM_p_t
CPX_compute_prod( CPX_NUM_p_t cpx1, CPX_NUM_p_t cpx2 )
/* returns (cpx1 * cpx 2) */
CPX_NUM_p_t
CPX_compute_sum( CPX_NUM_p_t cpx1, CPX_NUM_p_t cpx2 );
/* returns (cpx1 + cpx2) */
CPX_NUM_p_t
CPX_compute_quot( CPX_NUM_p_t cpx1, CPX_NUM_p_t cpx2 );
/* returns (cpx1 / cpx 2) */
Figure 5-3 Complex Number ADT Methods
the entries are all the same type, hence the same size). She will also give us a hint about
the maximum size of the list. Why is this called a “hint”? Because the implementation
may choose to force the maximum size to a higher, more convenient number, or to ignore
it altogether. In this specific example, if we implement the list as an array we will need
the maximum size, but if we use the ENQ module we will ignore it. Once the list is
successfully created and initialized we will return to the user an ID that she can
subsequently use to access the list. We want this ID to be an opaque type, that is,
something that identifies the list, but does not allow the user access to the internals. The
ID will most likely be a pointer to a control structure that is declared in our private header
file. Often in C we use the type void* for such opaque data types; doing so, however,
results in weak typing; that’s because your compiler will allow you to silently assign to a
void pointer almost any other pointer type. In order to achieve strong typing we are going
to assume that the control structure is type struct list__control_s, and then we can declare
the public list ID as follows:
typedef struct list__control_s *LIST_ID_t;
Note that, from the perspective of the public API this is what, in C, we refer to as an
incomplete declaration. From examining the public header file we can conclude that a list
ID is a pointer to a particular kind of struct, but we have no idea what members are
contained in the struct. Since we don’t know what the members are we can’t access them.
To be truly opaque the user shouldn’t even assume that a list ID is a pointer type; and, in
fact, we should be free to change our minds next week and make the ID an int. So to be
really flexible, we should provide the user with a value that she can use to initialize a list
ID that isn’t yet assigned to a list. We will call this value LIST_NULL_ID, and declare it
like this:
#define LIST_NULL_ID (NULL)
With these two public declarations, a user can declare and initialize a list ID variable this
way:
LIST_ID_t list = LIST_NULL_ID;
What if we do change our minds next week and decide to make a list ID an int? Then we
will just change LIST_NULL_ID to something appropriate, such as –1. The user will
have to recompile her code, but will not have to change any of it.
Traversal and destruction of a list pose special problems because they require
manipulation or disposal of data owned by the user. To state the problem a little
differently:
• When we traverse the list we will touch each entry and do something with the
data; but do what?
• When we destroy the list, the data in each entry may need to be disposed of; but
how?
Only the user can answer these questions. So here’s what we are going to do: when the
user calls the traversal method she will pass the address of a function, called a traversal
proc, which knows how to manipulate the data at each entry. And when she calls the
destroy method she will call pass the address of a function, called a destroy proc that
knows how to dispose of the data in an entry. Such functions are called callbacks because
Section 5: Abstract Data Types 56 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
the implementation uses them to call back to the user’s code in order accomplish some
part of its operation. We will declare the types of these functions as follows:
typedef void LIST_DESTROY_PROC_t( void * );
typedef LIST_DESTROY_PROC_t *LIST_DESTROY_PROC_p_t;
5.4.2.1 LIST_create_list
This method will create an empty list and return to the user a value that identifies the list.
Synopsis:
LIST_ID_t LIST_create_list( size_t max_list_size,
size_t entry_size,
const char *name
)
Where:
max_list_size == a hint about the maximum size of the list
entry_size == the size of an entry in the list
name -> the name of the list
Returns:
The list ID
Exceptions:
Throws SIGABRT if the list can’t be created.
Notes:
3. The caller is responsible for freeing the memory occupied
by the list by calling LIST_destroy_list.
4. Following creation, the list is guaranteed to hold at least
max_list_size entries; it may be able to hold more. See
also LIST_add_entry.
5.4.2.2 LIST_add_entry
This method will add an entry to the end of the list.
Synopsis:
LIST_ID_t LIST_add_entry( LIST_ID_t list, const void *data )
Where:
list == ID of a previously created list
data -> data to be appended to list tail
Returns:
data
Exceptions:
Throws SIGABRT if the new entry can’t be created.
Notes:
1. The data argument must point to a block of memory equal in
size to the entry size as specified in LIST_create_list. A
new entry is created for the list and the data is COPIED
INTO IT.
5.4.2.3 LIST_traverse_list
This method will traverse the list in order, calling the user’s traversal proc at each node.
Synopsis:
LIST_ID_t LIST_traverse_list(
LIST_ID_t list,
LIST_TRAVERSAL_PROC_p_t traversal_proc
)
Where:
list == ID of a previously created list
traversal_proc -> function to call for each node
Returns:
list
Exceptions:
None
Notes:
1. For consistency with other modules and methods, the
traversal proc may be NULL.
5.4.2.4 LIST_is_list_empty
This method returns a Boolean value indicating whether a list is empty.
Synopsis:
CDA_BOOL_t LIST_is_list_empty( LIST_ID_t list )
Where:
list == ID of a previously created list
Returns:
CDA_TRUE if list is empty, CDA_FALSE otherwise
Exceptions:
None
Notes:
None
5.4.2.5 LIST_is_list_full
This method returns a Boolean value indicating whether a list is full.
Synopsis:
CDA_BOOL_t LIST_is_list_full( LIST_ID_t list )
Where:
list == ID of a previously created list
Returns:
CDA_TRUE if list is full, CDA_FALSE otherwise
Exceptions:
None
Notes:
None
5.4.2.6 LIST_get_list_size
This method returns the number of elements in the list.
5.4.2.7 LIST_clear_list
This method will return a list to its initial, empty state, destroying each node in the
process. If the user specifies a destroy proc, it will be called for each node in the list prior
to destroying the node.
Synopsis:
LIST_ID_t LIST_clear_list( LIST_ID_t list,
LIST_DESTROY_PROC_p_t destroy_proc
)
Where:
list == ID of a previously created list
destroy_proc -> function to call for each node
Returns:
list
Exceptions:
None
Notes:
1. If not needed, the destroy proc may be NULL
5.4.2.8 LIST_destroy_list
This method will first clear the list (see LIST_clear_list) and then destroy the list itself. If
the user specifies a destroy proc, it will be called for each node in the list prior to
destroying the node.
Synopsis:
LIST_ID_t LIST_destroy_list(
LIST_ID_t list,
LIST_DESTROY_PROC_p_t destroy_proc
)
Where:
list == ID of a previously created list
destroy_proc -> function to call for each node
Returns:
LIST_NULL_ID
Exceptions:
None
#ifndef LISTP_H
#define LISTP_H
#include <list.h>
#include <stddef.h>
#endif
Figure 5-5 Private Declarations for Array List Implementation
Implementing the create method for a list implemented as an array requires us to do the
following:
1. Allocate memory for the control structure;
2. Allocate memory for the array, and store a pointer to it in the control structure;
3. Initialize the remaining members of the control structure; and
4. Return a pointer to the control structure to the caller. Remember that, since the
caller doesn’t include listp.h, there is no way for the caller to use the pointer to
access the control structure.
The complete create method for implementing a list as an array is shown in Figure 5-6.
LIST_ID_t LIST_create_list( size_t max_list_size,
size_t entry_size,
const char *name
)
{
LIST__CONTROL_p_t list = CDA_NEW( LIST__CONTROL_t );
return list;
}
Figure 5-6 Create Method for Array List Implementation
Our private declarations will consist of a control structure that contains the address of a
list anchor, plus the size of a user entry. We will also keep a copy of the list name, and
the maximum list size specified by the user (we won’t be using this value, but it doesn’t
hurt to hang onto it, and we may find a use for it in the future). Also, we will need to
declare the type of an item to store in our ENQ list; remember that this will be an
enqueuable item as defined by the ENQ module, and so the type of its first member must
be ENQ_ITEM_t. The complete private header file for implementing a list via the ENQ
module is shown in Figure 5-8.
#include <list.h>
#include <enq.h>
#include <cda.h>
#include <stddef.h>
#endif
Figure 5-8 Private Declarations for ENQ List Implementation
Implementing the create method for a list implemented via the ENQ module requires us
to do the following:
1. Allocate memory for the control structure;
2. Create an ENQ list, and store the address of its anchor in the control structure; and
3. Return a pointer to the control structure to the caller. As before, since the caller
doesn’t include listp.h, there is no way for her to use the pointer to access the
control structure.
The complete create method for this implementation option is shown in Figure 5-9.
LIST_ID_t LIST_create_list( size_t max_list_size,
size_t entry_size,
const char *name
)
{
LIST__CONTROL_p_t list = CDA_NEW( LIST__CONTROL_t );
return list;
}
Figure 5-9 Create Method for ENQ List Implementation
return data;
}
return data;
}
Figure 5-10 Alternative List Add Method Implementations
As you can see, the array-based add method is fairly efficient. Using simple pointer
arithmetic we locate the address of the next unused element in the array and copy the
user’s data into it; however it is inflexible because the size of the list cannot exceed the
maximum length of the array, which the user must somehow calculate prior to creating
the list. The ENQ module-based implementation is more flexible because it can
dynamically grow to virtually any length, relieving the user of the need to determine a
maximum length. This flexibility, however, comes at the cost of two extra dynamic
memory allocations, which drastically reduces its efficiency.
The difference in efficiency can be seen even more clearly by examining the get-size
method. The array-based implementation is extremely efficient, simply returning the next
value out of the control structure. The ENQ module-based implementation, however,
must traverse the list counting the elements as it goes.
Note that the array-based implementation can be made more flexible by using realloc to
eliminate its dependence on a maximum size parameter. And the ENQ-module based
implementation can be made more efficient in a couple of ways, for example by
redesigning the LIST__ENTRY_t type to allow the user’s data to reside directly in a
return rcode;
}
return rcode;
}
Figure 5-11 Alternative List Get-Size Methods
return list;
}
return list;
}
Figure 5-12 Alternative List Traverse Methods
list->next = 0;
return list;
}
return list;
}
Figure 5-13 Alternative List Clear Methods
6. Stacks
One of the most basic data structures in data processing is the stack. Surprisingly simple
in its implementation, it is a highly versatile mechanism, often useful in implementing
recursive and multithreaded algorithms. In this section we will examine a complete stack
implementation. The material that we cover will be used in conjunction with the sorting
algorithms you learned earlier to complete Project 3.
6.1 Objectives
At the conclusion of this section, and with the successful completion of your third
project, you will have demonstrated the ability to:
• Compare a stack to a last-in, first-out (lifo) queue;
• Perform a complete, modularized stack implementation; and
• Use a stack to implement recursive algorithms.
6.2 Overview
A stack is often referred to as a last-in, first-out (LIFO) queue; that’s because a stack
grows by adding an item to its tail, and shrinks by removing an item from its tail, so the
last item added to (or pushed onto) the stack is always the first to be removed (or
popped); see Figure 6-1. Although in some implementations you may access data in the
middle of a stack, it is illegal to remove any item but the end-most.
Stacks are often implemented using a list, with push corresponding to add-tail and pop to
remove-tail. However the traditional implementation, and the most common view of a
stack, is as an array. When a stack is treated as an array there are two alternative
implementations: top-down and bottom-up. As seen in Figure 6-2, the beginning of a top-
down stack is given as the first address following the last element of the array; the
beginning of a bottom-up stack is given as the address of the first element of the array.
When you push an item onto the stack, the item that you add occupies a location on the
stack. A stack pointer is used to indicate the position in the array that the pushed item
should occupy. In a bottom-up implementation the stack pointer always indicates the first
unoccupied location; to execute a push operation, first store the new item at the location
indicated by the stack pointer, then increment the stack pointer. In a top-down
implementation, the stack pointer always indicates the last occupied location; to execute
a push operation, first decrement the stack pointer, then store the new item at the
indicated location. The push operation is illustrated in Figure 6-3.
Note: It should be clear that bottom-up and top-down stacks are essentially equivalent.
Application programmers tend to prefer bottom-up stacks because they’re more intuitive;
system programmers often prefer top-down stack for historical, and for obscure (and, for
us, irrelevant) technical reasons. For the sake of avoiding confusion the remainder of this
discussion will focus on bottom-up stacks.
A stack is empty when no position on the stack is occupied. When a bottom-up stack is
empty, the stack pointer will indicate the first element of the array; when full, the stack
pointer will indicate the first address after the last element of the array. This is shown in
Figure 6-4. An attempt to push an item onto a full stack results in a stack overflow
condition.
As shown in Figure 6-5, the last item pushed onto the stack can be removed by popping
it off the stack. To pop an item off a bottom-up stack, first decrement the stack pointer,
then remove the item at the indicated location. Note that once an item has been popped
off the stack, the location it formerly occupied is now unoccupied, and you should not
expect to find a predictable value at that location. An application should never try to pop
an item off an empty stack; attempting to do so constitutes an egregious malfunction on
the part of the application.
A note about popping, and the values of unoccupied locations: If you experiment with
stacks using a simple test driver you might conclude that the value popped off the stack
continues to occupy the stack at its previous location. However applications that share a
stack among asynchronously executed subroutines will find the values of such locations
unpredictable. Asynchronous or interrupt-driven environments are where the magic of
stacks is most useful; unfortunately they are beyond the scope of this course.
temp = string;
while ( sptr != stack )
*temp++ = *--sptr; /* pop */
return string;
}
div( a, b ) Evaluate a / b
etc. etc.
Let’s also suppose that our interpreter will also be able to process strings that consist of a
embedded instances of the above, such as this one:
and( 0xff, sum( mul(10, 50), div(24, 3), add( mul(2, 4), 2 ) ) )
Then we could implement our interpreter as a recursive function that called itself each
time it had to evaluate a subexpression. Such a function might look like the function
StackCalc as shown in Figure 6-6.
long StackCalc( const char *expr, const char **end )
{
long rval = 0;
long operator = 0;
long operand = 0;
int count = 0;
CDA_BOOL_t working = CDA_TRUE;
const char *temp = skipWhite( expr );
switch ( operator )
{
case ADD:
rval = xadd( count );
break;
. . .
}
if ( end != NULL )
*end = skipWhite( temp );
return rval;
}
Figure 6-6 StackCalc Function Entry Point
point to the next unparsed token in the string. Each time getOperand returns the value of
an operand StackCalc pushes it onto a stack, keeping a count of the number of operands
that have been pushed. When getOperand indicates that the last argument has been parsed
StackCalc calls a function to pop each operand off the stack and perform the evaluation.
The function for performing the sum evaluation is shown in Figure 6-7.
static long xsum( int count )
{
long rcode = 0;
int inx = 0;
return rcode;
}
Figure 6-7 StackCalc Function to Evaluate sum
The last thing StackCalc does before returning is to set the end parameter to point to the
portion of the string following whatever it has just evaluated. For example, if the string it
evaluated was “add( 2, 4 )” it will leave end point to the end of the string; but if it had just
evaluated the add portion of “sum( add( 1, 2 ), mul( 2, 4 ) )” it will leave end pointing to
mul.
The recursive logic in StackCalc is contained in the function getOperand, which
evaluates the input string as follows:
• Is the next token a right parenthesis? If so the end of the argument list has been
reached.
• Does the next token start with a digit? Is so parse the argument by calling strtol.
• Does the next token start with an alphabetic character? If so parse the
subexpression by recursively calling StackCalc.
Let’s consider what’s going on with the stack while StackCalc is evaluating this string:
and( 0xff, sum( mul(10, 50), div(24, 3), add( mul(2, 4), 2 ) ) )
We will refer to various calls to StackCalc as instances of the function. When the user
first calls StackCalc we enter instance 0. Whenever instance 0 makes a recursive call we
enter instance 1, etc.
1. Instance 0 obtains the identifier for and, and pushes 0xff onto the stack, then calls
instance 1 to evaluate “sum( . . . ).”
2. Instance 1 obtains the identifier for sum and immediately calls instance 2 to
evaluate “mul( . . . ).”
3. Instance 2 obtains the identifier for mul and pushes 10 and 50 onto the stack. At
this point our stack has the state shown in Figure 6-8.
4. Instance 2 pops two operands off the stack, evaluates 10 * 50 and returns the
result to instance 1, which pushes it onto the stack. Then instance 1 again calls
instance 2 to evaluate “div( . . .).”
5. Instance 2 obtains the identifier for div and pushes 24 and 3 onto the stack which
now has the state shown in Figure 6-9.
255 0 owned by instance 0
10 1
owned by instance 2 (1)
50 2
stack pointer 3
..
6. Instance 2 pops two operands off the stack, evaluates 24 / 3 and returns the result
to instance 1 which pushes it onto the stack. Instance 1 calls instance 2 once again
to evaluate “add( . . .).”
7. Instance 2 obtains the identifier for add and immediately calls instance 3 to
evaluate “mul( … ).”
255 0 owned by instance 0
500 1 owned by instance 1
24 2
owned by instance 2 (2)
3 3
stack pointer 4
..
8. Instance 3 obtains the identifier for mul and pushes 2 and 4 onto the stack. The
current state of the stack is now shown in Figure 6-10.
9. Instance 3 pops two operands off the stack, evaluating 2 * 4, and returns the result
to instance 2 which pushes it onto the stack. Then instance 2 pushes 2 onto the
stack.
10. Instance 2 pops two operands off the stack, computing 8 + 2, and returns the
result to instance 1which pushes it onto the stack.
11. Instance 1 pops 3 arguments off the stack, evaluating 10 + 8 + 500, and returns
the result to instance 0 which pushes it onto the stack.
12. Instance 0 pops 2 arguments off the stack, evaluating 518 & 0xff, and returns the
result to the user.
Section 6: Stacks 75 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
2 3
owned by instance 3
4 4
stack pointer 5
..
6.4.8 STK_clear_stack
This method removes all items from a stack, leaving the stack in an empty state.
Synopsis:
void STK_clear_stack( STK_ID_t stack );
Where:
stack == stack id returned by STK_create_stack
Exceptions:
None
Returns:
void
Notes:
None
if ( numElements > 1 )
lowHalf = numElements / 2
highHalf = numElements - lowHalf
array2 = array + lowHalf
mergesort( array, lowHalf )
mergesort( array2, highHalf )
inx = jnx = 0
while ( inx < lowHalf && jnx < highHalf )
if ( array[inx] < array2[jnx] )
STK_push_item( stack, array[inx++] )
else
STK_push_item( stack, array2[jnx++] )
inx = numElements;
while ( inx > 0 )
array[--inx] = STK_pop_item( stack )
Figure 6-12 Stack-Based Implementation of Mergesort
stack
#ifndef STKP_H
#define STKP_H sptr occupied
#endif
The implementation of all but three of our methods is show below. The implementation
of STK_push_item, STK_pop_item and STK_is_stack_full is left as an exercise.
#include <stkp.h>
#include <stdlib.h>
return (STK_ID_t)stack;
}
return STK_NULL_ID;
}
return rcode;
}
will validate, using assertions, that the indexed value is legal. The implementation of
these routines is shown in Figure 6-15 and Figure 6-16.
void *STK_get_item( STK_ID_t stack, STK_MARK_t mark, int offset )
{
CDA_ASSERT( stack->stack + mark >= stack->stack );
CDA_ASSERT( stack->stack + mark < stack->sptr );
CDA_ASSERT( stack->stack + mark + offset >= stack->stack );
CDA_ASSERT( stack->stack + mark + offset < stack->sptr );
To access an item at a particular location on the stack, the user passes a previously
obtained mark plus an offset. An offset of 0 indicates the marked location itself; an offset
of –1 indicates the item that was pushed immediately before the marked item, and an
offset of 1 indicates the item immediately after the marked item, etc.
The methods to clear a stack and to grab stack space are shown in Figure 6-17 and
Figure 6-18. To clear a stack we simply reset the stack pointer to a marked location; to
grab stack space we simply advance the stack pointer; although we have not explicitly
written any values to the stack locations that we skipped, those locations are now
considered occupied, and may be modified using STK_change_item.
void STK_clear_to_mark( STK_ID_t stack, STK_MARK_t mark )
{
CDA_ASSERT( stack->stack + mark >= stack->stack );
CDA_ASSERT( stack->stack + mark < stack->sptr );
if ( bottom_mark != NULL )
*bottom_mark = stack->sptr - stack->stack;
stack->sptr += num_slots;
flink
blink
name
size
occupied occupied
occupied occupied
occupied occupied
occupied occupied
occupied
occupied
occupied
First, with a segmented stack, it will be easier to make our stack pointer an integer index
rather than a pointer; that will make it easier to figure out which segment a stack slot falls
in. Second, as suggested by Figure 6-19, each segment in the stack will be an controlled
by an enqueuable item; and rather than keeping a pointer to the stack in the stack control
structure, we will keep a pointer to a list anchor, plus a pointer to the current stack
segment. The new declarations and create method are shown in Figure 6-20 and Figure
6-21. Note that since none of our public API has changed, a segmented implementation
could replace a simple implementation with absolutely no impact on the applications that
use it.
Pushing and popping data on a segmented stack now requires watching out for segment
boundaries, and allocating a new segment when an application tries to push data onto a
full stack. The implementation details are left to the imagination of the reader.
typedef struct stk__stack_seg_s
{
return (STK_ID_t)stack;
}
Figure 6-21 Segmented Stack Create Method
7. Priority Queues
In this section we will discuss the queue, a very simple structure that organizes data on a
first-come, first-served basis, and the priority queue, which organizes data according to
an arbitrary designation of importance. Priority queues are a practical means of
implementing schedulers, such as real-time operating system schedulers that execute
processes, or communications schedulers that transmit messages according to their
priority.
In addition, we will continue our discussion of implementation choices that trade-off
speed against data size, and issues of algorithmic complexity. And we will examine two
priority queue implementations: a simple implementation that offers basic functionality
with relatively low complexity and slow execution, and a robust implementation that
offers enhanced functionality and fast execution at the cost of additional complexity and
data size requirements.
7.1 Objectives
At the conclusion of this section, and with the successful completion of your fourth
project, you will have demonstrated the ability to:
• Discuss the usefulness and application of priority queues;
• Choose between algorithms that trade-off speed and complexity against data size;
and
• Perform a complete, modularized priority queue implementation.
7.2 Overview
A queue may be visualized as an array to which elements may be added or removed. A
new element is always added to the end of the queue, and elements are always removed
from the front of the queue. Therefore the first element added to the queue is always the
first element removed, so a queue is often referred to a first-in, first-out queue or FIFO.
This arrangement is illustrated in Figure 7-1. A typical application of a queue is an order-
fulfillment system. An online bookseller, for example, takes an order from a customer
over the Internet; orders are added to the end of a queue as they are received. In the
shipping department orders are removed from the front of the queue and fulfilled in the
order that they were received.
A priority queue is a queue in which each element is assigned a priority. A priority is
typically an integer, and higher integers represent higher priorities. All elements having
the same priority are said to belong to the same priority class. As seen in Figure 7-2, a
priority queue may be visualized as an array in which all elements of the same priority
class are grouped together, and higher priority classes are grouped closer to the front of
the array. A new element is added to the tail of its priority class, and elements are always
removed from the front of the queue. A remove operation, therefore, always addresses the
element of the highest priority class that has been enqueued the longest. Imagine
modifying our order fulfillment system to take into account preferred customers. Let’s
say that customers with ten years standing get served before customers with five years
standing, and that customers with five years standing get served before new customers.
Then when a customer with five years standing places an order, the order goes in the
queue ahead of orders from new customers, but behind older orders from customers with
five years standing or more.
data
add
data data data data data data
remove
data
30
data
add
31 30 30 30 25 25 20
31 remove
data
Let’s discuss queues and priority queues a little more detail. We’ll start with queue.
7.3 Queues
As discussed in your textbook, a queue is an ordered sequence of elements on which we
may perform the following operations (note: your textbook defines only nine operations;
I have taken the liberty of adding the destroy operation):
1. Create a queue;
2. Determine if a queue is empty;
3. Determine if a queue is full;
4. Determine the size of a queue;
Section 7: Priority Queues 88 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
For input and output values for such functions as append and remove we could keep it
simple and just use a void pointer to represent the user’s data. However, experience
suggests that applications often entwine the use of queues and other kinds of lists. For
example, in a communications application it is not unusual for a process to undergo state
changes such as this one:
1. Wait in a work-in-progress queue while transmission parameters are established;
2. Switch to a priority queue awaiting the availability of resources to perform the
transmission;
3. Switch to a response queue awaiting a response to the transmission;
4. Switch to a garbage collection queue to await destruction or reuse.
To facilitate such state changes it makes sense for a queue element to be able to move
quickly and easily from one queue to another. To that end we will make the design
decision that a value appended to or removed from a queue will always be represented by
an enqueuable item (as defined by our ENQ module), and that such an item will contain a
pointer to the user’s data. To accomplish this, we will need one additional declaration for
a queue item, which is shown in Figure 7-4; we will also define two additional queue
operations:
• Create and return a queue item; and
• Destroy a queue item.
typedef struct que_item_s
{
ENQ_ITEM_t item;
void *data;
} QUE_ITEM_t, *QUE_ITEM_p_t;
Figure 7-4 Another QUE Module Public Declaration
Our decision to make our queue a collection of enqueuable items has pretty much
determined that the heart of our implementation will be a linked list as defined by our
ENQ module, so the private header file for our queue module will consist of the
declaration of a control structure containing a pointer to an anchor. The complete private
header file is shown in Figure 7-5. Next let’s discuss the details of just a couple of the
QUE module methods.
#ifndef QUEP_H
#define QUEP_H
#include <que.h>
#include <enq.h>
#endif
Figure 7-5 QUE Module Private Header File
7.3.1 QUE_create_queue
This method will create a new, empty queue, and return to the user an ID to use in future
operations.
Synopsis:
QUE_ID_t QUE_create_queue( const char *name );
Where:
name == queue name; may be NULL
Exceptions:
Throws SIGABRT if the queue cannot be created
Returns:
Queue ID
Notes:
None
7.3.2 QUE_create_item
This method will create a queue item containing the user’s data.
Synopsis:
QUE_ITEM_p_t QUE_create_item( const char *name, void *data );
Where:
name == item name; may be NULL
data == user’s data
Exceptions:
Throws SIGABRT if the item cannot be created
Returns:
Address of queue item
Notes:
None
Here is the implementation of this method:
QUE_ITEM_p_t QUE_create_item( const char *name, void *data )
{
QUE_ITEM_p_t item =
(QUE_ITEM_p_t)ENQ_create_item( name, sizeof(QUE_ITEM_t) );
item->data = data;
return item;
}
7.3.3 QUE_clear_queue
This method will destroy all the items in a queue, leaving the queue empty.
Synopsis:
QUE_ID_t QUE_clear_queue( QUE_ID_t qid,
QUE_DESTROY_PROC_p_t destroyProc
);
Where:
qid == ID of queue to clear
destroyProc == address of destroyProc; may be NULL
Exceptions:
None
Returns:
Queue ID
Notes:
If the data contained in the queue items requires cleanup, the
user should pass the address of a clean up function as the
destroy proc argument. If non-NULL, the clean up function will
return qid;
}
As with our queue module, a member of the queue will be an enqueuable item within
which user data will be stored as a void*; plus we will need to store an integer value
representing the priority of the queue item. The public declarations for our PRQ module
are shown in Figure 7-7.
#define PRQ_NULL_ID (NULL)
Like the queue module, choosing an enqueuable item as type of element to populate the
priority queue strongly suggests that there will be an ENQ-style list at the heart of our
implementation, and our private declarations are going to strongly resemble the QUE
module private declarations. However, for reasons that will become clear later, we also
want to introduce the idea of a maximum priority. This will be an integer value defining
an upper limit on the priority of an item in a given priority queue. Therefore the control
structure for our PRQ implementation will contain both a pointer to an ENQ anchor, plus
an integer field for storing the maximum priority. The complete private header file for
our simple priority queue implementation is shown in Figure 7-8.
#ifndef PRQP_H
#define PRQP_H
#include <prq.h>
#include <enq.h>
#endif
Figure 7-8 Simple PRQ Module Private Header File
Now let’s look at the method specification for our simple priority queue. After that we’ll
see an example of using a priority queue, then examine the simple priority queue
implementation.
7.4.1 PRQ_create_priority_queue
This function will create a priority queue, and return the ID of the queue to be used in all
subsequent priority queue operations. The caller names the priority queue, and provides
the maximum priority for the queue as an unsigned integer. The maximum priority is
saved and checked on subsequent operations, but is not otherwise used in the current
implementation (it is for possible future use).
Synopsis:
PRQ_ID_t PRQ_create_queue( const char *name,
CDA_UINT32_t max_priority
);
Where:
name -> queue name
max_priority == maximum priority supported by queue
Returns:
queue id
Exceptions:
Throws SIGABRT if queue can’t be created
Notes:
max_priority is stored and checked on subsequent operations,
but is not otherwise used at this time.
7.4.2 PRQ_create_item
This method will create an item that is a subclass of ENQ_ITEM_t, and that can be added
to a priority queue. The item is created in an unenqueued state.
Synopsis:
PRQ_ITEM_p_t PRQ_create_item( void *value,
CDA_UINT32_t priority
);
Where:
value -> value to be stored in the item
priority == the priority of the item
Returns:
Address of created item
Exceptions:
Throws SIGABRT if item cannot be created
Notes:
None
7.4.3 PRQ_is_queue_empty
This method will determine whether a priority queue is empty.
Synopsis:
CDA_BOOL_t PRQ_is_queue_empty( PRQ_ID_t queue );
Where:
queue == ID of the queue to test
Returns:
CDA_TRUE if the queue is empty, CDA_FALSE otherwise
Exceptions:
None
Notes:
None
7.4.4 PRQ_add_item
This method will add an item to a priority queue.
Synopsis:
PRQ_ITEM_p_t PRQ_add_item( PRQ_ID_t queue,
PRQ_ITEM_p_t item
);
Where:
queue == id of priority queue
item -> item to add
Returns:
Address of enqueued item
Exceptions:
Throws SIGABRT if the item’s priority is higher than the
maximum priority allowed for the queue.
Notes:
None
7.4.5 PRQ_remove_item
This method removes and returns the highest priority item from a priority queue.
Synopsis:
PRQ_ITEM_p_t PRQ_remove_item( PRQ_ID_t queue );
Where:
queue == id of target priority queue
Returns:
If priority queue is non-empty:
The address of the highest priority item in the queue
Otherwise:
NULL
Exceptions:
None
Notes:
None
7.4.6 PRQ_GET_DATA
This is a macro that will return the user data contained in a priority item.
Synopsis:
void *PRQ_GET_DATA( PRQ_ITEM_p_t item );
Where:
item -> item from which to retrieve value
Returns:
The value of item
Exceptions:
None
Notes:
None
7.4.7 PRQ_GET_PRIORITY
This is a macro that will return the priority of a priority item.
7.4.8 PRQ_destroy_item
This method will destroy a priority queue item.
Synopsis:
PRQ_ITEM_p_t PRQ_destroy_item( PRQ_ITEM_p_t item );
Where:
item -> item to destroy;
Returns:
NULL
Exceptions:
None
Notes:
None
7.4.9 PRQ_empty_queue
This method will remove and destroy all items in a priority queue. The caller may
optionally pass the address of a procedure to call prior to destroying the item; if specified,
the value member of each destroyed item will be passed to this procedure.
Synopsis:
PRQ_ID_t PRQ_empty_queue( PRQ_ID_t queue,
PRQ_DESTROY_PROC_p_t destroy_proc
);
Where:
queue == id of queue to empty
destroy_proc -> optional destroy callback procedure
Returns
Queue ID
Exceptions:
None
Notes:
The caller may pass NULL for the destroy_proc parameter.
7.4.10 PRQ_destroy_queue
This method will destroy all items in a priority queue, and then destroy the queue. The
caller may optionally pass the address of a procedure to call prior to destroying each item
in the queue; if specified, the value of each destroyed item will be passed to this
procedure.
TRANS_shutdown:
This method is to be called by the application to terminate transaction
processing. The queue is destroyed. Note that many items contain memory
that was dynamically allocated by TRANS_enq_transaction, and now
requires freeing. This is accomplished by passing to PRQ_destroy_queue
the address of a destroy proc to perform the cleanup. (Note that the destroy
proc in the example code contains a call to printf that you wouldn’t
normally see in production code; the logic is there to help make the
example a little more meaningful to the reader.)
#include <stdio.h>
#include <cda.h>
#include <prq.h>
#include <trans.h>
if ( item != NULL )
{
qdata = PRQ_GET_DATA( item );
data = qdata->data;
switch ( qdata->operation )
{
case del:
*operation = "delete";
break;
case mod:
*operation = "modify";
break;
case add:
*operation = "add";
break;
default:
assert( CDA_FALSE );
break;
}
CDA_free( qdata );
PRQ_destroy_item( item );
}
return data;
}
return item;
}
if ( temp != NULL )
ENQ_add_before( (ENQ_ITEM_p_t)item, (ENQ_ITEM_p_t)temp );
else
ENQ_add_tail( anchor, (ENQ_ITEM_p_t)item );
return item;
}
if ( item == queue->anchor )
item = NULL;
return (PRQ_ITEM_p_t)item;
}
return rcode;
}
return queue;
}
return PRQ_NULL_ID;
}
has to search the entire linked list to locate the end of the target priority class. If we keep
this same architecture for the robust implementation we will have the same problem with
locating the head of a priority class in order to execute the enqueue-priority-class-head
and dequeue-priority-class-head operations. So to optimize the operation of our robust
implementation we will borrow from the design of the VAX/VMS scheduler, originally
designed by Digital Equipment Corporation, which eliminates searching for the head and
tail of a priority class.
flink flink
blink blink
name name
data
pri = 1
flink
blink
name
Refer to Figure 7-9. This depicts an implementation strategy that uses not one linked list,
but an array of linked lists. The array contains one pointer-to-anchor for every priority
class, and each list contains only items from a single priority class. Now to add an item to
the head or tail of a priority class, we can use the priority as an index into the array to
find the target list; once we have the target list, we merely add the item using
ENQ_add_tail (for the normal add method) or ENQ_add_head (for the new add-priority-
class-head method).
Note that our new implementation now runs faster, but at the expense of occupying
additional space, and some added complexity of implementation. In the simple
implementation we had to create one control structure, plus one list. In the robust
implementation we will have to allocate a control structure, then allocate an array of
pointers-to-anchors, then create a list for each element of the array. And to remove an
Section 7: Priority Queues 105 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
item from the queue, we must first locate the non-empty queue associated with the
highest priority class and then remove its head.
8.1 Objectives
At the conclusion of this section you will be able to:
• Describe the components of the system life cycle; and
• Describe how testing fits into the system life cycle.
8.2 Overview
The steps in which a data processing system should be constructed are called the system
life cycle. There are many different ways of viewing this process, and many different
disciplines that define it, but they all contain these five essential activities:
1. Specification
2. Design
3. Implementation
4. Acceptance Testing
5. Maintenance
The process is said to be iterative. A problem found during the design step could lead to a
reevaluation of the specification. A problem found during implementation could lead to a
change in the system design, which could in turn lead to changes in the system
specification.
Note that step four is dedicated to testing. This does not refer to the kind of testing that
you, as a developer, perform in the course of writing your code. This is a special kind of
activity that concentrates on proving the requirements of the system as established in the
specification phase. In fact, as we’ll see, testing activities are not confined to any one
phase of the process, but take place at every step along the way.
The sections below will present an overview of each phase of the system life cycle. Then
we’ll go back and examine each phase a second time, concentrating on the testing
activities that take place for that phase.
During this step, a great deal of attention is paid to the external specification (in some
disciplines, this is broken into a separate step). The external specification defines the
characteristics of human interaction with the system. It defines the format of the screens
(or graphical user interface) that will be used for data entry, and the reports that will be
used to summarize data. It also defines the criteria that will determine whether or not the
final implementation meets the requirements of the specification.
It is crucial that the system specification clearly delineates the bounds and characteristics
of the system, and that it represents a concise agreement or contract between the system
developers and system users. An incomplete or poorly documented specification
invariably leads to a frustrating and endless implementation.
It is best if the implementation organization is not responsible for this phase of the system
life cycle. If the end user is not sufficiently technical, or otherwise unable to do the
testing, a third party should be employed.
8.2.5 Maintenance
This part of the system life cycle entails fixing flaws that are discovered in the system
after deployment. Normally, fixes to the software aren’t distributed before the next
scheduled release of the system. Occasionally, fixes, or field releases, are dispatched
immediately. Field releases are expensive and dangerous; if a thorough job is done during
the specification and testing phases of the system life cycle, they will not be necessary.
Note that maintenance activity often takes place in parallel with development of a new
system release. In this case, changes made by maintenance must also be integrated with
the new system code.
8.3 Testing
The concept of testing goes far beyond the acceptance testing described in Section 8.2.4.
Testing begins with the start of the system specification, and embraces every stage of the
system life cycle, as discussed below.
Also during this time the test team should develop both high-level and detailed plans for
conducting acceptance testing. Often acceptance testing will require specialized tools that
must be either purchased or developed. If possible, the testers should coordinate the
acquisition and use of such tools with the developers. The developers may find that these
same tools are helpful in their own testing efforts, and the testers may request that the
developers design their code in such a way as to make deployment of the tools more
effective.
In order to be able to do bench testing, the component that you want to test has to be
easily removed from the program, module or function within which it resides. It is always
a good idea to keep bench testing in mind as you design your code. In fact, it can help to
keep this in mind during the system design phase, and sometimes even during the system
specification phase.
Finally, an important part of the developer’s job is to design and carefully document test
cases that can be used to prove the proper execution of each module, and to assemble
these test cases into a module test plan. The module test plan can be used throughout
development to verify the module; later, the maintenance group will use it to verify
changes that they make to your module.
In order for the maintenance group to be able to do their job well, the development group
must do a careful, thorough job of documenting their module test plans during
Section 8: The System Life Cycle 111 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
9. Binary Trees
The next data structure we’re going to examine is the tree. A tree is a versatile
mechanism for solving many problems, including parsing and fast indexing. In this
section we will define in detail the implementation of a special kind of tree, the binary
tree. In the next section, we will learn how to use a binary tree to create a more general
kind of structure called an n-ary tree.
9.1 Objectives
At the conclusion of this section you will be able to:
• Provide a formal definition of a binary tree;
• Construct a binary tree as an array or as a linked structure; and
• Use a binary tree as an index.
9.2 Overview
Conceptually, a binary tree is a structure that consists of zero or more linked nodes. In a
minimal implementation, a node consists of exactly three elements: a data pointer, a left
pointer and a right pointer. This concept is illustrated in Figure 9-1.
data
left
right
data data
left left
right right
With respect to a binary tree we can define the following components and concepts (refer
to Figure 9-2 and Figure 9-3):
Node:
The basic component of a binary tree, comprising a left pointer, a right pointer
and data.
Root Node:
The first node in the tree.
Child:
For a given node, another node that depends from the original node’s left or
right pointer. The child depending from the left pointer is referred to as the left
child and the child depending from the right pointer is referred to as the right
child. Any node in the tree may have zero, one or two children.
Root Node
data Node A Level 1
left
right
Leaf Node:
A node with zero children.
Parent:
The node from which a given node depends. The root node of a binary tree
has no parent; every other node has exactly one parent.
Empty Tree:
For our purposes, a binary tree will be called empty if it has no root node.
(Note that in some implementations an empty tree might be a binary tree with
only a root node.)
Level:
A relative position in the binary tree. The root node occupies level 1 the
children of the root occupy level 2 and so on. In general, the children of a
node that occupies level n themselves occupy level n + 1. The maximum
number of nodes that can occupy level N is 2(N– 1).
Depth:
The maximum number of levels in a binary tree. This value determines the
maximum capacity of a binary tree. If a binary tree has a depth of N, it can
contain a maximum of 2N – 1 nodes.
Distance Between Two Nodes:
The distance between two nodes is the number of levels that must be crossed
to traverse from one to the other. In Figure 9-2, the distance between nodes A
and E is 2.
Subtree:
Within a binary tree, a subtree is any node plus all of its descendants. The top
node is called the root of the subtree. In this way a binary tree is said to be
recursively defined.
D E F G
H I J K L M N O
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
A B C D E F G H I J K L M N O
#endif
Figure 9-6 BTREE Private Header File
9.4.3 BTREE_create_tree
This method will create an empty binary tree and return its ID.
Synopsis:
BTREE_ID_t BTREE_create_tree( void );
Returns:
Binary tree ID
Exceptions:
Throws SIGABRT if tree cannot be created
Notes:
None
Here is the code for BTREE_create_tree:
BTREE_ID_t BTREE_create_tree( void )
{
BTREE__CONTROL_p_t tree = CDA_NEW( BTREE__CONTROL_t );
tree->root = NULL;
return tree;
}
9.4.4 BTREE_add_root
This method will add the root node to a tree; the tree must not already have a root node.
Synopsis:
BTREE_NODE_ID_t
BTREE_add_root( BTREE_ID_t tree, void *data );
Where:
tree == tree to which to add
data -> user data to be stored with the node
node->data = data;
node->tree = tree;
node->parent = NULL;
node->left = NULL;
node->right = NULL;
tree->root = node;
return node;
}
9.4.5 BTREE_add_left
This method will add a left child to a node; the node must not already have a left child.
Synopsis:
BTREE_NODE_ID_t
BTREE_add_left( BTREE_NODE_ID_t node, void *data );
Where:
node == id of node to which to add
data -> user data to be associated with this node
Returns:
ID of new node
Exceptions:
Throws SIGABRT if node cannot be created
Notes:
The node must not already have a left child
Here is the code for this method:
BTREE_NODE_ID_t BTREE_add_left( BTREE_NODE_ID_t node, void *data )
{
BTREE__NODE_p_t left = CDA_NEW( BTREE__NODE_t );
CDA_ASSERT( node->left == NULL );
left->data = data;
left->tree = node->tree;
left->parent = node;
left->left = NULL;
left->right = NULL;
node->left = left;
return left;
}
9.4.6 BTREE_add_right
This method will add a right child to a node; the node must not already have a right child.
Synopsis:
BTREE_NODE_ID_t
BTREE_add_right( BTREE_NODE_ID_t node, void *data )
Where:
node == id of node to which to add
data -> user data to be associated with this node
Returns:
ID of new node
Exceptions:
Throws SIGABRT if node cannot be created
Notes:
The node must not already have a right child
The code for this method is left as an exercise to the student.
9.4.7 BTREE_get_root
This method returns the root node of a tree.
Synopsis:
BTREE_NODE_ID_t BTREE_get_root( BTREE_ID_t tree );
Where:
tree == ID of tree to interrogate
Returns:
ID of root node; BTREE_NODE_NULL if tree is empty
Exceptions:
None
Notes:
None
Here is the code for this method:
BTREE_NODE_ID_t BTREE_get_root( BTREE_ID_t tree )
{
return tree->root;
}
9.4.9 BTREE_is_empty
This method returns true if a tree is empty. Recall that, according to our definition, a tree
is empty if it has no root node.
Synopsis:
CDA_BOOL_t BTREE_is_empty( BTREE_ID_t tree );
Where:
tree == id of tree to test
Returns:
CDA_TRUE if tree is empty,
CDA_FALSE otherwise
Exceptions:
None
Notes:
None
The code for this method is left as an exercise to the student.
9.4.10 BTREE_is_leaf
This method returns true if a node is a leaf. Recall that, according to our definition, a
node is a leaf if it has no children.
Synopsis:
CDA_BOOL_t BTREE_is_leaf( BTREE_NODE_ID_t node );
Where:
node == id of node to test
Returns:
CDA_TRUE if node is a leaf,
CDA_FALSE otherwise
Exceptions:
None
9.4.11 BTREE_traverse_tree
A binary tree is traversed by examining, or visiting, every node in the tree in some order.
In our implementation, there are three possible orders of traversal:
• Inorder traversal
• Preorder traversal
• Postorder traversal
A fourth possible traversal, level traversal, is discussed in your textbook. The details of
binary tree traversal will be discussed later. Recall that BTREE_VISIT_PROC_p_t is
declared as follows:
typedef void BTREE_VISIT_PROC_t( void *data );
typedef BTREE_VISIT_PROC_t *BTREE_VISIT_PROC_p_t;
Synopsis:
BTREE_ID_t
BTREE_traverse_tree( BTREE_ID_t tree,
BTREE_TRAVERSE_ORDER_e_t order,
BTREE_VISIT_PROC_p_t visit_proc
);
Where:
tree == id of tree to traverse
order == order in which to traverse tree
visit_proc -> user proc to call each time a node is visited
Returns:
tree
Exceptions:
None
Notes:
1. Order may be BTREE_INORDER, BTREE_PREORDER or
BTREE_POSTORDER.
2. Each time visit_proc is called the data associated with the
node is passed.
CDA_free( node );
return BTREE_NULL_NODE_ID;
}
The method to destroy a tree merely destroys the subtree represented by the root, and
then frees the control structure:
BTREE_ID_t
BTREE_destroy_tree( BTREE_ID_t tree,
BTREE_DESTROY_PROC_p_t destroy_proc
)
{
0 1 2 3
Data washington lincoln abbey shmabbey
Array (other data) (other data) (other data) (other data)
One of the more straightforward uses of a binary tree is as a sorted index to a data
structure. Suppose we have a list of records stored in an array, and each record is
identified by a unique name called a key. An example would be an array of student
records keyed by student name. Each record can be quickly found by using its array
index, but you typically want to access the record for a particular name. To be able to
quickly look up a record by name, we could create a lookup index for the array in the
form of a binary tree. Each node in the binary tree would contain the name of a record in
the array, plus the array index of the record. This arrangement is illustrated in Figure 9-7.
typedef struct data_s
{
char *key;
int position;
} DATA_t, *DATA_p_t;
char *recs[] = { . . . }
if ( num-recs > 0 )
tree = BTREE_create_tree()
data = CDA_NEW( DATA_t )
data->key = CDA_NEW_STR( recs[0] )
data->position = 0
root = BTREE_add_root( tree, data )
for ( inx = 1 ; inx < num-recs ; ++inx )
data = CDA_NEW( DATA_t )
data->key = CDA_NEW_STR( recs[inx] )
Here is how we go about building the lookup index (refer to Figure 9-8). First we declare
a key record, DATA_t, capable of holding a key and an array index. Now for each record
in the array, allocate and add a new key record to a binary tree. The key record for array
index 0 will be stored in the root of the tree. Additional key records will be added to the
tree by descending through the tree comparing the key to be added to the key stored in an
existing node. Each time the new key is found to be less than an existing key, descend to
the left; if the new key is greater than the existing key descend to the right. When you
attempt to descend and find that the node you are descending from does not have the
target child you’re done descending, and add the key as the target child.
add( DATA_p_t data, BTREE_NODE_t node )
node_data = BTREE_get_data( node )
strc = strcmp( data->key, node_data->key )
CDA_ASSERT( strc != 0 )
if ( strc < 0 )
next_node = BTREE_get_left( node )
if ( next_node == BTREE_NULL_NODE )
BTREE_add_left( node, data )
else
add( data, next_node )
else
next_node = BTREE_get_right( node )
if ( next_node == BTREE_NULL_NODE )
BTREE_add_right( node, data )
else
add( data, next_node )
Figure 9-9 Index Creation Add Function Pseudocode
Figure 9-9 shows the pseudocode for a recursive function to accomplish the add
operation. Figure 9-10 shows the result of using the recursive function to create an index
using the following array of keys:
static const char *test_data[] =
{ "washington", "lincoln", "abbey", "shmabbey",
"gettysburg", "alabama", "zulu", "yorkshire",
"xerxes", "wonderland", "tiparary", "sayville",
"montana", "eratosthenes", "pythagoras", "aristotle",
"kant"
};
WA
LI ZU
AB SH YO
GE SA TI XE
AL KA MO WO
ER PY
AR
Figure 9-10 A Binary Tree Index
Now suppose you have a key, and you want to search the binary tree for it in order to
determine the array position that the associated record occupies. You would follow a
procedure similar to the one used to create the tree. Starting with the root, compare the
key to the key stored in the node; if they are equal you’re done, otherwise recursively
branch left or right until you find the key you’re looking for, or you reach a leaf; if you
reach a leaf without finding the target key, it means the key isn’t in the binary tree. The
maximum number of comparisons that you have to perform is equal to the depth of the
tree. The pseudocode for the search function is shown in Figure 9-11. Section 9.6
contains sample code that demonstrates the creation and validation of an index; the
results of the validation are shown in Figure 9-13.
Using a binary tree as an index can be a valuable tool, but before doing so you must
analyze your data carefully. The index will be most efficient if keys tend to occur
randomly; if they tend to occur in order, you will wind up with a very inefficient index
like that shown in Figure 9-12. In cases where you must make certain your index is
efficient you will have to resort to balancing your tree; this subject is discussed in your
textbook.
return rcode
Figure 9-11 Pseudocode for Searching a Binary Tree Index
Alabama
Alaska
Arizona
California
Colorado
Connecticut
Delaware
return EXIT_SUCCESS;
}
if ( num_recs > 0 )
{
data->key = CDA_NEW_STR( recs[0] );
data->position = 0;
tree = BTREE_create_tree();
root = BTREE_add_root( tree, data );
if ( strc < 0 )
{
next_node = BTREE_get_left( node );
if ( next_node == BTREE_NULL_NODE_ID )
BTREE_add_left( node, data );
else
add( data, next_node );
}
else
{
next_node = BTREE_get_right( node );
if ( next_node == BTREE_NULL_NODE_ID )
BTREE_add_right( node, data );
else
add( data, next_node );
}
}
return rcode;
}
0, washington
1, lincoln
2, abbey
3, shmabbey
4, gettysburg
5, alabama
6, zulu
7, yorkshire
8, xerxes
9, wonderland
10, tiparary
11, sayville
12, montana
13, eratosthenes
14, pythagoras
15, aristotle
16, kant
Figure 9-13 Index Validation Results
case BTREE_INORDER:
traverse_inorder( tree->root, visit_proc );
break;
case BTREE_POSTORDER:
default:
CDA_ASSERT( CDA_FALSE );
break;
}
return tree;
}
Each of the three subroutines will be a recursive procedure that traverses the tree in the
indicated order, and calls visit_proc each time a node is visited, passing the node’s data.
The cases are discussed individually, below.
Here is a code sample that uses inorder traversal to traverse the binary tree index created
in Section 9.6. The results of the traversal are shown in Figure 9-15.
static BTREE_VISIT_PROC_t visit_proc;
static void traverse_index_inorder( BTREE_t tree )
{
BTREE_traverse_tree( tree, BTREE_INORDER, visit_proc );
}
If we substitute a preorder traversal for the inorder traversal in the example in Section
9.7.1 we will get the results shown in Figure 9-17. Of course, this isn’t a very good
example of the use of a preorder traversal. A better example would be the use of binary
trees to parse prefix expressions; this subject is discussed in your textbook.
0, washington
1, lincoln
2, abbey
4, gettysburg
5, alabama
13, eratosthenes
15, aristotle
16, kant
3, shmabbey
11, sayville
12, montana
14, pythagoras
10, tiparary
6, zulu
7, yorkshire
8, xerxes
9, wonderland
Figure 9-17 Preorder Traversal Results
If we substitute a postorder traversal for the inorder traversal in the example in Section
9.7.1 we will get the results shown in Figure 9-17. Once again, this isn’t a very good
example of the use of this type of traversal. A better example would be the use of binary
trees to parse postfix expressions as discussed in your textbook.
15, aristotle
13, eratosthenes
5, alabama
16, kant
4, gettysburg
2, abbey
14, pythagoras
12, montana
11, sayville
10, tiparary
3, shmabbey
1, lincoln
9, wonderland
8, xerxes
7, yorkshire
6, zulu
0, washington
Figure 9-19 Postorder Traversal Results
10.1 Objectives
At the conclusion of this section you will be able to:
• Define an n-ary tree, and explain the relationships between nodes in an n-ary tree;
• Perform a modularized n-ary tree implementation using a binary tree; and
• Use an n-ary tree to construct a directory.
10.2 Overview
Figure 10-1 shows one way to view an n-ary tree, suggesting that each node contains a
link to each of zero or more children. Note that not every node has to have the same
number of children. One way to build a tree like this would be to keep an array of child
pointers in each node. However this approach has one big disadvantage: arrays are static
entities. Each node would have a maximum number of children, and no matter how many
children a node actually has, it would be forced to allocate an array big enough to hold
the maximum.
Another approach to constructing an n-ary tree is to use linked lists to link all the children
of a node. The most popular is approach is to store an n-ary tree as a binary tree using the
left child, right sibling method. This method is illustrated in Figure 10-2. It shows that
the right child of node N in the binary tree is treated as a sibling of node N in the n-ary
tree. The right child of node N in the binary tree is referred to as node N’s nearest sibling,
and the right child of any sibling of N is node N’s sibling. The left child of node M in the
binary tree is referred to as node M’s nearest child, and any sibling of a child of M is also
a child of M. In considering the relationships between nodes in an N-ary tree we have one
situation that is, at least at first, anti-intuitive. Suppose that, in a binary tree, B is the right
child of A. Then in the corresponding n-ary tree, B is a sibling of A, but A is not a sibling
of B.
A
B C D
E F G
#include <ntree.h>
#endif
Figure 10-4 NTREE Module Private Header File
10.3.3 NTREE_create_tree
The description of NTREE_create_tree is identical to BTREE_create_tree. The code for
this method is shown below.
NTREE_ID_t NTREE_create_tree( void )
{
BTREE_ID_t tree = BTREE_create_tree();
return tree;
}
10.3.4 NTREE_add_root
The description of NTREE_add_root is identical to that of BTREE_add_root. The code is
shown below.
NTREE_NODE_ID_t NTREE_add_root( NTREE_ID_t tree, void *data )
{
BTREE_NODE_ID_t node = BTREE_NULL_NODE_ID;
CDA_ASSERT( BTREE_is_empty( tree ) );
node = BTREE_add_root( tree, data );
return node;
}
10.3.5 NTREE_add_child
This method will add a child to the list of a node’s children; it does so by locating the last
child in the list, and adding a sibling.
Synopsis:
NTREE_NODE_ID_t
NTREE_add_child( NTREE_NODE_ID_t node, void *data );
Where:
node == node to which to add
data == data to store at new node
Returns:
ID of new node
Exceptions:
Throws SIGABRT if node can’t be created
Notes:
None
Here is the code for this method:
NTREE_NODE_ID_t
NTREE_add_child( NTREE_NODE_ID_t node, void *data )
{
NTREE_NODE_ID_t child = NTREE_NULL_NODE_ID;
return child;
}
return sib;
}
10.3.7 NTREE_get_root
This method is identical to BTREE_get_root. The code consists of a simple call to
BTREE_get_root.
10.3.8 NTREE_has_child
This method will determine whether a node has a child, which is the same as determining
if it has a left child in its binary tree.
Synopsis:
CDA_BOOL_t NTREE_has_child( NTREE_NODE_ID_t node );
Where:
node == node to interrogate
Returns:
CDA_TRUE if node has a child,
CDA_FALSE otherwise
Exceptions:
None
Notes:
None
Here is the code for this method:
CDA_BOOL_t NTREE_has_child( NTREE_NODE_ID_t node )
{
CDA_BOOL_t rcode = CDA_TRUE;
BTREE_NODE_ID_t child = BTREE_get_left( node );
return rcode;
}
10.3.9 NTREE_has_sib
This method will determine whether a node has a sibling, which is the same as
determining if it has a right child in its binary tree.
Synopsis:
CDA_BOOL_t NTREE_has_sib( NTREE_NODE_ID_t node );
Where:
node == node to interrogate
Returns:
CDA_TRUE if node has a sibling,
CDA_FALSE otherwise
Exceptions:
None
if ( sib == BTREE_NULL_NODE_ID )
rcode = CDA_FALSE;
return rcode;
}
10.3.11 NTREE_destroy_tree
The description of this routine is identical to the description of BTREE_destroy_tree. The
code is shown below.
NTREE_ID_t
NTREE_destroy_tree( NTREE_ID_t tree,
NTREE_DESTROY_PROC_p_t destroy_proc
)
{
BTREE_destroy_tree( tree, destroy_proc );
return NTREE_NULL_ID;
}
10.4 Directories
N-ary trees are used in a variety of applications, including those for parsing expressions
consisting of multiple operands (such as conditional expressions in C, which require
evaluation of three operands). But one of the most popular uses is the creation of
directories.
A directory is a hierarchical arrangement of nodes, some or all of which can contain other
nodes. One familiar example is the directory structure on your computer’s hard drive.
Figure 10-5 shows part of the layout of the directory structure on the C drive on my
Windows NT workstation.
directx msoffice
cygwin
termcap
libbfd.a libfl.a
limits.h stdlib.h
ar.exe as.exe
Figure 10-5 A Disk Directory Structure
The root directory, represented by the backslash (\) is a container that can hold other
directories and “regular” files, among them the bin, Cygnus, home and program files
subdirectories. The bin subdirectory contains two non-container files; the Cygnus
subdirectory contains the cygwin subdirectory, which in turn contains three additional
subdirectories plus the regular file cygnus.bat. As the figure suggests, an n-ary tree is a
good data structure for representing this organization. The root node represents the root
directory, and children of the root represent all the files and subdirectories contained by
the root. Children of the n-ary node cygwin represent files and subdirectories contained in
the cygwin subdirectory, and so forth. As an n-ary tree, the directory structure is
extensible to any practical limit.
More generally we can say that a directory element is a node that has a name, a list of
properties and may or may not contain other directory elements. A property is a
distinguishing characteristic of a node; it has a name and a value. A directory is any
collection of directory elements beginning with a root node that must be a container.
Within a directory, every node is represented by a distinguished name; a distinguished
name, or DN, is the concatenation of the node’s name with the names of 0 or more of its
ancestors. A fully qualified distinguished name, or FQDN, is the DN of a node beginning
with the root, and every node must have a unique FQDN. Any DN that is not fully
qualified has a context relative to some other node in the tree. Consider the node ar.exe in
the above illustration. Its name is ar.exe, and some of properties are its size (184,320
bytes) its creation date (December 25, 1999) and its type (application). It has a DN
relative to cygwin of H-i586\bin\ar.exe, and an FQDN of \cygnus\cygwin\H-
i586\bin\ar.exe.
root
design machine qc
10.4.3 CDIR_create_dir
This method will create a new directory with an empty root node.
Synopsis:
CDIR_ID_t CDIR_create_dir( const char *name );
Where:
name == name of the directory
Returns:
ID of directory
Exceptions:
Throws SIGABRT if directory can’t be created
Notes:
When the directory is no longer needed, the user must destroy
it by calling CDIR_destroy_dir.
10.4.4 CDIR_add_child
This method will add a child to some node in the directory. The name of the new node
may be specified as a relative DN or as an FQDN.
10.4.5 CDIR_add_property
This method will add a property to a node.
Synopsis:
const char *CDIR_add_property( CDIR_NODE_ID_t node,
const char *name,
const char *value
);
Where:
node == node to which to add property
name == name of the property to add
value == value of the property to add
Returns:
value
Exceptions:
Throws SIGABRT if property can’t be created
Notes:
None
10.4.6 CDIR_get_node
This method will return the ID of a node in the directory. The name of the target node
may be a relative DN, or an FQDN
Section 10: N-ary Trees 144 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
Synopsis:
CDIR_NODE_ID_t CDIR_get_node( CDIR_ID_t cdir,
CDIR_NODE_ID_t base,
const char **names,
size_t num_names
);
Where:
cdir == the (possibly NULL) ID of the target directory
base == the (possibly NULL) ID of a node in the directory
names == an array of strings representing the
distinguished name of the child to create
num_names == size of the names array
Returns:
CDIR_NULL_NODE_ID if the target node could not be located,
otherwise the ID of the target node
Exceptions:
None
Notes:
1. The distinguished name of the target node is the
concatenation of the strings in the names array.
2. If base is CDIR_NULL_NODE_ID then cdir must be non-NULL and
the names array is understood to define an FQDN. Otherwise
cdir is ignored, and the names array is understood to
define a DN relative to base.
10.4.7 CDIR_get_property
This method will return the value of a property in a node.
Synopsis:
CDA_BOOL_t CDIR_get_property( CDIR_NODE_ID_t node,
const char *name,
const char **value
);
Where:
node == node in which to find property
name == name of the property to find
value -> variable to which to return property value
Returns:
CDA_TRUE if property could be found, CDA_FALSE otherwise
Exceptions:
None
Notes:
None
10.4.8 CDIR_destroy_dir
This method will destroy a directory.
Synopsis:
CDIR_ID_t CDIR_destroy_dir( CDIR_ID_t cdir );
Where:
cdir == directory ID
Returns:
CDIR_NULL_ID
address1 ceo
Figure 10-8 CDIR Implementation Strategy
Since our basic CDIR types will just be based on NTREE types the only thing we have to
declare in our private header file will be the structure to represent a property. This will be
an enqueuable item with a single field for the user data. This field is declared to be type
char, but when we create an item we will allocate enough extra space for an entire value,
and this field will contain the first byte. The complete private header file is shown in
Figure 10-9.
return cdir;
}
#ifndef CDIRP_H
#define CDIRP_H
#include <cdir.h>
#include <enq.h>
#endif
Figure 10-9 CDIR Module Private Header File
return node;
}
10.4.12 CDIR_add_property
This method will add a new property to a node’s property list. Since the user passes in the
node, all we have to do is obtain the anchor of the property list, create a new item
containing the property value, and add it to the tail of the list. Here is the code.
const char *CDIR_add_property( CDIR_NODE_ID_t node,
const char *name,
const char *value
)
{
ENQ_ANCHOR_p_t anchor = NTREE_get_data( node );
size_t size =
sizeof(CDIR__PROPERTY_t) + strlen( value );
CDIR__PROPERTY_p_t prop =
(CDIR__PROPERTY_p_t)ENQ_create_item( name, size );
return value;
}
if ( node == CDIR_NULL_NODE_ID )
node = NTREE_get_root( cdir );
for ( inx = 0 ;
(inx < (int)num_names) && (node != CDIR_NULL_NODE_ID) ;
++inx
)
{
CDA_BOOL_t found = CDA_FALSE;
node = NTREE_get_child( node );
while ( !found && (node != CDIR_NULL_NODE_ID) )
{
anchor = NTREE_get_data( node );
if ( strcmp( names[inx], ENQ_GET_LIST_NAME( anchor )
) == 0
)
found = CDA_TRUE;
return node;
}
*value = propv;
return rcode;
}
Sample Questions
1. Use CDA_malloc or CDA_calloc to allocate enough memory for an array
consisting of NELEMENTS elements. Each element should be type
CDA_INT32. Use a for loop to initialize each element of the array to –1.
Suggestion: If you think you know the answer, bench test it; code
your solution into a test driver and see if it really works like you
think it does.
2. The X Window System makes frequent use of callback routines much like the
destroy callbacks we wrote when designing some of our modules. Each such
callback has return type of void, and takes three parameters, each of which is type
void*. Use typedef statements to create the names XT_CBPROC_t, equivalent to
the type of a callback function, and XT_CBPROC_p_t, equivalent to type pointer-
to-callback function.
3. Complete the following subroutine, which traverses a linked list in search of an
item with a given name. If found, the item is dequeued and returned, otherwise,
NULL is returned.
ENQ_ITEM_p_t ENQ_deq_named_item( ENQ_ANCHOR_p_t anchor,
const char *name
)
{
ENQ_ITEM_p_t item = NULL;
return item;
}
Suggestion: If you think you know the answer, bench test it; code
your solution into a test driver and see if it really works like you
think it does.
4. List two contexts in which the name of an array is not equivalent to the address of
an array?
5. In our ENQ module, what is the definition of a list in the empty state?
6. According to our module naming standards, to which module does the function
UI__dump_parms belong, and where is its prototype published?
Practice Final Examination 151 06/19/06
C Programming: Data Structures and Algorithms, Version 2.07 DRAFT
return index;
}
Suggestion: If you think you know the answer, bench test it; code
your solution into a test driver and see if it really works like you
think it does.
9. Write the function QUE_remove as discussed in your notes. Assume that the
queue is implemented via the ENQ module (also as discussed in your notes).
Suggestion: If you think you know the answer, bench test it; code
your solution into a test driver and see if it really works like you
think it does.
10. Discuss the testing activities that occur during the design phase of the system life
cycle.
11. What is a regression test?
12. According to your notes, what are the two major categories of complexity.
13. Describe the order in which a stack pointer is incremented and dereferenced in a
push operation. What mechanism would you use to prevent stack overflow in a
push operation?
14. Complete the following subroutine. It will count the number of items stored in a
priority queue with the given priority; the queue is maintained as a single doubly
linked list (just like our "simple" priority queue implementation). Refer to your
notes for the declarations of PRQ_ID_t, etc.
size_t PRQ_get_class_len( PRQ_ID_t queue, int class )
{
int result=0;
return result;
}
Suggestion: If you think you know the answer, bench test it; code
your solution into a test driver and see if it really works like you
think it does.
15. Assume that a binary tree is stored as an array, where the root node is stored in
index 0 of the array.
a) At what index will you find the parent of the node stored at index 197?
b) At what index will you find the right child of the node stored at index 233?
16. Refer to the accompanying figure. Is the illustrated binary tree balanced? Why or
why not?
17. List three ways to traverse a binary tree. Which method of traversal would you
use to print the keys of an index in alphabetical order?
18. Refer to the accompanying figure, an n-ary tree implemented via a binary tree,
and answer the following questions.
a) Which node is the parent of node F?
b) Is node G a sibling of node I?
c) How many children does node E have?
19. (Note: this topic is not currently covered in your notes, and will not be
represented on the final examination.) Examine the following source code, and
answer the questions that follow.
#define FALSE (0)
typedef int BOOL;
if ( inited )
printf( "%d: err\n", facility_id, err );
}
a) Which components in the code represent variable space requirements?
b) Which components in the code represent fixed space requirements?
Answers
1.
CDA_INT32 *array = CDA_calloc( NELEMENTS, sizeof(CDA_INT32) );
int inx = 0;
return rval;
}
4. When it is used as the operand of the sizeof operator; a pointer may be used as an
lvalue, but the name of an array may not.
5. The flink and blink of the anchor point to the anchor.
6. The function belongs to the UI module. Since UI is followed by a double
underscore, it must be a private function, so its prototype is published in uip.h.
7. A collision occurs when two different keys hash to the same element of the hash
table's array.
8.
static size_t keyHash( const CDA_UINT8_t *string,
size_t length,
size_t tableSize
)
{
size_t index = 0;
size_t inx = 0;
const char *temp = string;
return index;
}
9.
QUE_ITEM_p_t QUE_remove( QUE_ID_t queue )
{
ENQ_ANCHOR_p_t anchor = queue->anchor;
ENQ_ITEM_p_t item = ENQ_deq_head( anchor );
if ( item == anchor )
item = NULL;
return (QUE_ITEM_p_t)item;
}
10. Acceptance criteria for programs and modules are documented. Requirements are
certified as testable. A proof of concept prototype may be built. A high-level test
plan for verifying that the implementation conforms to the design is created.
11. A regression is a new flaw that is created when another flaw is fixed. A
regression test attempts to find regressions in a system that has been changed.
12. The two major categories of complexity are space complexity and time
complexity.
13. In a bottom-up stack implementation, first the stack pointer is dereferenced,
adding an item to the stack, then the stack pointer is incremented, making it point
to the next free item on the stack.
To prevent a stack overflow, use a conditional statement that throws SIGABRT if
a push operation would cause an overflow:
if ( stack is full )
abort();
push
Note that an assertion would be inappropriate, because assertions are disabled in
production code.
14.
size_t PRQ_get_class_len( PRQ_ID_t queue, CDA_UINT32_t class )
{
int result = 0;
ENQ_ANCHOR_p_t anchor = queue->anchor;
PRQ_ITEM_p_t item = NULL;
return result;
}
15. a) (197 - 1) / 2 = 98
b) 2 * 233 + 2 = 468
16. No. The distances between the root and each leaf sometimes vary by more than 1.
17. Three methods to traverse a binary tree are preorder, postorder and inorder. To
print the keys of an index in alphabetical order use an inorder traversal.
18. a) B
b) No; siblinghood is a one-way relationship, so I is a sibling of G, but G is not a
sibling of I.
c) None
19. a) Variable space requirements: The function's parameter, err; the function's
automatic variable, facility_id; and the parameters passed to printf.
b) Fixed space requirements: The static variable inited and the instructions
comprising the function print_err.
Quizzes
Quiz 1
Due Week 2
1. Write the typedefs for the following data types:
OBJECT_t: a structure whose first two members, named flink and blink, are type
“pointer to OBJECT_t”; and whose third member, named object_id, is type (char *).
Quiz 2
Due Week 3
1. Review the definition for an item in the unenqueued state, and an anchor in the empty
state. Now review the implementation of ENQ_deq_item. One step at a time, show
what will happen if you pass an unenqueued item to ENQ_deq_item. One step at a
time, show what will happen if you pass an anchor in the empty state to
ENQ_deq_item.
2. Complete the following subroutine which will traverse one of our linked lists,
printing out the name of every item in the list:
void printNames( ENQ_ANCHOR_p_t list )
{
ENQ_ITEM_p_t item = NULL;
for ( item = ENQ_GET_HEAD( list ) ;
. . . ;
. . .
)
. . .
}
3. Write a function that will test whether or not your linked list function ENQ_deq_tail
will work correctly if passed the anchor of an empty list.
Quiz 3
Due Week 4
1. Briefly discuss the difference between a selection sort and a bubble sort.
2. Examine the following code:
int arr[5] = { 30, 20, 50, 70, 10 };
int *parr = &arr[4];
int inx = 0;
inx = *parr++;
a) Is the above code legal?
b) After executing the above code, what will be the value of inx?
Quiz 4
Due Week 5
1. Do a module’s private functions have external scope?
2. A static global variable has scope that extends to what?
3. Where will the private declarations for the module PRT be published?
4. Where should you place the declarations used only by the source file prt.c?
5. Write the minimum amount of code required to implement the private header file
for the INT module
6. In the context of an abstract data type, give an example of an exception.
7. What are three ways to handle an exception?
Quiz 5
Due Week 6
1. Write the code for STK_pop_item as discussed in your notes, in Section 6.4.4.
2. Complete the following function. This function will push strings passed by a
caller onto a stack until the caller passes NULL, then it will pop the strings off the
stack and print them.
#define MAX_STACK_SIZE (100)
static STK_ID__t stack = STK_NULL_ID;
void stringStuff( char *string )
{
if ( stack == STK_NULL_ID )
{
. . .
}
if ( string != NULL )
. . .
else
{
/* Note: as you pop strings off the stack, how will you
* know when you’re done?
*/
. . .
}
}
Quiz 6
Due Week 7
1. Complete routine PRQ_create_queue for the simple priority queue
implementation as discussed in your notes.
2. Revise the control structure for our PRQ module so that it can handle the
optimized implementation described in your notes.
3. Rewrite the PRQ create method to work with the optimized implementation
described in your notes.
4. A PRQ queue contains one priority 10 item, one priority 5 item and one priority 0
item. If PRQ_remove_item is called three times, in what order will the items be
returned?
5. Write a function that can be used to test whether your PRQ_remove_item method
works if passed the ID of an empty queue.
Quiz 7
Due Week 8
1. As defined in your notes, what are the phases of the system life cycle?
2. In what phases of the system life cycle is the module test plan used?
3. Describe the difference between unit testing and acceptance testing.
Quiz 8
Due Week 9
1. When is a binary tree balanced?
2. Complete routine BTREE_is_empty as described in Section 8.3.9 of your notes.
3. Complete routine BTREE_is_leaf as described in Section 8.3.10 of your notes.
4. Design and implement a method to delete a property from a node in the CDIR
module as discussed in the N-ary tree section of your notes.