diff options
Diffstat (limited to 'gcc/ada/g-pehage.ads')
-rw-r--r-- | gcc/ada/g-pehage.ads | 186 |
1 files changed, 186 insertions, 0 deletions
diff --git a/gcc/ada/g-pehage.ads b/gcc/ada/g-pehage.ads new file mode 100644 index 00000000000..3db2e70b71b --- /dev/null +++ b/gcc/ada/g-pehage.ads @@ -0,0 +1,186 @@ +------------------------------------------------------------------------------ +-- -- +-- GNAT COMPILER COMPONENTS -- +-- -- +-- G N A T . P E R F E C T _ H A S H . G E N E R A T O R S -- +-- -- +-- S p e c -- +-- -- +-- Copyright (C) 2002 Ada Core Technologies, Inc. -- +-- -- +-- GNAT is free software; you can redistribute it and/or modify it under -- +-- terms of the GNU General Public License as published by the Free Soft- -- +-- ware Foundation; either version 2, or (at your option) any later ver- -- +-- sion. GNAT is distributed in the hope that it will be useful, but WITH- -- +-- OUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY -- +-- or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License -- +-- for more details. You should have received a copy of the GNU General -- +-- Public License distributed with GNAT; see file COPYING. If not, write -- +-- to the Free Software Foundation, 59 Temple Place - Suite 330, Boston, -- +-- MA 02111-1307, USA. -- +-- -- +-- As a special exception, if other files instantiate generics from this -- +-- unit, or you link this unit with other files to produce an executable, -- +-- this unit does not by itself cause the resulting executable to be -- +-- covered by the GNU General Public License. This exception does not -- +-- however invalidate any other reasons why the executable file might be -- +-- covered by the GNU Public License. -- +-- -- +-- GNAT was originally developed by the GNAT team at New York University. -- +-- Extensive contributions were provided by Ada Core Technologies Inc. -- +-- -- +------------------------------------------------------------------------------ + +-- This package provides a single generator of static minimal perfect +-- hash functions. No collisions occur and each item can be retrieved +-- from the table in one probe (perfect property). The hash table +-- size corresponds to the exact size of W and *no larger* (minimal +-- property). The key set has to be know in advance (static +-- property). The hash functions are also order preservering. If w2 +-- is inserted after w1 in the generator, then f (w1) < f (w2). These +-- hashing functions are convenient for use with realtime applications. + +package GNAT.Perfect_Hash.Generators is + + Default_K_To_V : constant Float := 2.05; + -- Default ratio for the algorithm. When K is the number of keys, + -- V = (K_To_V) * K is the size of the main table of the hash function. + + Default_Pkg_Name : constant String := "Perfect_Hash"; + -- Default package name in which the hash function is defined. + + Default_Position : constant String := ""; + -- The generator allows selection of the character positions used + -- in the hash function. By default, all positions are selected. + + type Optimization is (Memory_Space, CPU_Time); + Default_Optimization : constant Optimization := CPU_Time; + -- Optimize either the memory space or the execution time. + + Verbose : Boolean := False; + + procedure Initialize + (Seed : Natural; + K_To_V : Float := Default_K_To_V; + Optim : Optimization := CPU_Time); + -- Initialize the generator and its internal structures. Set the + -- ratio of vertices over keys in the random graphs. This value + -- has to be greater than 2.0 in order for the algorithm to succeed. + + procedure Finalize; + -- Deallocate the internal structures. + + procedure Insert (Value : String); + -- Insert a new key in the table. + + procedure Compute (Position : String := Default_Position); + -- Compute the hash function. Position allows to define a + -- selection of character positions used in the keywords hash + -- function. Positions can be separated by commas and range like + -- x-y may be used. Character '$' represents the final character + -- of a key. With an empty position, the generator automatically + -- produces positions to reduce the memory usage. + + procedure Produce (Pkg_Name : String := Default_Pkg_Name); + -- Generate the hash function package Pkg_Name. This package + -- includes the minimal perfect Hash function. + + -- The routines and structures defined below allow producing the + -- hash function using a different way from the procedure above. + -- The procedure Define returns the lengths of an internal table + -- and its item type size. The function Value returns the value of + -- each item in the table. + + -- The hash function has the following form: + + -- h (w) = (g (f1 (w)) + g (f2 (w))) mod m + + -- G is a function based on a graph table [0,n-1] -> [0,m-1]. m is + -- the number of keys. n is an internally computed value and it + -- can be obtained as the length of vector G. + + -- F1 and F2 are two functions based on two function tables T1 and + -- T2. Their definition depends on the chosen optimization mode. + + -- Only some character positions are used in the keys because they + -- are significant. They are listed in a character position table + -- (P in the pseudo-code below). For instance, in {"jan", "feb", + -- "mar", "apr", "jun", "jul", "aug", "sep", "oct", "nov", "dec"}, + -- only positions 2 and 3 are significant (the first character can + -- be ignored). In this example, P = {2, 3} + + -- When Optimization is CPU_Time, the first dimension of T1 and T2 + -- corresponds to the character position in the key and the second + -- to the character set. As all the character set is not used, we + -- define a used character table which associates a distinct index + -- to each used character (unused characters are mapped to + -- zero). In this case, the second dimension of T1 and T2 is + -- reduced to the used character set (C in the pseudo-code + -- below). Therefore, the hash function has the following: + + -- function Hash (S : String) return Natural is + -- F : constant Natural := S'First - 1; + -- L : constant Natural := S'Length; + -- F1, F2 : Natural := 0; + -- J : <t>; + + -- begin + -- for K in P'Range loop + -- exit when L < P (K); + -- J := C (S (P (K) + F)); + -- F1 := (F1 + Natural (T1 (K, J))) mod <n>; + -- F2 := (F2 + Natural (T2 (K, J))) mod <n>; + -- end loop; + + -- return (Natural (G (F1)) + Natural (G (F2))) mod <m>; + -- end Hash; + + -- When Optimization is Memory_Space, the first dimension of T1 + -- and T2 corresponds to the character position in the key and the + -- second dimension is ignored. T1 and T2 are no longer matrices + -- but vectors. Therefore, the used character table is not + -- available. The hash function has the following form: + + -- function Hash (S : String) return Natural is + -- F : constant Natural := S'First - 1; + -- L : constant Natural := S'Length; + -- F1, F2 : Natural := 0; + -- J : <t>; + + -- begin + -- for K in P'Range loop + -- exit when L < P (K); + -- J := Character'Pos (S (P (K) + F)); + -- F1 := (F1 + Natural (T1 (K) * J)) mod <n>; + -- F2 := (F2 + Natural (T2 (K) * J)) mod <n>; + -- end loop; + + -- return (Natural (G (F1)) + Natural (G (F2))) mod <m>; + -- end Hash; + + type Table_Name is + (Character_Position, + Used_Character_Set, + Function_Table_1, + Function_Table_2, + Graph_Table); + + procedure Define + (Name : Table_Name; + Item_Size : out Natural; + Length_1 : out Natural; + Length_2 : out Natural); + -- Return the definition of the table Name. This includes the + -- length of dimensions 1 and 2 and the size of an unsigned + -- integer item. When Length_2 is zero, the table has only one + -- dimension. All the ranges start from zero. + + function Value + (Name : Table_Name; + J : Natural; + K : Natural := 0) + return Natural; + -- Return the value of the component (I, J) of the table + -- Name. When the table has only one dimension, J is ignored. + +end GNAT.Perfect_Hash.Generators; |