Trie - Wikipedia
Trie - Wikipedia
Though tries can be keyed by character strings, they need not be. The same algorithms can be adapted
for ordered lists of any underlying type, e.g. permutations of digits or shapes. In particular, a bitwise
trie is keyed on the individual bits making up a piece of fixed-length binary data, such as an integer
or memory address.
Contents
History, etymology, and pronunciation
Applications
Dictionary Representation
Replacing Other Data Structures
Replacement for Hash Tables
DFSA Representation
Algorithms
Autocomplete
Sorting
Full-text search
Implementation strategies
Bitwise tries
Compressing tries
External memory tries
See also
References
External links
Applications
Dictionary Representation
Common applications of tries include storing a predictive text or autocomplete dictionary and
implementing approximate matching algorithms,[8] such as those used in spell checking and
hyphenation[7] software. Such applications take advantage of a trie's ability to quickly search for,
insert, and delete entries. However, if storing dictionary words is all that is required (i.e. there is no
need to store metadata associated with each word), a minimal deterministic acyclic finite state
automaton (DAFSA) or radix tree would use less storage space than a trie. This is because DAFSAs
and radix trees can compress identical branches from the trie which correspond to the same suffixes
(or parts) of different words being stored.
Looking up data in a trie is faster in the worst case, O(m) time (where m is the length of a search
string), compared to an imperfect hash table. The worst-case lookup speed in an imperfect hash
table is O(N) time, but far more typically is O(1), with O(m) time spent evaluating the hash.
There are no collisions of different keys in a trie. (An imperfect hash table can have key collisions.
A key collision is the hash function mapping of different keys to the same position in a hash table.)
Buckets in a trie, which are analogous to hash table buckets that store key collisions, are
necessary only if a single key is associated with more than one value.
There is no need to provide a hash function or to change hash functions as more keys are added
to a trie.
A trie can provide an alphabetical ordering of the entries by key.
Trie lookup can be slower than hash table lookup, especially if the data is directly accessed on a
hard disk drive or some other secondary storage device where the random-access time is high
compared to main memory.[5]
Some keys, such as floating point numbers, can lead to long chains and prefixes that are not
particularly meaningful. Nevertheless, a bitwise trie can handle standard IEEE single and double
format floating point numbers.
Some tries can require more space than a hash table, as memory may be allocated for each
character in the search string, rather than a single chunk of memory for the whole entry, as in
most hash tables.
DFSA Representation
A trie can be seen as a tree-shaped deterministic finite automaton. Each finite language is generated
by a trie automaton, and each trie can be compressed into a deterministic acyclic finite state
automaton.
Algorithms
The trie is a tree of nodes which supports Find and Insert operations. Find returns the value for a key
string, and Insert inserts a string (the key) and a value into the trie. Both Insert and Find run in O(m)
time, where m is the length of the key.
class Node:
def __init__(self) -> None:
# Note that using a dictionary for children (as in this implementation)
# would not by default lexicographically sort the children, which is
# required by the lexicographic sorting in the Sorting section.
# For lexicographic sorting, we can instead use an array of Nodes.
self.children: Dict[str, Node] = {} # mapping from character to Node
self.value: Optional[Any] = None
Note that children is a dictionary of characters to a node's children; and it is said that a "terminal"
node is one which represents a complete string.
A trie's value can be looked up as follows:
to check if there is any word in the trie that starts with a given prefix (see § Autocomplete), and
to return the deepest node corresponding to some prefix of a given string.
Insertion proceeds by walking the trie according to the string to be inserted, then appending new
nodes for the suffix of the string that is not contained in the trie:
Deletion of a key can be done lazily (by clearing just the value within the node corresponding to a
key), or eagerly by cleaning up any parent nodes that are no longer necessary. Eager deletion is
described in the pseudocode here:[9]
Autocomplete
Tries can be used to return a list of keys with a given prefix. This can also be modified to allow for
wildcards in the prefix search.[9]
Sorting
Lexicographic sorting of a set of keys can be accomplished by building a trie from them, with the
children of each node sorted lexicographically, and traversing it in pre-order, printing any values in
either the interior nodes or in the leaf nodes.[10] This algorithm is a form of radix sort.[11]
A trie is the fundamental data structure of Burstsort, which (in 2007) was the fastest known string
sorting algorithm due to its efficient cache use.[12] Now there are faster ones.[13]
Full-text search
A special kind of trie, called a suffix tree, can be used to index all suffixes in a text in order to carry out
fast full text searches.
Implementation strategies
There are several ways to represent tries, corresponding to different trade-offs between memory use
and speed of the operations. The basic form is that of a linked set of nodes, where each node contains
an array of child pointers, one for each symbol in the alphabet (so for the English alphabet, one would
store 26 child pointers and for the alphabet of bytes, 256 pointers). This is simple but wasteful in
terms of memory: using the alphabet of bytes (size 256) and four-byte pointers, each node requires a
kilobyte of storage, and when there is little overlap in the strings' prefixes, the number of required
nodes is roughly the combined length of the stored strings.[4]:341 Put another way, the nodes near the
bottom of the tree tend to have few children and there are many of them, so the structure wastes
space storing null pointers.[14]
The storage problem can be alleviated by an implementation technique called alphabet reduction,
whereby the original strings are reinterpreted as longer strings over a smaller alphabet. E.g., a string
of n bytes can alternatively be regarded as a string of 2n four-bit units and stored in a trie with sixteen
pointers per node. Lookups need to visit twice as many nodes in the worst case, but the storage
requirements go down by a factor of eight.[4]:347–352
An alternative implementation represents a node as a triple (symbol, child, next) and links
the children of a node together as a singly linked list: child points to the node's first child, next to
the parent node's next child.[14][15] The set of children can also be represented as a binary search tree;
one instance of this idea is the ternary search tree developed by Bentley and Sedgewick.[4]:353
Bitwise tries
Bitwise tries are much the same as a normal character-based trie
except that individual bits are used to traverse what effectively
becomes a form of binary tree. Generally, implementations use a
special CPU instruction to very quickly find the first set bit in a
fixed length key (e.g., GCC's __builtin_clz() intrinsic). This
value is then used to index a 32- or 64-entry table which points to A trie implemented as a left-child
right-sibling binary tree: vertical
the first item in the bitwise trie with that number of leading zero
arrows are child pointers, dashed
bits. The search then proceeds by testing each subsequent bit in
horizontal arrows are next pointers.
the key and choosing child[0] or child[1] appropriately
The set of strings stored in this trie is
until the item is found. {baby, bad, bank, box, dad,
dance}. The lists are sorted to allow
Although this process might sound slow, it is very cache-local and
traversal in lexicographic order.
highly parallelizable due to the lack of register dependencies and
therefore in fact has excellent performance on modern out-of-
order execution CPUs. A red–black tree for example performs much better on paper, but is highly
cache-unfriendly and causes multiple pipeline and TLB stalls on modern CPUs which makes that
algorithm bound by memory latency rather than CPU speed. In comparison, a bitwise trie rarely
accesses memory, and when it does, it does so only to read, thus avoiding SMP cache coherency
overhead. Hence, it is increasingly becoming the algorithm of choice for code that performs many
rapid insertions and deletions, such as memory allocators (e.g., recent versions of the famous Doug
Lea's allocator (dlmalloc) and its descendants). The worst case of steps for lookup is the same as bits
used to index bins in the tree.[17]
Alternatively, the term "bitwise trie" can more generally refer to a binary tree structure holding
integer values, sorting them by their binary prefix. An example is the x-fast trie.
Compressing tries
Compressing the trie and merging the common branches can sometimes yield large performance
gains. This works best under the following conditions:
The trie is (mostly) static, so that no key insertions to or deletions are required (e.g., after bulk
creation of the trie).
Only lookups are needed.
The trie nodes are not keyed by node-specific data, or the nodes' data are common.[18]
The total set of stored keys is very sparse within their representation space (so compression pays
off).
For example, it may be used to represent sparse bitsets; i.e., subsets of a much larger, fixed
enumerable set. In such a case, the trie is keyed by the bit element position within the full set. The key
is created from the string of bits needed to encode the integral position of each element. Such tries
have a very degenerate form with many missing branches. After detecting the repetition of common
patterns or filling the unused gaps, the unique leaf nodes (bit strings) can be stored and compressed
easily, reducing the overall size of the trie.
Such compression is also used in the implementation of the various fast lookup tables for retrieving
Unicode character properties. These could include case-mapping tables (e.g., for the Greek letter pi,
from Π to π), or lookup tables normalizing the combination of base and combining characters (like
the a-umlaut in German, ä, or the dalet-patah-dagesh-ole in Biblical Hebrew, ַ֫)דּ. For such
applications, the representation is similar to transforming a very large, unidimensional, sparse table
(e.g., Unicode code points) into a multidimensional matrix of their combinations, and then using the
coordinates in the hyper-matrix as the string key of an uncompressed trie to represent the resulting
character. The compression will then consist of detecting and merging the common columns within
the hyper-matrix to compress the last dimension in the key. For example, to avoid storing the full,
multibyte Unicode code point of each element forming a matrix column, the groupings of similar code
points can be exploited. Each dimension of the hyper-matrix stores the start position of the next
dimension, so that only the offset (typically a single byte) need be stored. The resulting vector is itself
compressible when it is also sparse, so each dimension (associated to a layer level in the trie) can be
compressed separately.
Some implementations do support such data compression within dynamic sparse tries and allow
insertions and deletions in compressed tries. However, this usually has a significant cost when
compressed segments need to be split or merged. Some tradeoff has to be made between data
compression and update speed. A typical strategy is to limit the range of global lookups for comparing
the common branches in the sparse trie.
The result of such compression may look similar to trying to transform the trie into a directed acyclic
graph (DAG), because the reverse transform from a DAG to a trie is obvious and always possible.
However, the shape of the DAG is determined by the form of the key chosen to index the nodes, in
turn constraining the compression possible.
Another compression strategy is to "unravel" the data structure into a single byte array.[19] This
approach eliminates the need for node pointers, substantially reducing the memory requirements.
This in turn permits memory mapping and the use of virtual memory to efficiently load the data from
disk.
One more approach is to "pack" the trie.[7] Liang describes a space-efficient implementation of a
sparse packed trie applied to automatic hyphenation, in which the descendants of each node may be
interleaved in memory.
See also
Suffix tree
Radix tree
Directed acyclic word graph (aka DAWG)
Acyclic deterministic finite automata
Hash trie
Deterministic finite automata
Judy array
Search algorithm
Extendible hashing
Hash array mapped trie
Prefix hash tree
Burstsort
Luleå algorithm
Huffman coding
Ctrie
HAT-trie
Bitwise trie with bitmap
References
1. Thue, Axel (1912). "Über die gegenseitige Lage gleicher Teile gewisser Zeichenreihen" (https://arc
hive.org/details/skrifterutgitavv121chri/page/n11/mode/2up). Skrifter udgivne af Videnskabs-
Selskabet i Christiania. 1912 (1): 1–67. Cited by Knuth.
2. Knuth, Donald (1997). "6.3: Digital Searching". The Art of Computer Programming Volume 3:
Sorting and Searching (2nd ed.). Addison-Wesley. p. 492. ISBN 0-201-89685-0.
3. de la Briandais, René (1959). File searching using variable length keys (https://web.archive.org/w
eb/20200211163605/https://pdfs.semanticscholar.org/3ce3/f4cc1c91d03850ed84ef96a08498e018
d18f.pdf) (PDF). Proc. Western J. Computer Conf. pp. 295–298. Archived from the original (https:/
/pdfs.semanticscholar.org/3ce3/f4cc1c91d03850ed84ef96a08498e018d18f.pdf) (PDF) on 2020-
02-11. Cited by Brass and by Knuth.
4. Brass, Peter (2008). Advanced Data Structures. Cambridge University Press. p. 336.
5. Edward Fredkin (1960). "Trie Memory". Communications of the ACM. 3 (9): 490–499.
doi:10.1145/367390.367400 (https://doi.org/10.1145%2F367390.367400).
6. Black, Paul E. (2009-11-16). "trie" (https://xlinux.nist.gov/dads/HTML/trie.html). Dictionary of
Algorithms and Data Structures. National Institute of Standards and Technology. Archived (https://
web.archive.org/web/20110429080033/http://xlinux.nist.gov/dads/HTML/trie.html) from the original
on 2011-04-29.
7. Franklin Mark Liang (1983). Word Hy-phen-a-tion By Com-put-er (http://www.tug.org/docs/liang/lia
ng-thesis.pdf) (PDF) (Doctor of Philosophy thesis). Stanford University. Archived (https://web.archi
ve.org/web/20051111105124/http://www.tug.org/docs/liang/liang-thesis.pdf) (PDF) from the
original on 2005-11-11. Retrieved 2010-03-28.
8. Aho, Alfred V.; Corasick, Margaret J. (Jun 1975). "Efficient String Matching: An Aid to
Bibliographic Search" (https://pdfs.semanticscholar.org/3547/ac839d02f6efe3f6f76a8289738a225
28442.pdf) (PDF). Communications of the ACM. 18 (6): 333–340. doi:10.1145/360825.360855 (htt
ps://doi.org/10.1145%2F360825.360855).
9. Sedgewick, Robert; Wayne, Kevin (June 12, 2020). "Tries" (https://algs4.cs.princeton.edu/52trie/).
algs4.cs.princeton.edu. Retrieved 2020-08-11.
10. Kärkkäinen, Juha. "Lecture 2" (https://www.cs.helsinki.fi/u/tpkarkka/opetus/12s/spa/lecture02.pdf)
(PDF). University of Helsinki. "The preorder of the nodes in a trie is the same as the
lexicographical order of the strings they represent assuming the children of a node are ordered by
the edge labels."
11. Kallis, Rafael (2018). "The Adaptive Radix Tree (Report #14-708-887)" (https://www.ifi.uzh.ch/dam
/jcr:27d15f69-2a44-40f9-8b41-6d11b5926c67/ReportKallisMScBasis.pdf) (PDF). University of
Zurich: Department of Informatics, Research Publications.
12. Ranjan Sinha and Justin Zobel and David Ring (Feb 2006). "Cache-Efficient String Sorting Using
Copying" (https://people.eng.unimelb.edu.au/jzobel/fulltext/acmjea06.pdf) (PDF). ACM Journal of
Experimental Algorithmics. 11: 1–32. doi:10.1145/1187436.1187439 (https://doi.org/10.1145%2F1
187436.1187439).
13. J. Kärkkäinen and T. Rantala (2008). "Engineering Radix Sort for Strings". In A. Amir and A.
Turpin and A. Moffat (ed.). String Processing and Information Retrieval, Proc. SPIRE. Lecture
Notes in Computer Science. 5280. Springer. pp. 3–14. doi:10.1007/978-3-540-89097-3_3 (https://
doi.org/10.1007%2F978-3-540-89097-3_3).
14. Allison, Lloyd. "Tries" (http://www.allisons.org/ll/AlgDS/Tree/Trie/). Retrieved 18 February 2014.
15. Sahni, Sartaj. "Tries" (https://www.cise.ufl.edu/~sahni/dsaaj/enrich/c16/tries.htm). Data Structures,
Algorithms, & Applications in Java. University of Florida. Retrieved 18 February 2014.
16. Bellekens, Xavier (2014). "A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated
Intrusion Detection Systems". Proceedings of the 7th International Conference on Security of
Information and Networks - SIN '14. Glasgow, Scotland, UK: ACM. pp. 302:302–302:309.
arXiv:1704.02272 (https://arxiv.org/abs/1704.02272). doi:10.1145/2659651.2659723 (https://doi.or
g/10.1145%2F2659651.2659723). ISBN 978-1-4503-3033-6.
17. Lee, Doug. "A Memory Allocator" (http://gee.cs.oswego.edu/dl/html/malloc.html). Retrieved
1 December 2019. HTTP for Source Code (http://gee.cs.oswego.edu/pub/misc/malloc.c). Binary
Trie is described in Version 2.8.6, Section "Overlaid data structures", Structure
"malloc_tree_chunk".
18. Jan Daciuk; Stoyan Mihov; Bruce W. Watson; Richard E. Watson (2000). "Incremental
Construction of Minimal Acyclic Finite-State Automata" (https://web.archive.org/web/20110930080
314/http://www.eti.pg.gda.pl/katedry/kiw/pracownicy/Jan.Daciuk/personal/daciuk98.ps.gz).
Computational Linguistics. Association for Computational Linguistics. 26: 3–16. arXiv:cs/0007009
(https://arxiv.org/abs/cs/0007009). doi:10.1162/089120100561601 (https://doi.org/10.1162%2F089
(https://arxiv.org/abs/cs/0007009). doi:10.1162/089120100561601 (https://doi.org/10.1162%2F089
120100561601). Archived from the original (http://www.pg.gda.pl/~jandac/daciuk98.ps.gz) on
2011-09-30. Retrieved 2009-05-28. "This paper presents a method for direct building of minimal
acyclic finite states automaton which recognizes a given finite list of words in lexicographical
order. Our approach is to construct a minimal automaton in a single phase by adding new strings
one by one and minimizing the resulting automaton on-the-fly" Alt URL (http://www.mitpressjourna
ls.org/doi/abs/10.1162/089120100561601)
19. Ulrich Germann; Eric Joanis; Samuel Larkin (2009). "Tightly packed tries: how to fit large models
into memory, and make them load fast, too" (http://www.aclweb.org/anthology/W/W09/W09-1505.
pdf) (PDF). ACL Workshops: Proceedings of the Workshop on Software Engineering, Testing, and
Quality Assurance for Natural Language Processing. Association for Computational Linguistics.
pp. 31–39. "We present Tightly Packed Tries (TPTs), a compact implementation of read-only,
compressed trie structures with fast on-demand paging and short load times. We demonstrate the
benefits of TPTs for storing n-gram back-off language models and phrase tables for statistical
machine translation. Encoded as TPTs, these databases require less space than flat text file
representations of the same data compressed with the gzip utility. At the same time, they can be
mapped into memory quickly and be searched directly in time linear in the length of the key,
without the need to decompress the entire file. The overhead for local decompression during
search is marginal."
20. Askitis, Nikolas; Zobel, Justin (2008). "B-tries for Disk-based String Management" (http://people.e
ng.unimelb.edu.au/jzobel/fulltext/vldbj09.pdf) (PDF). VLDB Journal: 1–26. ISSN 1066-8888 (https:
//www.worldcat.org/issn/1066-8888).
External links
NIST's Dictionary of Algorithms and Data Structures: Trie (https://xlinux.nist.gov/dads/HTML/trie.ht
ml)
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site,
you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a
non-profit organization.