Transcript Document

CS 430: Information Discovery
Lecture 4
Data Structures for Information Retrieval
1
Course Administration
•
The Wednesday evening classes have been moved to
Hollister 110.
Introduction to Perl
•
Classes will be held on Wednesday evenings, September
19 and October 3.
•
Before the first class, look at the CS 430 web site and
attempt the (optional) Assignment 0.
(These classes and Assignment 0 are optional.)
2
Inverted Files: Search for Keywords
Index file: Stores list of terms (keywords).
Designed for rapid searching and processing range
queries. May be held in memory.
Postings file: Stores list of postings for each term.
Designed for rapid evaluation of Boolean
operators. May be stored sequentially.
Document file: [Repositories for the storage of
document collections are covered in CS 502.]
3
Index File Structures: Binary Tree
elk
cat
bee
ant
4
hog
dog
fox
gnu
Binary Tree
Advantages
Can be searched quickly
Convenient for batch updating
Easy to add an extra term
Economical use of storage
Disadvantages
Poor for sequential processing, e.g., comp*
Tree tends to become unbalanced
If the index is held on disk, important to optimize
the number of disk accesses
5
Binary Tree
Calculation of maximum depth of tree.
Worst case: depth = n
O(n)
Ideal case: depth = log(n + 1)/log 2
O(log n)
Illustrates importance of balanced trees.
6
Right Threaded Binary Tree
Threaded tree:
A binary search tree in which each node uses an
otherwise-empty left child link to refer to the node's inorder predecessor and an empty right child link to refer
to its in-order successor.
Right-threaded tree:
A variant of a threaded tree in which only the right
thread, i.e. link to the successor, of each node is
maintained.
Knuth vol 1, 2.3.1, page 325.
7
Right Threaded Binary Tree
From: Robert F. Rossa
8
B-trees
B-tree of order m:
A balanced, multiway search tree:
• Each node stores many keys
• Root has between 2 and 2m keys.
All other internal nodes have between m and 2m keys.
• If ki is the ith key in a given internal node
-> all keys in the (i-1)th child are smaller than ki
-> all keys in the ith child are bigger than ki
• All leaves are at the same depth
9
B+-tree
B+-tree:
• A B-tree is used as an index
• Data is stored in the leaves of the tree, known as buckets
50 65
10 25
... D9
55 59
D51 ... D54
70 81 90
D66...
Example: B+-tree of order 2, bucket size 4
10
D81 ...
B-tree Discussion
For a discussion of B-trees, see Frake, Section 2.3.1,
pages 18-20.
11
•
B-trees combine fast retrieval with moderately
efficient updating.
•
Bottom-up updating is usual fast, but may require
recursive tree climbing to the root.
•
The main weakness is poor storage utilization;
typically buckets are only 0.69 full.
•
Various algorithmic improvements increase storage
utilization at the expense of updating performance.
Signature Files: Sequential Search
without Inverted File
Inexact filter: A quick test which discards many of the
non-qualifying items.
Advantages
• Much faster than full text scanning -- 1 or 2 orders
of magnitude
• Modest space overhead -- 10% to 15% of file
• Insertion is straightforward
Disadvantages
• Sequential searching no good for very large files
• Some hits are false hits
12
Signature Files
Signature size. Number of bits in a signature, F.
Word signature. A bit pattern of size F with m bits set
to 1 and the others 0.
The word signature is calculated by a hash function.
Block. A sequence of text that contains D distinct
words.
Block signature. The logical OR of all the word
signatures in a block of text.
13
Signature Files
Example
Word
Signature
free
text
001 000 110 010
000 010 101 001
block signature
001 010 111 011
F = 12 bits in a signature
m = 4 bits per word
D = 2 words per block
14
Signature Files
A query term is processed by matching its signature
against the block signature.
(a) If the term is in the block, its word signature will
always match the block signature.
(b) A word signature may match the block signature,
but the word is not in the block. This is a false hit.
The design challenge is to minimize the false drop
probability, Fd .
Frake, Section 4.2, page 47 discussed how to minimize
Fd. The rest of this chapter discusses enhancements to
the basic algorithm.
15
Search for Substring
In some information retrieval applications, any substring can
be a search term.
Tries, implemented using suffix trees, provide
lexicographical indexes for all the substrings in a document
or set of documents.
16
Tries: Search for Substring
Basic concept
The text is divided into unique semi-infinite strings, or
sistrings. Each sistring has a starting position in the text,
and continues to the right until it is unique.
The sistrings are stored in (the leaves of) a tree, the suffix
tree. Common parts are stored only once.
Each sistring can be associated with a location within a
document where the sistring occurs. Subtrees below a
certain node represent all occurrences of the substring
represented by that node.
Suffix trees have a size of the same order of magnitude as
the input documents.
17
Tries: Suffix Tree
Example: suffix tree for the
following words:
begin
beginning
between
bread
break
b
e
gin
_
18
rea
tween
ning
d
k
Tries: Sistrings
A binary example
String:
Sistrings:
19
01 100 100 010 111
1
2
3
4
5
6
7
8
01 100 100 010 111
11 001 000 101 11
10 010 001 011 1
00 100 010 111
01 000 101 11
10 001 011 1
00 010 111
00 101 11
Tries: Lexical Ordering
7
4
8
5
1
6
3
2
00 010 111
00 100 010 111
00 101 11
01 000 101 11
01 100 100 010 111
10 001 011 1
10 010 001 011 1
11 001 000 101 11
Unique string indicated in blue
20
Trie: Basic Concept
1
0
0
1
1
0
2
0
1
7
0
1
5
1
0
0
0
0
4
21
6
1
8
1
3
Patricia Tree
1
0
2
0
7
0
4
2 1
1
3
0
1
10
0
5
5
00
3
4
1
1
0
2
1
6
1
8
Single-descendant nodes are eliminated.
Nodes have bit number.
22
3
Oxford English Dictionary
23