summaryrefslogtreecommitdiff
path: root/gcc/ada/g-pehage.ads
diff options
context:
space:
mode:
authorcharlet <charlet@138bc75d-0d04-0410-961f-82ee72b054a4>2005-09-05 07:54:36 +0000
committercharlet <charlet@138bc75d-0d04-0410-961f-82ee72b054a4>2005-09-05 07:54:36 +0000
commit8a2fc7f3949873ca97069d89a39e48a8982b6b68 (patch)
treef3eddae0a34f03ac34645de2578dee1479b775a1 /gcc/ada/g-pehage.ads
parent40668b4e28a7ad4b215b6314b38dd0879e7d527a (diff)
downloadgcc-8a2fc7f3949873ca97069d89a39e48a8982b6b68.tar.gz
2005-09-01 Laurent Pautet <pautet@adacore.com>
* g-pehage.ads, g-pehage.adb (Select_Char_Position): When no character position set is provided, we compute one in order to reduce the maximum length of the keys. This computation first selects a character position between 1 and the minimum length of the keys in order to avoid reducing one of the keys to an empty string. (Initialize, Compute): When the ratio V to K is too low, the algorithm does not converge. The initialization procedure now comes with a maximum number of iterations such that when exceeded, an exception is raised in Compute. The user can initialize this ratio to another value and try again Reformating and updated headers. git-svn-id: svn+ssh://gcc.gnu.org/svn/gcc/trunk@103867 138bc75d-0d04-0410-961f-82ee72b054a4
Diffstat (limited to 'gcc/ada/g-pehage.ads')
-rw-r--r--gcc/ada/g-pehage.ads190
1 files changed, 100 insertions, 90 deletions
diff --git a/gcc/ada/g-pehage.ads b/gcc/ada/g-pehage.ads
index e9f3636bd62..5cff8c53dcc 100644
--- a/gcc/ada/g-pehage.ads
+++ b/gcc/ada/g-pehage.ads
@@ -6,7 +6,7 @@
-- --
-- S p e c --
-- --
--- Copyright (C) 2002-2004 Ada Core Technologies, Inc. --
+-- Copyright (C) 2002-2005 Ada Core Technologies, Inc. --
-- --
-- GNAT is free software; you can redistribute it and/or modify it under --
-- terms of the GNU General Public License as published by the Free Soft- --
@@ -31,122 +31,133 @@
-- --
------------------------------------------------------------------------------
--- This package provides a generator of static minimal perfect hash
--- functions. To understand what a perfect hash function is, we
--- define several notions. These definitions are inspired from the
--- following paper:
-
--- Zbigniew J. Czech, George Havas, and Bohdan S. Majewski ``An
--- Optimal Algorithm for Generating Minimal Perfect Hash Functions'',
--- Information Processing Letters, 43(1992) pp.257-264, Oct.1992
-
--- Let W be a set of m words. A hash function h is a function that
--- maps the set of words W into some given interval of integers
--- [0, k-1], where k is an integer, usually k >= m. h (w) where w
--- is a word computes an address or an integer from I for the
--- storage or the retrieval of that item. The storage area used to
--- store items is known as a hash table. Words for which the same
--- address is computed are called synonyms. Due to the existence
--- of synonyms a situation called collision may arise in which two
--- items w1 and w2 have the same address. Several schemes for
--- resolving known. A perfect hash function is an injection from
--- the word set W to the integer interval I with k >= m. If k = m,
--- then h is a minimal perfect hash function. A hash function is
--- order preserving if it puts entries into the hash table in a
--- prespecified order.
+-- This package provides a generator of static minimal perfect hash functions.
+-- To understand what a perfect hash function is, we define several notions.
+-- These definitions are inspired from the following paper:
+
+-- Zbigniew J. Czech, George Havas, and Bohdan S. Majewski ``An Optimal
+-- Algorithm for Generating Minimal Perfect Hash Functions'', Information
+-- Processing Letters, 43(1992) pp.257-264, Oct.1992
+
+-- Let W be a set of m words. A hash function h is a function that maps the
+-- set of words W into some given interval of integers [0, k-1], where k is an
+-- integer, usually k >= m. h (w) where is a word computes an address or an
+-- integer from I for the storage or the retrieval of that item. The storage
+-- area used to store items is known as a hash table. Words for which the same
+-- address is computed are called synonyms. Due to the existence of synonyms a
+-- situation called collision may arise in which two items w1 and w2 have the
+-- same address. Several schemes for resolving known. A perfect hash function
+-- is an injection from the word set W to the integer interval I with k >= m.
+-- If k = m, then h is a minimal perfect hash function. A hash function is
+-- order preserving if it puts entries into the hash table in prespecified
+-- order.
-- A minimal perfect hash function is defined by two properties:
--- Since no collisions occur each item can be retrieved from the
--- table in *one* probe. This represents the "perfect" property.
+-- Since no collisions occur each item can be retrieved from the table in
+-- *one* probe. This represents the "perfect" property.
--- The hash table size corresponds to the exact size of W and
--- *no larger*. This represents the "minimal" property.
+-- The hash table size corresponds to the exact size of W and *no larger*.
+-- This represents the "minimal" property.
--- The functions generated by this package require the key set to
--- be known in advance (they are "static" hash functions).
--- The hash functions are also order preservering. If w2 is inserted
--- after w1 in the generator, then f (w1) < f (w2). These hashing
--- functions are convenient for use with realtime applications.
+-- The functions generated by this package require the key set to be known in
+-- advance (they are "static" hash functions). The hash functions are also
+-- order preservering. If w2 is inserted after w1 in the generator, then (w1)
+-- < f (w2). These hashing functions are convenient for use with realtime
+-- applications.
package GNAT.Perfect_Hash_Generators is
Default_K_To_V : constant Float := 2.05;
- -- Default ratio for the algorithm. When K is the number of keys,
- -- V = (K_To_V) * K is the size of the main table of the hash function.
+ -- Default ratio for the algorithm. When K is the number of keys, V =
+ -- (K_To_V) * K is the size of the main table of the hash function. To
+ -- converge, the algorithm requires K_To_V to be stricly greater than 2.0.
Default_Pkg_Name : constant String := "Perfect_Hash";
- -- Default package name in which the hash function is defined.
+ -- Default package name in which the hash function is defined
Default_Position : constant String := "";
- -- The generator allows selection of the character positions used
- -- in the hash function. By default, all positions are selected.
+ -- The generator allows selection of the character positions used in the
+ -- hash function. By default, all positions are selected.
+
+ Default_Tries : constant Positive := 20;
+ -- This algorithm may not succeed to find a possible mapping on the first
+ -- try and may have to iterate a number of times. This constant bounds the
+ -- number of tries.
type Optimization is (Memory_Space, CPU_Time);
Default_Optimization : constant Optimization := CPU_Time;
- -- Optimize either the memory space or the execution time.
+ -- Optimize either the memory space or the execution time
Verbose : Boolean := False;
- -- Comment required ???
+ -- Output the status of the algorithm. For instance, the tables, the random
+ -- graph (edges, vertices) and selected char positions are output between
+ -- two iterations.
procedure Initialize
(Seed : Natural;
K_To_V : Float := Default_K_To_V;
- Optim : Optimization := CPU_Time);
- -- Initialize the generator and its internal structures. Set the
- -- ratio of vertices over keys in the random graphs. This value
- -- has to be greater than 2.0 in order for the algorithm to succeed.
+ Optim : Optimization := CPU_Time;
+ Tries : Positive := Default_Tries);
+ -- Initialize the generator and its internal structures. Set the ratio of
+ -- vertices over keys in the random graphs. This value has to be greater
+ -- than 2.0 in order for the algorithm to succeed. The key set is not
+ -- modified (in particular when it is already set). For instance, it is
+ -- possible to run several times the generator with different settings on
+ -- the same key set.
procedure Finalize;
- -- Deallocate the internal structures.
+ -- Deallocate the internal structures and the key table
procedure Insert (Value : String);
- -- Insert a new key in the table.
+ -- Insert a new key in the table
+
+ Too_Many_Tries : exception;
+ -- Raised after Tries unsuccessfull runs
procedure Compute (Position : String := Default_Position);
- -- Compute the hash function. Position allows to define a
- -- selection of character positions used in the keywords hash
- -- function. Positions can be separated by commas and range like
- -- x-y may be used. Character '$' represents the final character
- -- of a key. With an empty position, the generator automatically
- -- produces positions to reduce the memory usage.
+ -- Compute the hash function. Position allows to define selection of
+ -- character positions used in the keywords hash function. Positions can be
+ -- separated by commas and range like x-y may be used. Character '$'
+ -- represents the final character of a key. With an empty position, the
+ -- generator automatically produces positions to reduce the memory usage.
+ -- Raise Too_Many_Tries in case that the algorithm does not succeed in less
+ -- than Tries attempts (see Initialize).
procedure Produce (Pkg_Name : String := Default_Pkg_Name);
- -- Generate the hash function package Pkg_Name. This package
- -- includes the minimal perfect Hash function.
+ -- Generate the hash function package Pkg_Name. This package includes the
+ -- minimal perfect Hash function.
- -- The routines and structures defined below allow producing the
- -- hash function using a different way from the procedure above.
- -- The procedure Define returns the lengths of an internal table
- -- and its item type size. The function Value returns the value of
- -- each item in the table.
+ -- The routines and structures defined below allow producing the hash
+ -- function using a different way from the procedure above. The procedure
+ -- Define returns the lengths of an internal table and its item type size.
+ -- The function Value returns the value of each item in the table.
-- The hash function has the following form:
-- h (w) = (g (f1 (w)) + g (f2 (w))) mod m
- -- G is a function based on a graph table [0,n-1] -> [0,m-1]. m is
- -- the number of keys. n is an internally computed value and it
- -- can be obtained as the length of vector G.
+ -- G is a function based on a graph table [0,n-1] -> [0,m-1]. m is the
+ -- number of keys. n is an internally computed value and it can be obtained
+ -- as the length of vector G.
- -- F1 and F2 are two functions based on two function tables T1 and
- -- T2. Their definition depends on the chosen optimization mode.
+ -- F1 and F2 are two functions based on two function tables T1 and T2.
+ -- Their definition depends on the chosen optimization mode.
- -- Only some character positions are used in the keys because they
- -- are significant. They are listed in a character position table
- -- (P in the pseudo-code below). For instance, in {"jan", "feb",
- -- "mar", "apr", "jun", "jul", "aug", "sep", "oct", "nov", "dec"},
- -- only positions 2 and 3 are significant (the first character can
- -- be ignored). In this example, P = {2, 3}
+ -- Only some character positions are used in the keys because they are
+ -- significant. They are listed in a character position table (P in the
+ -- pseudo-code below). For instance, in {"jan", "feb", "mar", "apr", "jun",
+ -- "jul", "aug", "sep", "oct", "nov", "dec"}, only positions 2 and 3 are
+ -- significant (the first character can be ignored). In this example, P =
+ -- {2, 3}
-- When Optimization is CPU_Time, the first dimension of T1 and T2
- -- corresponds to the character position in the key and the second
- -- to the character set. As all the character set is not used, we
- -- define a used character table which associates a distinct index
- -- to each used character (unused characters are mapped to
- -- zero). In this case, the second dimension of T1 and T2 is
- -- reduced to the used character set (C in the pseudo-code
- -- below). Therefore, the hash function has the following:
+ -- corresponds to the character position in the key and the second to the
+ -- character set. As all the character set is not used, we define a used
+ -- character table which associates a distinct index to each used character
+ -- (unused characters are mapped to zero). In this case, the second
+ -- dimension of T1 and T2 is reduced to the used character set (C in the
+ -- pseudo-code below). Therefore, the hash function has the following:
-- function Hash (S : String) return Natural is
-- F : constant Natural := S'First - 1;
@@ -165,11 +176,11 @@ package GNAT.Perfect_Hash_Generators is
-- return (Natural (G (F1)) + Natural (G (F2))) mod <m>;
-- end Hash;
- -- When Optimization is Memory_Space, the first dimension of T1
- -- and T2 corresponds to the character position in the key and the
- -- second dimension is ignored. T1 and T2 are no longer matrices
- -- but vectors. Therefore, the used character table is not
- -- available. The hash function has the following form:
+ -- When Optimization is Memory_Space, the first dimension of T1 and T2
+ -- corresponds to the character position in the key and the second
+ -- dimension is ignored. T1 and T2 are no longer matrices but vectors.
+ -- Therefore, the used character table is not available. The hash function
+ -- has the following form:
-- function Hash (S : String) return Natural is
-- F : constant Natural := S'First - 1;
@@ -200,17 +211,16 @@ package GNAT.Perfect_Hash_Generators is
Item_Size : out Natural;
Length_1 : out Natural;
Length_2 : out Natural);
- -- Return the definition of the table Name. This includes the
- -- length of dimensions 1 and 2 and the size of an unsigned
- -- integer item. When Length_2 is zero, the table has only one
- -- dimension. All the ranges start from zero.
+ -- Return the definition of the table Name. This includes the length of
+ -- dimensions 1 and 2 and the size of an unsigned integer item. When
+ -- Length_2 is zero, the table has only one dimension. All the ranges start
+ -- from zero.
function Value
(Name : Table_Name;
J : Natural;
- K : Natural := 0)
- return Natural;
- -- Return the value of the component (I, J) of the table
- -- Name. When the table has only one dimension, J is ignored.
+ K : Natural := 0) return Natural;
+ -- Return the value of the component (I, J) of the table Name. When the
+ -- table has only one dimension, J is ignored.
end GNAT.Perfect_Hash_Generators;