Chapter 4. Sorting Algorithms
Numerous computations and tasks become simple by properly sorting information in advance. The search for efficient sorting algorithms dominated the early days of computing. Indeed, much of the early research in algorithms focused on sorting collections of data that were too large for the computers of the day to store in memory. Because today’s computers are so much more powerful than the ones of 50 years ago, the size of the data sets being processed is now on the order of terabytes of information. Although you may not be called on to sort such huge data sets, you will likely need to sort large numbers of items. In this chapter, we cover the most important sorting algorithms and present results from our benchmarks to help you select the best sorting algorithm to use in each situation.
Terminology
A collection of comparable elements A is presented to be sorted in place; we use the notations A[i] and a_{i} to refer to the i^{th} element of the collection. By convention, the first element in the collection is A[0]. We use A[low, low + n) to refer to the subcollection A[low] … A[low + n − 1] of n elements, whereas A[low, low + n] contains n + 1 elements.
To sort a collection, you must reorganize the elements A such that if A[i] < A[j], then i < j. If there are duplicate elements, these elements must be contiguous in the resulting ordered collection—that is, if A[i] = A[j] in a sorted collection, then there can be no k such that i < k < j and A[i] ≠ A[k]. Finally, the sorted collection A must be a permutation of the elements that originally formed A.
Representation
The collection may already be stored in the computer’s random access memory (RAM), but it might simply exist in a file on the filesystem, known as secondary storage. The collection may be archived in part on tertiary storage (such as tape libraries and optical jukeboxes), which may require extra processing time just to locate the information; in addition, the information may need to be copied to secondary storage (such as hard disk drives) before it can be processed.
Information stored in RAM typically takes one of two forms: pointerbased or valuebased. Assume we want to sort the strings “eagle,” “cat,” “ant,” “dog,” and “ball.” Using pointerbased storage, shown in Figure 41, an array of information (i.e., the contiguous boxes) contains pointers to the actual information (i.e., the strings in ovals) rather than storing the information itself. Such an approach enables arbitrarily complex records to be stored and sorted.
By contrast, valuebased storage packs a collection of n elements into record blocks of a fixed size, s, which is better suited for secondary or tertiary storage. Figure 42 shows how to store the same information shown in Figure 41 using a contiguous block of storage containing a set of rows of exactly s = 5 bytes each. In this example, the information is shown as strings, but it could be any collection of structured, recordbased information. The “¬” character represents a padding character that cannot be part of any string; in this encoding, strings of length s need no padding character. The information is contiguous and can be viewed as a onedimensional array B[0, n*s). Note that B[r*s + c] is the c^{th} letter of the r^{th} word (where c ≥ 0 and r ≥ 0); also, the i^{th} element of the collection (for i ≥ 0) is the subarray B[i*s,(i + 1)*s).
Information is usually written to secondary storage as a valuebased contiguous collection of bytes. The algorithms in this chapter can also be written to work with diskbased information simply by implementing swap functions that transpose bytes within the files on disk; however, the resulting performance will differ because of the increased input/output costs in accessing secondary storage. Merge Sort is particularly wellsuited for sorting data in secondary storage.
Whether pointerbased or valuebased, a sorting algorithm updates the information (in both cases, the boxes) so that A[0, n) is ordered. For convenience, we use the A[i] notation to represent the i^{th} element, even when valuebased storage is being used.
Comparable Elements
The elements in the collection being compared must admit a total ordering. That is, for any two elements p and q in a collection, exactly one of the following three predicates is true: p = q, p < q, or p > q. Commonly sorted primitive types include integers, floatingpoint values, and characters. When composite elements are sorted (such as strings of characters), lexicographical ordering is imposed on each individual element of the composite, thus reducing a complex sort into individual sorts on primitive types. For example, the word “alphabet” is considered to be less than “alternate” but greater than “alligator” by comparing each individual letter, from left to right, until a word runs out of characters or an individual character in one word is different from its partner in the other word (thus “ant” is less than “anthem”).
This question of ordering is far from simple when considering capitalization (is “A” greater than “a”?), diacritical marks (is “è” less than “ê”?), and diphthongs (is “æ” less than “a”?). Note that the powerful Unicode standard uses encodings, such as UTF16, to represent each individual character using up to four bytes. The Unicode Consortium has developed a sorting standard (known as “the collation algorithm”) that handles the wide variety of ordering rules found in different languages and cultures (Davis and Whistler, 2008).
The algorithms presented in this chapter assume you can provide
a comparator function, cmp
, which compares element p to
q and returns 0 if p = q, a negative number if p < q, and a
positive number if p > q. If the elements are complex records,
the cmp
function might only compare a “key” value of the
elements. For example, an airport terminal might list
outbound flights in ascending order of destination city or
departure time while flight numbers appear to be unordered.
Stable Sorting
When the comparator function cmp
determines that two elements, a_{i}
and a_{j}, in the original unordered collection are equal, it may
be important to maintain their relative ordering in the sorted set—that is, if i < j, then the final location for a_{i} must be
to the left of the final location for a_{j}. Sorting algorithms
that guarantee this property are considered to be stable. For
example, the left four columns of Table 41 show an original collection of flight information already
sorted by time of flight during the day (regardless of airline or
destination city). If a stable sort orders this collection using a comparator
function that orders flights by destination city,
the only possible result is shown in the right four columns of
Table 41.
Destination  Airline  Flight  Departure Time (Ascending)  →  Destination (Ascending)  Airline  Flight  Departure Time 

Buffalo 
Air Trans 
549 
10:42 AM 
Albany 
Southwest 
482 
1:20 PM 

Atlanta 
Delta 
1097 
11:00 AM 
Atlanta 
Delta 
1097 
11:00 AM 

Baltimore 
Southwest 
836 
11:05 AM 
Atlanta 
Air Trans 
872 
11:15 AM 

Atlanta 
Air Trans 
872 
11:15 AM 
Atlanta 
Delta 
28 
12:00 PM 

Atlanta 
Delta 
28 
12:00 PM 
Atlanta 
Al Italia 
3429 
1:50 PM 

Boston 
Delta 
1056 
12:05 PM 
Austin 
Southwest 
1045 
1:05 PM 

Baltimore 
Southwest 
216 
12:20 PM 
Baltimore 
Southwest 
836 
11:05 AM 

Austin 
Southwest 
1045 
1:05 PM 
Baltimore 
Southwest 
216 
12:20 PM 

Albany 
Southwest 
482 
1:20 PM 
Baltimore 
Southwest 
272 
1:40 PM 

Boston 
Air Trans 
515 
1:21 PM 
Boston 
Delta 
1056 
12:05 PM 

Baltimore 
Southwest 
272 
1:40 PM 
Boston 
Air Trans 
515 
1:21 PM 

Atlanta 
Al Italia 
3429 
1:50 PM 
Buffalo 
Air Trans 
549 
10:42 AM 
You will note that all flights that have the same destination city are also sorted by their scheduled departure time; thus, the sort algorithm exhibited stability on this collection. An unstable algorithm pays no attention to the relationships between element locations in the original collection (it might maintain relative ordering, but it also might not).
Criteria for Choosing a Sorting Algorithm
To choose the sorting algorithm to use or implement, consider the qualitative criteria in Table 42.
Criteria  Sorting algorithm 

Only a few items 
Insertion Sort 
Items are mostly sorted already 
Insertion Sort 
Concerned about worstcase scenarios 
Heap Sort 
Interested in a good averagecase behavior 
Quicksort 
Items are drawn from a uniform dense universe 
Bucket Sort 
Desire to write as little code as possible 
Insertion Sort 
Require stable sort 
Merge Sort 
Transposition Sorting
Early sorting algorithms found elements in the collection A that were out of place and moved them into their proper position by transposing (or swapping) elements in A. Selection Sort and (the infamous) Bubble Sort belong to this sorting family. But these algorithms are outperformed by Insertion Sort, which we now present.
Insertion Sort
Insertion Sort repeatedly invokes an insert
helper function to
ensure A[0, i] is properly sorted; eventually, i reaches the
rightmost element, sorting A entirely.
Figure 43 shows how Insertion Sort operates on an unordered collection A of size n = 16. The 15 rows that follow depict the state of A after each invocation of insert.
A is sorted in place by incrementing pos = 1 up to n − 1 and inserting the element A[pos] into its rightful position in the growing sorted region A[0, pos], demarcated on the right by a bold vertical line. The elements shaded in gray were shifted to the right to make way for the inserted element; in total, Insertion Sort executed 60 neighboring transpositions (a movement of just one place by an element).
Context
Use Insertion Sort when you have a small number of elements to sort or the elements in the initial collection are already “nearly sorted.” Determining when the array is “small enough” varies from one machine to another and by programming language. Indeed, even the type of element being compared may be significant.
Solution
When the information is stored using pointers, the C program in
Example 41 sorts an
array ar
of items that can be compared using a comparison
function, cmp
.
Example 41. Insertion Sort with pointerbased values
void
sortPointers
(
void
**
ar
,
int
n
,
int
(
*
cmp
)(
const
void
*
,
const
void
*
))
{
int
j
;
for
(
j
=
1
;
j
<
n
;
j
++
)
{
int
i
=
j

1
;
void
*
value
=
ar
[
j
];
while
(
i
>=
0
&&
cmp
(
ar
[
i
],
value
)
>
0
)
{
ar
[
i
+
1
]
=
ar
[
i
];
i

;
}
ar
[
i
+
1
]
=
value
;
}
}
When A is represented using valuebased storage, it is packed into
n rows of a fixed element size of s bytes. Manipulating the values
requires a comparison function as well as the means to copy values
from one location to
another. Example 42 shows
a suitable C program that uses memmove
to transfer the underlying
bytes efficiently for a set of contiguous entries in A.
Example 42. Insertion Sort using valuebased information
void
sortValues
(
void
*
base
,
int
n
,
int
s
,
int
(
*
cmp
)(
const
void
*
,
const
void
*
))
{
int
j
;
void
*
saved
=
malloc
(
s
);
for
(
j
=
1
;
j
<
n
;
j
++
)
{
int
i
=
j

1
;
void
*
value
=
base
+
j
*
s
;
while
(
i
>=
0
&&
cmp
(
base
+
i
*
s
,
value
)
>
0
)
{
i

;
}
/* If already in place, no movement needed. Otherwise save value
* to be inserted and move intervening values as a LARGE block.
* Then insert into proper position. */
if
(
++
i
==
j
)
continue
;
memmove
(
saved
,
value
,
s
);
memmove
(
base
+
(
i
+
1
)
*
s
,
base
+
i
*
s
,
s
*
(
j

i
));
memmove
(
base
+
i
*
s
,
saved
,
s
);
}
free
(
saved
);
}
The optimal performance occurs when the array is already sorted, and arrays sorted in reverse order produce the worst performance for Insertion Sort. If the array is already mostly sorted, Insertion Sort does well because there is less need to transpose elements.
Insertion Sort requires very little extra space to function; it only needs to reserve space for a single element. For valuebased representations, most language libraries offer a block memory move function to make transpositions more efficient.
Analysis
In the best case, each of the n items is in its proper place and thus Insertion Sort takes linear time, or O(n). This may seem to be a trivial point to raise (how often are you going to sort a set of already sorted elements?), but it is important because Insertion Sort is the only comparisonbased sorting algorithm that has this bestcase behavior.
Much realworld data is already partially sorted, so optimism and realism might coincide to make Insertion Sort an effective algorithm to use. The efficiency of Insertion Sort increases when duplicate items are present, since there are fewer swaps to perform.
Unfortunately, Insertion Sort is too conservative when all n items are distinct and the array is
randomly organized (i.e., all permutations of the data are equally likely) because each
item starts on average n/3 positions in the array from its final
position. The program numTranspositions.c
in the code repository empirically validates this claim for small n
up to 12 (also see Trivedi, 2001). In the average and worst
case, each of the n items must be transposed a linear number of
positions, thus Insertion Sort requires O(n^{2}) quadratic time.
Insertion Sort operates inefficiently for valuebased data because of the amount of memory that must be shifted to make room for a new value. Table 43 contains direct comparisons between a naïve implementation of valuebased Insertion Sort and the implementation from Example 42. Ten random trials of sorting n elements were conducted, and the best and worst results were discarded. This table shows the average of the remaining eight runs. Note how the implementation improves by using a block memory move rather than individual memory swapping. Still, as the array size doubles, the performance time approximately quadruples, validating the O(n^{2}) behavior of Insertion Sort. Even with the bulk move improvement, Insertion Sort still remains quadratic.
n  Insertion Sort bulk move (B_{n}) 
Naïve Insertion Sort (S_{n}) 

1,024 
0.0039 
0.0130 
2,048 
0.0153 
0.0516 
4,096 
0.0612 
0.2047 
8,192 
0.2473 
0.8160 
16,384 
0.9913 
3.2575 
32,768 
3.9549 
13.0650 
65,536 
15.8722 
52.2913 
131,072 
68.4009 
209.2943 
When Insertion Sort operates over pointerbased input, swapping elements is more efficient; the compiler can even generate optimized code to minimize costly memory accesses.
Selection Sort
One common sorting strategy is to select the largest value from the range A[0, n) and swap its location with the rightmost element A[n – 1]. This process is repeated, subsequently, on each successive smaller range A[0, n – 1) until A is sorted. We discussed Selection Sort in Chapter 3 as an example of a Greedy approach. Example 43 contains a C implementation.
Example 43. Selection Sort implementation in C
static
int
selectMax
(
void
**
ar
,
int
left
,
int
right
,
int
(
*
cmp
)(
const
void
*
,
const
void
*
))
{
int
maxPos
=
left
;
int
i
=
left
;
while
(
++
i
<=
right
)
{
if
(
cmp
(
ar
[
i
],
ar
[
maxPos
])
>
0
)
{
maxPos
=
i
;
}
}
return
maxPos
;
}
void
sortPointers
(
void
**
ar
,
int
n
,
int
(
*
cmp
)(
const
void
*
,
const
void
*
))
{
/* repeatedly select max in ar[0,i] and swap with proper position */
int
i
;
for
(
i
=
n

1
;
i
>=
1
;
i

)
{
int
maxPos
=
selectMax
(
ar
,
0
,
i
,
cmp
);
if
(
maxPos
!=
i
)
{
void
*
tmp
=
ar
[
i
];
ar
[
i
]
=
ar
[
maxPos
];
ar
[
maxPos
]
=
tmp
;
}
}
}
Selection Sort is the slowest of all the sorting algorithms described in this chapter; it requires quadratic time even in the best case (i.e., when the array is already sorted). It repeatedly performs almost the same task without learning anything from one iteration to the next. Selecting the largest element, max, in A takes n – 1 comparisons, and selecting the second largest element, second, takes n – 2 comparisons—not much progress! Many of these comparisons are wasted, because if an element is smaller than second, it can’t possibly be the largest element and therefore has no impact on the computation for max. Instead of presenting more details on this poorly performing algorithm, we now consider Heap Sort, which shows how to more effectively apply the principle behind Selection Sort.
Heap Sort
We always need at least n − 1 comparisons to find the largest element in an unordered array A of n elements, but can we minimize the number of elements that are compared directly? For example, sports tournaments find the “best” team from a field of n teams without forcing the ultimate winner to play all other n − 1 teams. One of the most popular basketball events in the United States is the NCAA championship tournament, where essentially a set of 64 college teams compete for the national title. The ultimate champion team plays five teams before reaching the final determining game, and so that team must win six games. It is no coincidence that 6 = log (64). Heap Sort shows how to apply this behavior to sort a set of elements.
Figure 44 shows the execution of buildHeap
on an array of six values.
A heap is a binary tree whose structure ensures two properties:
 Shape property

A leaf node at depth k > 0 can exist only if all 2^{k−1} nodes at depth k − 1 exist. Additionally, nodes at a partially filled level must be added “from left to right.” The root node has a depth of 0.
 Heap property

Each node in the tree contains a value greater than or equal to either of its two children, if it has any.
The sample heap in Figure 45(a) satisfies these properties. The root of the binary tree contains the largest element in the tree; however, the smallest element can be found in any leaf node. Although a heap only ensures a node is greater than either of its children, Heap Sort shows how to take advantage of the shape property to efficiently sort an array of elements.
Given the rigid structure imposed by the shape property, a heap can be stored in an array A without losing any of its structural information. Figure 45(b) shows an integer label assigned to each node in the heap. The root is labeled 0. For a node with label i, its left child (should it exist) is labeled 2*i + 1; its right child (should it exist) is labeled 2*i + 2. Similarly, for a nonroot node labeled i, its parent node is labeled ⌊(i – 1)/2⌋. Using this labeling scheme, we can store the heap in an array by storing the element value for a node in the array position identified by the node’s label. The array shown in Figure 45(c) represents the heap shown in Figure 45(a). The order of the elements within A can be simply read from left to right as deeper levels of the tree are explored.
Heap Sort sorts an array, A, by first converting that array in place into a heap using buildHeap
which makes repeated calls to heapify
. heapify(A, i, n)
updates the array, A, to ensure that the tree structure rooted at A[i] is a valid heap. Figure 46 shows details of the invocations of heapify that convert an unordered array into a heap. The progress of buildHeap
on an already sorted array is shown in Figure 46. Each numbered row in this figure shows the result of executing heapify
on the initial array from the midway point of ⌊(n/2)⌋ − 1 down to the leftmost index 0.
As you can see, large numbers are eventually “lifted up” in the resulting heap (which means they are swapped in A with smaller elements to the left). The grayed squares in Figure 46 depict the element pairs swapped in heapify
—a total of 13—which is far fewer than the total number of elements swapped in Insertion Sort as depicted in Figure 43.
Heap Sort processes an array A of size n by treating it as two distinct subarrays, A[0, m) and A[m, n), which represent a heap of size m and a sorted subarray of n – m elements, respectively. As i iterates from n − 1 down to 1, Heap Sort grows the sorted subarray A[i, n) downward by swapping the largest element in the heap (at position A[0]) with A[i]; it then reconstructs A[0, i) to be a valid heap by executing heapify
. The resulting nonempty subarray A[i, n) will be sorted because the largest element in the heap represented in A[0, i) is guaranteed to be smaller than or equal to any element in the sorted subarray A[i, n).
Context
Heap Sort is not a stable sort. Heap Sort avoids many of the nasty (almost embarrassing!) cases that cause Quicksort to perform badly. Nonetheless, in the average case, Quicksort outperforms Heap Sort.
Solution
A sample implementation in C is shown in Example 44.
Example 44. Heap Sort implementation in C
static
void
heapify
(
void
**
ar
,
int
(
*
cmp
)(
const
void
*
,
const
void
*
),
int
idx
,
int
max
)
{
int
left
=
2
*
idx
+
1
;
int
right
=
2
*
idx
+
2
;
int
largest
;
/* Find largest element of A[idx], A[left], and A[right]. */
if
(
left
<
max
&&
cmp
(
ar
[
left
],
ar
[
idx
])
>
0
)
{
largest
=
left
;
}
else
{
largest
=
idx
;
}
if
(
right
<
max
&&
cmp
(
ar
[
right
],
ar
[
largest
])
>
0
)
{
largest
=
right
;
}
/* If largest is not already the parent then swap and propagate. */
if
(
largest
!=
idx
)
{
void
*
tmp
;
tmp
=
ar
[
idx
];
ar
[
idx
]
=
ar
[
largest
];
ar
[
largest
]
=
tmp
;
heapify
(
ar
,
cmp
,
largest
,
max
);
}
}
static
void
buildHeap
(
void
**
ar
,
int
(
*
cmp
)(
const
void
*
,
const
void
*
),
int
n
)
{
int
i
;
for
(
i
=
n
/
2

1
;
i
>=
0
;
i

)
{
heapify
(
ar
,
cmp
,
i
,
n
);
}
}
void
sortPointers
(
void
**
ar
,
int
n
,
int
(
*
cmp
)(
const
void
*
,
const
void
*
))
{
int
i
;
buildHeap
(
ar
,
cmp
,
n
);
for
(
i
=
n

1
;
i
>=
1
;
i

)
{
void
*
tmp
;
tmp
=
ar
[
0
];
ar
[
0
]
=
ar
[
i
];
ar
[
i
]
=
tmp
;
heapify
(
ar
,
cmp
,
0
,
i
);
}
}
Analysis
heapify
is the central operation in Heap Sort. In buildHeap
, it is
called ⌊(n/2)⌋ − 1 times, and during the actual sort it is called n − 1 times, for a total of ⌊(3*n/2)⌋ − 2 times. Because of the shape property, the depth of the heap will always be ⌊ log n ⌋ where n is the number of elements in the heap. As you can see, it is a recursive operation with no more than log n recursive calls until the heap is corrected or the end of the heap is reached. However, heapify
will stop prematurely once the heap is corrected; as it turns out, no more than 2*n comparisons are needed in total (Cormen et al., 2009), which means that buildHeap
behaves in linear time or O(n).
Variations
The code repository contains a nonrecursive Heap Sort implementation and Table 44 presents a benchmark comparison of running 1,000 randomized trials of both implementations, discarding the best and worst performances of each.
n  Nonrecursive Heap Sort 
Recursive Heap Sort 

16,384 
0.0048 
0.0064 
32,768 
0.0113 
0.0147 
65,536 
0.0263 
0.0336 
131,072 
0.0762 
0.0893 
262,144 
0.2586 
0.2824 
524,288 
0.7251 
0.7736 
1,048,576 
1.8603 
1.9582 
2,097,152 
4.566 
4.7426 
At first, there is a noticeable improvement in eliminating recursion in Heap Sort, but this difference reduces as n increases.
PartitionBased Sorting
A Divide and Conquer strategy solves a problem by dividing it into two independent subproblems, each about half the size of the original problem. You can apply this strategy to sorting as follows: find the median element in the collection A and swap it with the middle element of A. Now swap elements in the left half that are greater than A[mid] with elements in the right half that are less than or equal to A[mid]. This subdivides the original array into two distinct subarrays that can be recursively sorted in place to sort the original collection A.
Implementing this approach is challenging because it might not be obvious how to compute the median element of a collection without sorting the collection first! It turns out that you can use any element in A to partition A into two subarrays; if you choose “wisely” each time, then both subarrays will be more or less the same size and you will achieve an efficient implementation.
Assume there is a function p = partition (A, left, right, pivotIndex) that uses a special pivot value in A, A[pivotIndex], to modify A and return the location p in A such that:

A[p] = pivot

All elements in A[left, p) are less than or equal to pivot

All elements in A[p + 1, right] are greater than pivot
If you are lucky, when partition completes, the size of these two subarrays are more or less half the size of the original collection. Example 45 shows a C implementation of partition
.
Example 45. C implementation to partition ar[left,right] around a given pivot element
/**
* In linear time, group the subarray ar[left, right] around a pivot
* element pivot=ar[pivotIndex] by storing pivot into its proper
* location, store, within the subarray (whose location is returned
* by this function) and ensuring all ar[left,store) <= pivot and
* all ar[store+1,right] > pivot.
*/
int
partition
(
void
**
ar
,
int
(
*
cmp
)(
const
void
*
,
const
void
*
),
int
left
,
int
right
,
int
pivotIndex
)
{
int
idx
,
store
;
void
*
pivot
=
ar
[
pivotIndex
];
/* move pivot to the end of the array */
void
*
tmp
=
ar
[
right
];
ar
[
right
]
=
ar
[
pivotIndex
];
ar
[
pivotIndex
]
=
tmp
;
/* all values <= pivot are moved to front of array and pivot inserted
* just after them. */
store
=
left
;
for
(
idx
=
left
;
idx
<
right
;
idx
++
)
{
if
(
cmp
(
ar
[
idx
],
pivot
)
<=
0
)
{
tmp
=
ar
[
idx
];
ar
[
idx
]
=
ar
[
store
];
ar
[
store
]
=
tmp
;
store
++
;
}
}
tmp
=
ar
[
right
];
ar
[
right
]
=
ar
[
store
];
ar
[
store
]
=
tmp
;
return
store
;
}
The Quicksort algorithm, introduced by C. A. R. Hoare in 1960, selects an element in the collection (sometimes randomly, sometimes the leftmost, sometimes the middle one) to partition an array into two subarrays. Thus, Quicksort has two steps. First, the array is partitioned and then each subarray is recursively sorted.
This pseudocode intentionally doesn’t specify the strategy for selecting the pivot index. In the associated code, we assume there is a selectPivotIndex
function that selects an appropriate index. We do not cover here the advanced mathematical analytic tools needed to prove that Quicksort offers O(n log n) average behavior; further details on this topic are available in Cormen (2009).
Figure 47 shows Quicksort in action. Each of the black squares represents a pivot selection. The first pivot selected is “2,” which turns out to be a poor choice since it produces two subarrays of size 1 and size 14. During the next recursive invocation of Quicksort on the right subarray, “12” is selected to be the pivot (shown in the fourth row down), which produces two subarrays of size 9 and 4, respectively. Already you can see the benefit of using partition since the last four elements in the array are, in fact, the largest four elements, although they are still unordered. Because of the random nature of the pivot selection, different behaviors are possible. In a different execution, shown in Figure 48, the first selected pivot nicely subdivides the problem into two more or less comparable tasks.
Context
Quicksort exhibits worstcase quadratic behavior if the partitioning at each recursive step only divides a collection of n elements into an “empty” and “large” set, where one of these sets has no elements and the other has n − 1 (note that the pivot element provides the last of the n elements, so no element is lost).
Solution
The Quicksort implementation shown in Example 46 includes standard optimization to use Insertion Sort when the size of the subarray to be sorted falls below a predetermined minimum size.
Example 46. Quicksort implementation in C
/**
* Sort array ar[left,right] using Quicksort method.
* The comparison function, cmp, is needed to properly compare elements.
*/
void
do_qsort
(
void
**
ar
,
int
(
*
cmp
)(
const
void
*
,
const
void
*
),
int
left
,
int
right
)
{
int
pivotIndex
;
if
(
right
<=
left
)
{
return
;
}
/* partition */
pivotIndex
=
selectPivotIndex
(
ar
,
left
,
right
);
pivotIndex
=
partition
(
ar
,
cmp
,
left
,
right
,
pivotIndex
);
if
(
pivotIndex

1

left
<=
minSize
)
{
insertion
(
ar
,
cmp
,
left
,
pivotIndex

1
);
}
else
{
do_qsort
(
ar
,
cmp
,
left
,
pivotIndex

1
);
}
if
(
right

pivotIndex

1
<=
minSize
)
{
insertion
(
ar
,
cmp
,
pivotIndex
+
1
,
right
);
}
else
{
do_qsort
(
ar
,
cmp
,
pivotIndex
+
1
,
right
);
}
}
/** Qsort straight */
void
sortPointers
(
void
**
vals
,
int
total_elems
,
int
(
*
cmp
)(
const
void
*
,
const
void
*
))
{
do_qsort
(
vals
,
cmp
,
0
,
total_elems

1
);
}
The external method selectPivotIndex(ar
, left
, right)
chooses the pivot value on which to partition the array.
Analysis
Surprisingly, using a random element as pivot enables Quicksort to provide an averagecase performance that usually outperforms other sorting algorithms. In addition, there are numerous enhancements and optimizations researched for Quicksort that have achieved the most efficiency out of any sorting algorithm.
In the ideal case, partition
divides the original array in half and Quicksort exhibits O(n log n) performance. In practice, Quicksort is effective with a randomly selected pivot.
In the worst case, the largest or smallest item is picked as the pivot. When this happens, Quicksort makes a pass over all elements in the array (in linear time) to sort just a single item in the array. If this process is repeated n − 1 times, it will result in O(n^{2}) worstcase behavior.
Variations
Quicksort is the sorting method of choice on most systems. On Unixbased systems, there is a builtin library function called qsort
. Often, the operating system uses optimized versions of the default Quicksort algorithm. Two of the commonly cited sources for optimizations are by Sedgewick (1978) and Bentley and McIlroy (1993). It is instructive that some versions of the Linux operating system implement qsort
using Heap Sort.
Various optimizations include:

Create a stack that stores the subtasks to be processed to eliminate recursion

Choose the pivot based on medianofthree strategy

Set the minimum partition size below which to use Insertion Sort instead which varies by implementation and machine architecture; in JDK 1.8, the threshold value is set to 7

When processing the two subproblems, minimize the total size of the recursive stack by solving the smaller subproblem first
However, none of these optimizations will eliminate the O(n^{2}) worstcase behavior of Quicksort. The only way to ensure an O(n log n) worstcase performance is to use a partition function that can guarantee it finds a “reasonable approximation” to the actual median of that set. The BlumFloydPrattRivestTarjan (BFPRT) partition algorithm (Blum et al., 1973) is a provably linear time algorithm, but it has only theoretical value. An implementation of BFPRT is provided with the code repository.
Picking a pivot
Selecting the pivot element from a subarray A[left, left + n) must be an efficient operation; it shouldn’t require checking all n elements of the subarray. Some alternatives are:

Select first or last: A[left] or A[left + n − 1]

Select random element in A[left, left + n − 1]

Select medianofk: the middle value of k elements taken from A[left, left + n − 1]
Often one chooses medianofthree; Sedgewick reports that this approach returns an improvement of 5%, but note that some arrangements of data will force even this alternative into subpar performance (Musser, 1997). A medianoffive pivot selection has also been used. Performing further computation to identify the proper pivot rarely provides beneficial results because of the extra computational costs.
Processing the partition
In the partition
method shown in Example 45, elements less than or equal to the selected pivot are inserted toward the front of the subarray. This approach might skew the size of the subarrays for the recursive step if the selected pivot has many duplicate elements in the array. One way to reduce the imbalance is to place elements equal to the pivot alternatively in the first and second subarrays.
Processing subarrays
Quicksort yields two recursive invocations of Quicksort on smaller subarrays. While processing one, the activation record of the other is pushed onto the execution stack. If the larger subarray is processed first, it is possible to have a linear number of activation records on the stack at the same time (although modern compilers may eliminate this observed overhead). To minimize the possible depth of the stack, process the smaller subarray first. If the depth of the recursion is a foreseeable issue, then perhaps Quicksort is not appropriate for your application.
Using simpler insertion sort technique for small subarrays
On small arrays, Insertion Sort is faster than Quicksort, but even when used on large arrays, Quicksort ultimately decomposes the problem to require numerous small subarrays to be sorted. One commonly used technique to improve the recursive performance of Quicksort is to invoke Quicksort for large subarrays only, and use Insertion Sort for small ones, as shown in Example 46.
Sedgewick (1978) suggests that a combination of medianofthree and using Insertion Sort for small subarrays offers a speedup of 20%–25% over pure Quicksort.
IntroSort
Switching to Insertion Sort for small subarrays is a local decision that is made based upon the size of the subarray. Musser (1997) introduced a Quicksort variation called IntroSort, which monitors the recursive depth of Quicksort to ensure efficient processing. If the depth of the Quicksort recursion exceeds log (n) levels, then IntroSort switches to Heap Sort. The SGI implementation of the C++ Standard Template Library uses IntroSort as its default sorting mechanism.
Sorting without Comparisons
At the end of this chapter, we will show that no comparisonbased sorting algorithm can sort n elements in better than O(n log n) performance. Surprisingly, there are potentially faster ways to sort elements if you know something about those elements in advance. For example, if you have a fast hashing function that uniformly partitions a collection of elements into distinct, ordered buckets, you can use the following Bucket Sort algorithm for linear O(n) performance.
Bucket Sort
Given a set of n elements, Bucket Sort constructs a set of n ordered buckets into which the elements of the input set are partitioned; Bucket Sort reduces its processing costs at the expense of this extra space. If a hash function, hash
(A[i]), can uniformly partition the input set of n elements into these n buckets, Bucket Sort can sort, in the worst case, in O(n) time. Use Bucket Sort when the following two properties hold:
 Uniform distribution

The input data must be uniformly distributed for a given range. Based on this distribution, n buckets are created to evenly partition the input range.
 Ordered hash function

The buckets are ordered. If i < j, elements inserted into bucket b_{i} are lexicographically smaller than elements in bucket b_{j}.
Bucket Sort is not appropriate for sorting arbitrary strings, for example, because typically it is impossible to develop a hash function with the required characteristics. However, it could be used to sort a set of uniformly distributed floatingpoint numbers in the range [0, 1).
Once all elements to be sorted are inserted into the buckets, Bucket Sort extracts the values from left to right using Insertion Sort on the contents of each bucket. This orders the elements in each respective bucket as the values from the buckets are extracted from left to right to repopulate the original array. An example execution is shown in Figure 49.
Solution
In the C implementation for Bucket Sort, shown in Example 47, each bucket stores a linked list of elements that were hashed to that bucket. The functions numBuckets
and hash
are provided externally, based upon the input set.
Example 47. Bucket Sort implementation in C
extern
int
hash
(
void
*
elt
);
extern
int
numBuckets
(
int
numElements
);
/* linked list of elements in bucket. */
typedef
struct
entry
{
void
*
element
;
struct
entry
*
next
;
}
ENTRY
;
/* maintain count of entries in each bucket and pointer to its first entry */
typedef
struct
{
int
size
;
ENTRY
*
head
;
}
BUCKET
;
/* Allocation of buckets and the number of buckets allocated */
static
BUCKET
*
buckets
=
0
;
static
int
num
=
0
;
/** One by one remove and overwrite ar */
void
extract
(
BUCKET
*
buckets
,
int
(
*
cmp
)(
const
void
*
,
const
void
*
),
void
**
ar
,
int
n
)
{
int
i
,
low
;
int
idx
=
0
;
for
(
i
=
0
;
i
<
num
;
i
++
)
{
ENTRY
*
ptr
,
*
tmp
;
if
(
buckets
[
i
].
size
==
0
)
continue
;
/* empty bucket */
ptr
=
buckets
[
i
].
head
;
if
(
buckets
[
i
].
size
==
1
)
{
ar
[
idx
++
]
=
ptr
>
element
;
free
(
ptr
);
buckets
[
i
].
size
=
0
;
continue
;
}
/* insertion sort where elements are drawn from linked list and
* inserted into array. Linked lists are released. */
low
=
idx
;
ar
[
idx
++
]
=
ptr
>
element
;
tmp
=
ptr
;
ptr
=
ptr
>
next
;
free
(
tmp
);
while
(
ptr
!=
NULL
)
{
int
i
=
idx

1
;
while
(
i
>=
low
&&
cmp
(
ar
[
i
],
ptr
>
element
)
>
0
)
{
ar
[
i
+
1
]
=
ar
[
i
];
i

;
}
ar
[
i
+
1
]
=
ptr
>
element
;
tmp
=
ptr
;
ptr
=
ptr
>
next
;
free
(
tmp
);
idx
++
;
}
buckets
[
i
].
size
=
0
;
}
}
void
sortPointers
(
void
**
ar
,
int
n
,
int
(
*
cmp
)(
const
void
*
,
const
void
*
))
{
int
i
;
num
=
numBuckets
(
n
);
buckets
=
(
BUCKET
*
)
calloc
(
num
,
sizeof
(
BUCKET
));
for
(
i
=
0
;
i
<
n
;
i
++
)
{
int
k
=
hash
(
ar
[
i
]);
/** Insert each element and increment counts */
ENTRY
*
e
=
(
ENTRY
*
)
calloc
(
1
,
sizeof
(
ENTRY
));
e
>
element
=
ar
[
i
];
if
(
buckets
[
k
].
head
==
NULL
)
{
buckets
[
k
].
head
=
e
;
}
else
{
e
>
next
=
buckets
[
k
].
head
;
buckets
[
k
].
head
=
e
;
}
buckets
[
k
].
size
++
;
}
/* now sort, read out, and overwrite ar. */
extract
(
buckets
,
cmp
,
ar
,
n
);
free
(
buckets
);
}
For numbers drawn uniformly from [0, 1), Example 48 contains sample implementations of the hash
and numBuckets
functions to use.
Example 48. Hash and numBuckets functions for [0, 1) range
static
int
num
;
/** Number of buckets to use is the same as the number of elements. */
int
numBuckets
(
int
numElements
)
{
num
=
numElements
;
return
numElements
;
}
/**
* Hash function to identify bucket number from element. Customized
* to properly encode elements in order within the buckets. Range of
* numbers is from [0, 1), so we subdivide into buckets of size 1/num;
*/
int
hash
(
double
*
d
)
{
int
bucket
=
num
*
(
*
d
);
return
bucket
;
}
The buckets could also be stored using fixed arrays that are reallocated when the buckets become full, but the linked list implementation is about 30%–40% faster.
Analysis
The sortPointers
function of Example 47 sorts each element from the input into its associated bucket based upon the provided hash
function; this takes O(n) time. Because of the careful design of the hash
function, we know that all elements in bucket b_{i} are smaller than the elements in bucket b_{j} if i < j.
As the values are extracted from the buckets and written back into the input array, Insertion Sort is used when a bucket contains more than a single element. For Bucket Sort to exhibit O(n) behavior, we must guarantee that the total time to sort each of these buckets is also O(n). Let’s define n_{i} to be the number of elements partitioned in bucket b_{i}. We can treat n_{i} as a random variable (using statistical theory). Now consider the expected value E[n_{i}] for each bucket b_{i}. Each element in the input set has probability p = 1/n of being inserted into a given bucket because each of these elements is uniformly drawn from the range [0, 1). Therefore, E[n_{i}] = n*p = n*(1/n) = 1, while the variance Var[n_{i}] = n*p*(1 – p) = (1 – 1/n). It is important to consider the variance because some buckets will be empty, and others may have more than one element; we need to be sure that no bucket has too many elements. Once again, we resort to statistical theory, which provides the following equation for random variables:
E[n_{i}^{2}] = Var[n_{i}] + E^{2}[n_{i}]
From this equation we can compute the expected value of n_{i}^{2}. This is critical because it is the factor that determines the cost of Insertion Sort, which runs in a worst case of O(n^{2}). We compute E[n_{i}^{2}] = (1 – 1/n) + 1 = (2 – 1/n), which shows that E[n_{i}^{2}] can be considered a constant. This means that when we sum up the costs of executing Insertion Sort on all n buckets, the expected performance cost remains O(n).
Variations
Instead of creating n buckets, Hash Sort creates a suitably large number of buckets k into which the elements are partitioned; as k grows in size, the performance of Hash Sort improves. The key to Hash Sort is a hashing function hash
(e
) that returns an integer for each element e such that hash
(a_{i}) ≤ hash
(a_{j}) if a_{i} is lexicographically smaller than a_{j}.
The hash function hash
(e
) defined in Example 49 operates over elements containing just lowercase letters. It converts the first three characters of the string (using base 26 representation) into an integer value; for the string “abcdefgh,” its first three characters (“abc”) are extracted and converted into the value 0*676 + 1*26 + 2 = 28. This string is thus inserted into the bucket labeled 28.
Example 49. hash and numBuckets functions for Hash Sort
/** Number of buckets to use. */
int
numBuckets
(
int
numElements
)
{
return
26
*
26
*
26
;
}
/**
* Hash function to identify bucket number from element. Customized
* to properly encode elements in order within the buckets.
*/
int
hash
(
void
*
elt
)
{
return
(((
char
*
)
elt
)[
0
]

'a'
)
*
676
+
(((
char
*
)
elt
)[
1
]

'a'
)
*
26
+
(((
char
*
)
elt
)[
2
]

'a'
);
}
The performance of Hash Sort for various bucket sizes and input sets is shown in Table 45. We show comparable sorting times for Quicksort using the medianofthree approach for selecting the pivotIndex
.
n  26 buckets  676 buckets  17,576 buckets  Quicksort 

16 
0.000005 
0.000010 
0.000120 
0.000004 
32 
0.000006 
0.000012 
0.000146 
0.000005 
64 
0.000011 
0.000016 
0.000181 
0.000009 
128 
0.000017 
0.000022 
0.000228 
0.000016 
256 
0.000033 
0.000034 
0.000249 
0.000033 
512 
0.000074 
0.000061 
0.000278 
0.000070 
1,024 
0.000183 
0.000113 
0.000332 
0.000156 
2,048 
0.000521 
0.000228 
0.000424 
0.000339 
4,096 
0.0016 
0.000478 
0.000646 
0.000740 
8,192 
0.0058 
0.0011 
0.0011 
0.0016 
16,384 
0.0224 
0.0026 
0.0020 
0.0035 
32,768 
0.0944 
0.0069 
0.0040 
0.0076 
65,536 
0.4113 
0.0226 
0.0108 
0.0168 
131,072 
1.7654 
0.0871 
0.0360 
0.0422 
Note that with 17,576 buckets, Hash Sort outperforms Quicksort for n > 8,192 items (and this trend continues with increasing n). However, with only 676 buckets, once n > 32,768 (for an average of 48 elements per bucket), Hash Sort begins its inevitable slowdown with the accumulated cost of executing Insertion Sort on increasingly larger sets. Indeed, with only 26 buckets, once n > 256, Hash Sort begins to quadruple its performance as the problem size doubles, showing how too few buckets leads to O(n^{2}) performance.
Sorting with Extra Storage
Most sorting algorithms sort a collection in place without requiring any noticeable extra storage. We now present Merge Sort, which offers O(n log n) behavior in the worst case while using O(n) extra storage. It can be used to efficiently sort data that is stored externally in a file.
Merge Sort
To sort a collection A, divide it evenly into two smaller collections, each of which is then sorted. A final phase merges these two sorted collections back into a single collection of size n. A naïve implementation of this approach, shown here, uses far too much extra storage:
sort
(
A
)
if
A
has
less
than
2
elements
then
return
A
else
if
A
has
2
elements
then
swap
elements
of
A
if
out
of
order
return
A
sub1
=
sort
(
left
half
of
A
)
sub2
=
sort
(
right
half
of
A
)
merge
sub1
and
sub2
into
new
array
B
return
B
end
Each recursive call of sort
will require space equivalent to the size of the array, or O(n), and there will be O(log n) such recursive calls; thus the storage requirement for this naïve implementation is O(n log n). Fortunately there is a way to use only O(n) storage, as we now discuss.
Input/Output
The output of the sort is returned in place within the original collection A. The internal storage copy is discarded.
Solution
Merge Sort merges the left and rightsorted subarrays using two indices i and j to iterate over the left (and right) elements, always copying the smaller of A[i] and A[j] into its proper location result[idx]. There are three cases to consider:

The right side is exhausted (j ≥ end), in which case the remaining elements are taken from the left side

The left side is exhausted (i ≥ mid), in which case the remaining elements are taken from from the right side

The left and right side have elements; if A[i] < A[j], insert A[i] otherwise insert A[j]
Once the for
loop completes, result has the merged (and sorted) elements from the original
A[start, end). Example 410 contains the Python implementation of Merge Sort.
Example 410. Merge Sort implementation in Python
def
sort
(
A
):
"""merge sort A in place."""
copy
=
list
(
A
)
mergesort_array
(
copy
,
A
,
0
,
len
(
A
))
def
mergesort_array
(
A
,
result
,
start
,
end
):
"""Mergesort array in memory with given range."""
if
end

start
<
2
:
return
if
end

start
==
2
:
if
result
[
start
]
>
result
[
start
+
1
]:
result
[
start
],
result
[
start
+
1
]
=
result
[
start
+
1
],
result
[
start
]
return
mid
=
(
end
+
start
)
//
2
mergesort_array
(
result
,
A
,
start
,
mid
)
mergesort_array
(
result
,
A
,
mid
,
end
)
# merge A left and right side
i
=
start
j
=
mid
idx
=
start
while
idx
<
end
:
if
j
>=
end
or
(
i
<
mid
and
A
[
i
]
<
A
[
j
]):
result
[
idx
]
=
A
[
i
]
i
+=
1
else
:
result
[
idx
]
=
A
[
j
]
j
+=
1
idx
+=
1
Analysis
Merge Sort completes the “merge” phase in O(n) time after recursively sorting the left and righthalf of the range A[start, end), placing the properly ordered elements in the array referenced as result.
Because copy is a true copy of the entire array A, the terminating base cases of the recursion will work because it references the original elements of the array directly at their respective index locations. This observation is a sophisticated one and is key to the algorithm. In addition, the final merge step requires only O(n) operations, which ensures the total performance remains O(n log n). Because copy is the only extra space used by the algorithm, the total space requirement is O(n).
Variations
Of all the sorting algorithms, Merge Sort is the easiest one to convert to working with external data. Example 411 contains a full Java implementation using memory mapping of data to efficiently sort a file containing binaryencoded integers. This sorting algorithm requires the elements to all have the same size, so it can’t easily be adapted to sort arbitrary strings or other variablelength elements.
Example 411. External Merge Sort implementation in Java
public
static
void
mergesort
(
File
A
)
throws
IOException
{
File
copy
=
File
.
createTempFile
(
"Mergesort"
,
".bin"
);
copyFile
(
A
,
copy
);
RandomAccessFile
src
=
new
RandomAccessFile
(
A
,
"rw"
);
RandomAccessFile
dest
=
new
RandomAccessFile
(
copy
,
"rw"
);
FileChannel
srcC
=
src
.
getChannel
();
FileChannel
destC
=
dest
.
getChannel
();
MappedByteBuffer
srcMap
=
srcC
.
map
(
FileChannel
.
MapMode
.
READ_WRITE
,
0
,
src
.
length
());
MappedByteBuffer
destMap
=
destC
.
map
(
FileChannel
.
MapMode
.
READ_WRITE
,
0
,
dest
.
length
());
mergesort
(
destMap
,
srcMap
,
0
,
(
int
)
A
.
length
());
// The following two invocations are only needed on Windows platform:
closeDirectBuffer
(
srcMap
);
closeDirectBuffer
(
destMap
);
src
.
close
();
dest
.
close
();
copy
.
deleteOnExit
();
}
static
void
mergesort
(
MappedByteBuffer
A
,
MappedByteBuffer
result
,
int
start
,
int
end
)
throws
IOException
{
if
(
end

start
<
8
)
{
return
;
}
if
(
end

start
==
8
)
{
result
.
position
(
start
);
int
left
=
result
.
getInt
();
int
right
=
result
.
getInt
();
if
(
left
>
right
)
{
result
.
position
(
start
);
result
.
putInt
(
right
);
result
.
putInt
(
left
);
}
return
;
}
int
mid
=
(
end
+
start
)/
8
*
4
;
mergesort
(
result
,
A
,
start
,
mid
);
mergesort
(
result
,
A
,
mid
,
end
);
result
.
position
(
start
);
for
(
int
i
=
start
,
j
=
mid
,
idx
=
start
;
idx
<
end
;
idx
+=
4
)
{
int
Ai
=
A
.
getInt
(
i
);
int
Aj
=
0
;
if
(
j
<
end
)
{
Aj
=
A
.
getInt
(
j
);
}
if
(
j
>=
end

(
i
<
mid
&&
Ai
<
Aj
))
{
result
.
putInt
(
Ai
);
i
+=
4
;
}
else
{
result
.
putInt
(
Aj
);
j
+=
4
;
}
}
}
The structure is identical to the Merge Sort implementation, but it uses a memorymapped structure to efficiently process data stored on the file system. There are issues on Windows operating systems that fail to properly close the MappedByteBuffer
data. The repository contains a workaround method closeDirectBuffer(MappedByteBuffer)
that will handle this responsibility.
String Benchmark Results
To choose the appropriate algorithm for different data, you need to know some properties about your input data. We created several benchmark data sets on which to show how the algorithms presented in this chapter compare with one another. Note that the actual values of the generated tables are less important because they reflect the specific hardware on which the benchmarks were run. Instead, you should pay attention to the relative performance of the algorithms on the corresponding data sets:
 Random strings

Throughout this chapter, we have demonstrated performance of sorting algorithms when sorting 26character strings that are permutations of the letters in the alphabet. Given there are n! such strings, or roughly 4.03*10^{26} strings, there are few duplicate strings in our sample data sets. In addition, the cost of comparing elements is not constant, because of the occasional need to compare multiple characters.
 Doubleprecision floatingpoint values

Using available pseudorandom generators available on most operating systems, we generate a set of random numbers from the range [0, 1). There are essentially no duplicate values in the sample data set and the cost of comparing two elements is a fixed constant. The results of these data sets are not included here, but can be found in the code repository.
The input data provided to the sorting algorithms can be preprocessed to ensure some of the following properties (not all are compatible):
 Sorted

The input elements can be presorted into ascending order (the ultimate goal) or in descending order.
 Killer medianofthree

Musser (1997) discovered an ordering that ensures that Quicksort requires O(n^{2}) comparisons when using medianofthree to choose a pivot.
 Nearly sorted

Given a set of sorted data, we can select k pairs of elements to swap and the distance d with which to swap (or 0 if any two pairs can be swapped). Using this capability, you can construct input sets that might more closely match your input set.
The upcoming tables are ordered left to right, based on how well the algorithms perform on the final row in the table. To produce the results shown in Tables 46 through 48, we executed each trial 100 times and discarded the best and worst performers. The average of the remaining 98 trials is shown in these tables. The columns labeled “Quicksort BFPRT^{4} minSize = 4” refer to a Quicksort implementation that uses BFPRT (with groups of 4) to select the partition value, switching to Insertion Sort when a subarray to be sorted has four or fewer elements.
Because the performance of Quicksort medianofthree degrades so quickly, only 10 trials were executed in Table 48.
n  Hash Sort 17,576 buckets  Quicksort medianofthree  Merge Sort  Heap Sort  Quicksort BFPRT^{4} minSize = 4 

4,096 
0.000631 
0.000741 
0.000824 
0.0013 
0.0028 
8,192 
0.0011 
0.0016 
0.0018 
0.0029 
0.0062 
16,384 
0.0020 
0.0035 
0.0039 
0.0064 
0.0138 
32,768 
0.0040 
0.0077 
0.0084 
0.0147 
0.0313 
65,536 
0.0107 
0.0168 
0.0183 
0.0336 
0.0703 
131,072 
0.0359 
0.0420 
0.0444 
0.0893 
0.1777 
n  Insertion Sort  Merge Sort  Quicksort medianofthree  Hash Sort 17,576 buckets  Heap Sort  Quicksort BFPRT^{4} minSize = 4 

4,096 
0.000029 
0.000434 
0.00039 
0.000552 
0.0012 
0.0016 
8,192 
0.000058 
0.000932 
0.000841 
0.001 
0.0026 
0.0035 
16,384 
0.000116 
0.002 
0.0018 
0.0019 
0.0056 
0.0077 
32,768 
0.000237 
0.0041 
0.0039 
0.0038 
0.0123 
0.0168 
65,536 
0.000707 
0.0086 
0.0085 
0.0092 
0.0269 
0.0364 
131,072 
0.0025 
0.0189 
0.0198 
0.0247 
0.0655 
0.0834 
n  Merge Sort  Hash Sort 17,576 buckets  Heap Sort  Quicksort BFPRT^{4} minSize = 4  Quicksort medianofthree 

4,096 
0.000505 
0.000569 
0.0012 
0.0023 
0.0212 
8,192 
0.0011 
0.0010 
0.0026 
0.0050 
0.0841 
16,384 
0.0023 
0.0019 
0.0057 
0.0108 
0.3344 
32,768 
0.0047 
0.0038 
0.0123 
0.0233 
1.3455 
65,536 
0.0099 
0.0091 
0.0269 
0.0506 
5.4027 
131,072 
0.0224 
0.0283 
0.0687 
0.1151 
38.0950 
Analysis Techniques
When analyzing a sorting algorithm, we must explain its bestcase, worstcase, and averagecase performance (as discussed in Chapter 2). The average case is typically hardest to accurately quantify and relies on advanced mathematical techniques and estimation. It also assumes a reasonable understanding of the likelihood that the input may be partially sorted. Even when an algorithm has been shown to have a desirable averagecase cost, its implementation may simply be impractical. Each sorting algorithm in this chapter is analyzed both by its theoretical behavior and by its actual behavior in practice.
A fundamental result in computer science is that no algorithm that sorts by comparing elements can do better than O(n log n) performance in the average or worst case. We now sketch a proof. Given n items, there are n! permutations of these elements. Every algorithm that sorts by pairwise comparisons corresponds to a binary decision tree. The leaves of the tree correspond to an underlying permutation, and every permutation must have at least one leaf in the tree. The nodes on a path from the root to a leaf correspond to a sequence of comparisons. The height of such a tree is the number of comparison nodes in the longest path from the root to a leaf node; for example, the height of the tree in Figure 410 is 5 because only five comparisons are needed in all cases (although in four cases only four comparisons are needed).
Construct a binary decision tree where each internal node of the tree represents a comparison a_{i} ≤ a_{j} and the leaves of the tree represent one of the n! permutations. To sort a set of n elements, start at the root and evaluate the statements shown in each node. Traverse to the left child when the statement is true; otherwise, traverse to the right child. Figure 410 shows a sample decision tree for four elements.
We could construct many different binary decision trees. Nonetheless, we assert that given any such binary decision tree for comparing n elements, we can compute its minimum height h—that is, there must be some leaf node that requires h comparison nodes in the tree from the root to that leaf. Consider a complete binary tree of height h in which all nonleaf nodes have both a left and right child. This tree contains a total of n = 2^{h} − 1 nodes and height h = log (n + 1); if the tree is not complete, it could be unbalanced in strange ways, but we know that h ≥ ⌈log (n + 1)⌉. Any binary decision tree with n! leaf nodes already demonstrates that it has at least n! nodes in total. We need only compute h = ⌈log (n!)⌉ to determine the height of any such binary decision tree. We take advantage of the following properties of logarithms: log (a*b) = log (a) + log (b) and log (x ^{y}) = y*log (x).
h = log (n!) = log (n * (n − 1) * (n − 2) * ... * 2 * 1)
h > log (n * (n − 1) * (n − 2) * ... * n/2)
h > log ((n/2)^{n/2})
h > (n/2) * log (n/2)
h > (n/2) * (log (n) − 1)
Thus, h > (n/2)*(log (n) – 1). What does this mean? Well, given n elements to be sorted, there will be at least one path from the root to a leaf of size h, which means an algorithm that sorts by comparison requires at least this many comparisons to sort the n elements. Note that h is computed by a function f(n); here in particular, f(n) = (1/2)*n*log (n) – n/2, which means any sorting algorithm using comparisons will require O(n log n) comparisons to sort.
References
Bentley, J. and M. McIlroy, “Engineering a sort function,” Software—Practice and Experience, 23(11): 1249–1265, 1993, http://dx.doi.org/10.1002/spe.4380231105.
Blum, M., R. Floyd, V. Pratt, R. Rivest, and R. Tarjan, “Time bounds for selection,” Journal of Computer and System Sciences, 7(4): 448–461, 1973, http://dx.doi.org/10.1016/S00220000(73)800339.
Cormen, T. H., C. Leiserson, R. Rivest, and C. Stein, Introduction to Algorithms. Third Edition. MIT Press, 2009.
Davis, M. and K. Whistler, “Unicode Collation Algorithm, Unicode Technical Standard #10,” June 2015, http://unicode.org/reports/tr10/.
Gilreath, W., “Hash sort: A linear time complexity multipledimensional sort algorithm,” Proceedings, First Southern Symposium on Computing, 1998, http://arxiv.org/abs/cs.DS/0408040.
Musser, D., “Introspective sorting and selection algorithms,” Software—Practice and Experience, 27(8): 983–993, 1997.
Sedgewick, R., “Implementing Quicksort programs,” Communications ACM, 21(10): 847–857, 1978, http://dx.doi.org/10.1145/359619.359631.
Trivedi, K. S., Probability and Statistics with Reliability, Queueing, and Computer Science Applications. Second Edition. WileyBlackwell Publishing, 2001.
Get Algorithms in a Nutshell, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.