Caching for pathfinding computation

ABSTRACT

A system for computing a path in an electronic map (or other network) starts a pathfinding exploration in the background while the system is waiting for a request to find a path. The system automatically chooses an origin. The system&#39;s memory can be divided such that a portion of memory acts as a cache. The data for the nodes in the electronic map are loaded into the cache when needed. The system terminates the pathfinding process when a predetermined condition occurs; for example, a predetermined percentage of the cache is filled. When the system terminates the pathfinding process, the system can start a new pathfinding process from a new origin. Thus, when a user requests a path to be found, the pathfinding process begins with data already loaded in the cache.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention is directed to a system for caching data for apathfinding computation.

2. Description of the Related Art

The computer has revolutionized the idea of a map from an imagestatically depicting the location of physical features to the electronicmap, which consists of geographically referenced electronic dataquantifying a physical, social or economic system. The range ofinformation included in electronic maps is unlimited; for example,electronic maps could include distances between elements, driving time,lot numbers, tax information, tourist information, etc. Additionally,storing a map as a file on a computer allows for unlimited softwareapplications to manipulate that data.

One advantage of the electronic map is to store and determine costsassociated with various portions of a map. Examples of cost includetime, distance, tolls paid, ease of turning, quality of scenery, etc.Thus, a traveler may wish to know how far that traveler can drivewithout paying more than $10 in tolls, what restaurants are within a 10minute drive, or what gas stations are within a one mile walk. In eachof these situations, the traveler desires to know where they can travelto within a given cost. A more detailed discussion of costs can be foundin U.S. patent application Ser. No. 08/756,263, Using Multiple Levels OfCosts For A Pathfinding Computation, filed Nov. 25, 1996, ETAK7717, U.S.No. Ser. 08/756,263, Richard F. Poppen, incorporated herein byreference.

Electronic maps can also be used for pathfinding, which is a method forcomputing a route between an origin and a destination. An electronic mapthat is used for pathfinding must carry information about theconnectivity of a road network, that is, information about the ways inwhich pieces of road do or do not connect to each other, for example,where there are ordinary intersections, where there are overpasses,where turns are restricted, and so on. For an area of any significantextent, this is a very large amount of information. An electronic mapcan include tens or hundreds of megabytes of data. In order to hold suchvast quantities of data economically and allow a user to replace mapswith updated copies easily, many current pathfinding apparatus (whichincludes general purpose computers with pathfinding software, automotivenavigation systems or other map application equipment) use CD-ROMs tostore the electronic map data.

Although CD-ROMs hold a great deal of data, accessing that data can berelatively slow. For example, a typical CD-ROM drive used for automotivepathfinding may take on the order of 1/3 of a second for each readaccess. If a pathfinding system had to wait 1/3 of a second every timeit needed data, the time needed to compute a path would not beacceptable to a user. A user of a navigational pathfinding system storedin a car typically would demand very fast response times when requestinga path because a user currently driving in the car needs to know whichway to turn. For these reasons, it is very important to minimize thenumber of disk accesses required to compute a path. It is noted thatsome systems may use peripheral devices other than CD-ROMs, for example,hard disks, floppy disks, solid state memory, etc. These other storagedevices suffer similar access time limitations.

One attempt to minimize the number of disk accesses required to computea path includes grouping map data into clusters, that is, groupingtogether on a CD-ROM (or other storage device) information about sets ofroad segments often used in the same path computation. For example, anumber of consecutive segments of the same street, road segments thatcross each other or road segments that lead to a highway may be storedin a single cluster. Note that these clusters need not be geographicallybased. Information about roads on two sides of a river in an area thatis not close to a bridge would probably not be stored in the samecluster, since the roads would not be used in relation to each otherduring path calculation even though they may be quite close to eachother geographically. Information about highways over a wide area aregood candidates to be stored together in one cluster because a pathcomputation typically explores the connections of highways with otherhighways. There are many ways to cluster data to increase performance.One example of clustering data can be found in U.S. patent applicationSer. No. 08/245,690, Method for Clustering Multi-Dimensional Data, filedMay 18, 1994, Poppen et al., now U.S. Pat. No. 5,706,503, incorporatedherein by reference. When clustering is used with a suitable cachemethodology, the time for pathfinding is saved because informationneeded by the pathfinding computation is often already in the cache (ormain memory) having been read as part of a cluster which includes dataalready used.

Caching is a well-known process of saving records recently read in orderto reduce the number of disk/memory accesses. One of the most well knownforms of caching includes using a small memory local to a processorcalled a cache memory. Certain data recently used is typically stored inthe cache memory, with access to the cache memory being quicker thanaccess to main memory. In this example, the cache memory caches databetween main memory and a processor.

Another example of caching is to cache data between a storage device andmain memory. An alternative to using a cache memory separate from mainmemory is to use a portion of main memory as the cache memory. When datais read from the storage device it is typically kept in the cache memoryportion (hereinafter called "cache") of the main memory for a certainamount of time so that later access to that data will be quicker thanaccessing the storage device. The portion of the memory allocated as thecache will hold a number of records of data along with an indication ofhow recently each record has been used. When the program needs to read agiven record, the program first looks in the cache for the record. Ifthe record is in the cache, the program uses the information stored inthe cache rather than reading the disk file again. If the record is notin the cache, and there is enough unused space in the cache to hold therecord, the record is read into the cache and then used by the program.If the record is not in the cache and there is not enough unused spacein the cache to hold the record, the least recently used record orrecords are discarded to provide sufficient room to hold the new record.A record of data could include one or more clusters of data or anothersuitable arrangement of data. If map data is clustered in such a waythat information regarding a given road segment is often used shortlyafter the use of information regarding another road segment in the samecluster there will be a significant speed improvement in the pathfindingprocess because the number of accesses to the CD-ROM will be decreased.

The path calculation remains a lengthy process even when using a cacheas described above. Every cluster used in the computation still needs tobe read at least once. Since the pathfinding computation may need toread a large number of clusters at the beginning of the pathfindingcomputation, the user of the pathfinding apparatus still spends asignificant amount of time waiting for the pathfinding apparatus to readall the data prior to a path being calculated.

Therefore, a system is needed that reduces the amount of time needed tocalculate a path from an electronic map.

SUMMARY OF THE INVENTION

The present invention, roughly described, provides for a system forcomputing a path in a processor readable representation of a networkthat caches data to be used in a pathfinding process. In one embodiment,the system chooses, automatically, an origin in a processor readablerepresentation of a network without the pathfinding computation beingrequested. A preliminary pathfinding exploration is commenced and sets(or records) of data are loaded, as needed, into a processor readablestorage medium. The pathfinding exploration is terminated when apredefined condition is met. When a user requests a path to be found,the pathfinding computation proceeds with the use of the processorreadable storage medium as it has been filled by the preliminarypathfinding exploration. Since the processor readable storage medium isalready filled with some data, the system saves the time of loading themedium, thus reducing the processing time for the pathfindingcomputation.

The origin chosen by the system could be the current position of avehicle in an electronic map, the position of the vehicle at a time inthe future, a distance from the current position of the vehicle, orother area of interest. In one embodiment, the processor readablestorage medium is a memory (e.g. RAM) and a portion of the memory isreserved for use as a cache memory.

There are various alternative predefined conditions for terminating thepathfinding computation. For example, the pathfinding computation can beterminated when a predetermined number of nodes have been processed, apredetermined number of sets of data have been loaded into the cache,the cache is filled to a predetermined percentage, a predeterminedamount of time has elapsed or any other suitable condition for stopping.In one embodiment, after the predefined condition has been met, thesystem continues a second exploration which only utilizes data that hasbeen previously loaded into the cache memory. This second pathfindingcalculation effects which data is marked as recently used.

In one embodiment, after the pathfinding calculation has terminated, thesystem chooses, automatically, a new origin in the network without thepathfinding computation being requested. A second pathfindingcalculation is calculated about the new origin and new data is loadedinto the computer readable storage medium. The second pathfindingcalculation is terminated when a second predefined condition is met. Thesecond predefined condition can be the same as the first predefinedcondition.

One embodiment for performing the present invention includes aprocessor, a memory and a processor readable storage medium. Theprocessor is programmed to choose the origin in the electronic map,commence the pathfinding exploration, load sets of data and terminatethe pathfinding calculation as described above.

These and other objects and advantages of the invention will appear moreclearly from the following detailed description in which the preferredembodiment of the invention has been set forth in conjunction with thedrawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of one exemplar hardware architecture that canbe used to practice the present invention.

FIG. 2A is an example of a directed graph representing a part of anelectronic map.

FIG. 2B is a second example of a directed graph representing a part of anetwork.

FIG. 3 is a directed graph representing a part of an electronic map usedfor exemplar purposes to describe the pathfinding process and cachingprocess.

FIG. 4 is a flow chart describing a method for computing a path.

FIG. 5 is a flow chart of the pathfinding process utilizing the currentinvention.

FIG. 6 is a flow chart describing the background process depicted inFIG. 5.

FIG. 7 is a flow chart describing the second exploration depicted inFIG. 6.

DETAILED DESCRIPTION

FIG. 1 is a symbolic block diagram of one exemplar hardware architecturethat can be used to practice the present invention. The hardwareincludes CPU 12, which may be an Intel 80486 compatible CPU, PentiumProcessor, or other suitable processor. CPU 12 has address, data andcontrol lines which are connected to CPU bus 14. CPU bus 14 is alsoconnected to a cache memory 16 and to main memory 18, both of which arecontrolled by system control logic 20. System control logic 20 isconnected to CPU bus 14 and also to control, address and data lines ofbus 22. Connected to bus 22 is ROM 24, which contains the system BIOS,and Peripherals 26, which can include a floppy, a hard-disk drive,CD-ROM drive or other peripheral device. Cache memory 16, DRAM memory18, ROM 24, a CD-ROM and a floppy disk are all processor readablestorage devices (or media). Various embodiments of the current inventionuse various amounts of software to perform the described methods. Thissoftware can reside on any suitable processor readable memory. Notdepicted in FIG. 1, but included in the hardware, is a display and aninput device such as a keyboard or pointing device. The system of FIG. 1illustrates one platform which can be used for the present invention.Numerous other platforms can also suffice, such as Macintosh-basedplatforms available from Apple Computer, Inc., platforms with differentbus configurations, networked platforms, multi-processor platforms,other personal computers, workstations, mainframes, navigation systems,and so on.

An electronic map is stored in one or more computer files which includethe data necessary to construct a map. This data could include longitudeand latitude data, addresses, distances, turning restrictions, drivingtimes, highway exit numbers, descriptions of commercial uses ofproperties, etc. Although the above listed information can be found inan electronic map, it is possible to create an electronic map with onlya subset of the above listed information or with other information. Thecomputer files representing an electronic map are stored on a processorreadable storage medium.

Generally, an electronic map to be used for pathfinding includes agraph. A graph is a collection of nodes and edges. Nodes are objectsthat have properties and indicate decision points on the graph. An edgeis a connection between two nodes. A path from node A to node B in agraph is described as a list of nodes such that there is an edge fromeach node in the list to the next. A directed graph is a graph in whicheach edge has a single direction associated with it. There may be twoedges between a given pair of nodes, one in each direction. In adirected graph, edges are referred to as links. A weighted graph is agraph in which each link (or edge) has a cost associated with it.Alternatives includes associating the costs with the nodes, with thenodes and links, or associating costs with another element of the graph.An undirected graph is a graph where each link is bidirectional. Anundirected graph can be thought of as a directed graph where each linkrepresents two links with the same end points but different directions.

FIG. 2A shows an exemplar directed graph which shows eastbound one-waystreet 50 and two-way street 52, both intersecting with two-way street54. Street 50 intersects with street 54 at intersection 60. Street 52intersects with street 54 at intersection 70. At intersection 60 are twonodes, 62 and 64. The head of the node is a circle. The rear of the nodeis a straight-line tail. The circle represents where the node is locatedand the tail represents where a traveler would come from to reach thatnode. The node symbol is displaced from the actual intersection forpurposes of visibility. For example, node 62 represents travelnorthbound on street 54 toward intersection 60. Node 64 representstravel eastbound on road 50 toward intersection 60. There is no node atintersection 60 to represent westbound travel on street 50 becausestreet 50 is an eastbound oneway street. Thus, a traveler proceedingnorth on road 54 and reaching intersection 60 can only make a rightturn. Node 72 represents arriving at intersection 70 by traveling southon street 54. Node 74 represents arriving at intersection 70 bytraveling east on road 52. Node 76 represents arriving at intersection70 by traveling west on road 52.

Links represent a path between nodes. For example, from node 64 atraveler can make a right turn at intersection 60 to enter road 54 orcan proceed straight on road 50. Link 86 represents travel starting fromintersection 60 on road 50 facing east, making a right turn atintersection 60 and proceeding south on road 54. Thus, link 86 connectsnode 64 to node 72. Link 88 connects node 64 to the next node on street50 (not shown on FIG. 2A) and represents travel east along road 50,proceeding straight through intersection 60 without turning. Link 89represents travel starting from intersection 60 on road 54 facing north,making a right turn at intersection 60 and proceeding east on road 50;therefore, link 89 connects node 62 to the next node on street 50 (notshown on FIG. 2A). FIG. 2A only shows links drawn for nodes 62 and 64.If links are drawn for all nodes, the directed graph would become toocrowded and would be difficult to read. Thus, the directed graph issimplified and redrawn as in FIG. 2B.

In FIG. 2B, all the nodes at the same intersection are collapsed intoone node to make the following explanation simpler. (In actual use, thepresent invention can make use of a graph similar to FIG. 2A or FIG.2B.) Thus, node 100 represents nodes 64 and 62. Node 102,representsnodes 72, 74 and 76. Note that the tails of the nodes are not drawn. Thelinks are used to indicate directions of allowable travel. Link 104indicates travel from intersection 70 to intersection 60 and link 106indicates travel from intersection 60 to intersection 70. Turnrestrictions and one-way streets are represented by the presence orabsence of a link.

The directed graph of FIG. 2B is used to symbolically understand thedata structure stored in a processor readable storage medium. Aprocessor readable storage medium does not actually store an image of adirected graph. Rather, a data structure is stored. Each entry in thedata structure represents a node. For each node, the data structurestores the location of the node (e.g., latitude and longitude), a listof neighboring nodes (nodes which can be traveled to via one link) andthe various costs associated with getting to the neighboring nodes. Itis contemplated that the present invention will work with many suitabledata structures different from the one described. Furthermore, theinvention need not be used with a directed graph. The present inventioncan be used with the entire map database, other networks, or any othersuitable subset of information. Furthermore, one or more entries in adata structure can be grouped together in a cluster of data A cluster ofdata is a grouping of related data. Although clusters improveperformance, the present invention can be used without clusters.

FIG. 3 represents the directed graph for a portion of an electronic map.The directed graph depicted includes ten nodes (A, B, C, D, E, F, G, H,I, and O) and various links between the nodes. Each of the links includea number adjacent to the link. This number represents the cost oftraveling along that link. For exemplar purposes only, the cost isassumed to be driving time. To help explain the current invention it isassumed that a driver in a car has an automotive navigation system inthe car that performs pathfinding. The driver is located somewhere inthe directed graph of FIG. 3 and at some point may decide to ask thenavigation system to compute a path from one location to another. Toexplain how a path is computed, it is assumed that the driver has askedthe system to compute a path from the origin O to the destination D. Atthe time the driver asked for the path the driver may have been atorigin O, may be at another location in the graph driving toward originO, or may be nowhere near origin O but still interested in the path.

FIG. 4 is a flow chart which explains a pathfinding computation. Thepathfinding computation of FIG. 6, which is based at least in part onthe work of Edsger W. Dijkstra, is only one of many pathfinding methodsthat can be used with the present invention. One reference thatdiscusses Dijkstra's method is M. N. S. Swamy and K. Thulasiraman,Graphs, Networks, and Algorithms, John Wiley & Sons (1981). In step 202the system initializes the pathfinding computation. That is, the systemstores the origin and destination of the path and sets up two queues: anorigin priority queue and a destination priority queue. The originpriority queue consists of an ordered list of nodes, to each of which apath from the origin is known, and a key for each node. The queue issorted according to the key. There are various alternatives fordetermining the key. In one alternative, the key is the lowest knowncost of traveling from the origin to the node. An alternative keyincludes the sum of the known lowest distance from the origin to thenode plus an estimated cost of traveling from the node to thedestination. There are various alternatives for estimating the cost fortraveling from the node to the destination which are suitable for thismethod. One example includes multiplying the direct "as-the-crow-flies"distance by the estimated cost per unit distance. That is, disregardingthe nodes and links, determining the physical distance between the nodeand the destination and multiplying that distance by an estimated costper unit distance.

The destination priority queue consists of an ordered list of nodes,from each of which a path to the destination is known, and a key foreach node. The queue is sorted according to the key. There are manyalternatives for determiing a destination key. One alternative includesusing the known lowest cost path from the node to the destination. Analternative key includes using the sum of the known cost from the nodeto the destination plus an estimated cost from the origin to the node.The key described above for the origin priority queue which utilizes theestimated remaining costs produces an exploration from the origin thatis biased in the direction of the destination. Similarly, an explorationfrom the destination is biased in the direction of the origin. Othermethods of computing a key are suitable within the scope of the presentinvention.

Additionally, the system sets up an origin visited list and adestination visited list. The origin visited list maintains a list ofall nodes to which paths from the origin are known, the lowest cost fortraveling from the origin to the node, and the previous node along thepath with that lowest cost. The destination visited list stores the nameof each node for which paths to the destination are known, the knownlowest cost for traveling from the node to the destination, and theidentity of the next node along the path to the destination with thatlowest cost. After the initialization step 202 is completed, the originpriority queue and the origin visited list include the origin, and thedestination priority queue and the destination visited list include thedestination.

Once the system is initialized, the system chooses a queue according toa rule in step 204. There are many rules of picking a queue which aresuitable for the present invention. In one system, the queue containingthe element with the smallest key is chosen, with ties brokenarbitrarily. In another system, the queue containing the least amount ofelements is chosen. Other examples of rules for choosing a queue includealternating between queues; choosing the origin queue for a certainnumber of iterations (or a time period), switching to the destinationqueue for a certain number of iterations, switching back to the originqueue for a certain number of iterations, etc. Since the queues aresorted by keys, the node with the smallest key will be at the head ofthe queue (also called the front or the top of the queue). This node iscalled the "head node." In the example discussed below, the method forpicking a queue will be to alternate starting with the origin priorityqueue.

In step 206 the system looks for all nodes which are adjacent nodes tothe head node of the chosen queue. Since the system has just started,the only node in the origin priority queue is the origin. The adjacentnodes are those nodes which can be traveled to from the origin withoutgoing through any other nodes. With respect to FIG. 3, the adjacentnodes for the origin O are nodes A, B and G. Since there are threeadjacent nodes, the system arbitrarily picks one adjacent node. In step208 the system determines whether there is a lower cost known on thevisited list or the priority queue for the adjacent node picked. Thatis, the system determines the cost of traveling between the adjacentnode and the head node and adds that cost to the cost already known forthe head node. In this case, the adjacent node picked is node A, thecost of traveling from the origin to node A is 9. Since the pathfindingcomputation has just started, node A is not on the visited list or theorigin priority queue so there is no known cost. Since there is no knowncost, in step 210 the system edits the visited list and the priorityqueue to add node A and its cost. The method loops back to step 206 todetermine whether any additional adjacent nodes have not beenconsidered. In this case there are two adjacent nodes that have not beenconsidered: B and G. In step 208, if there is a lower cost known, thenthe system loops to step 206.

In step 208 the system determines whether there is a lower cost knownfor node B. The cost for traveling from origin to B is 3 and B does notappear on the priority queue or the visited list. In step 210 node B isadded to the priority queue and the visited list. The system loops backto step 206 and considers node G, since there is no known cost lowerthan the cost of going directly from the origin O to G, which is 7, G isadded to the priority queue and the visited list. The system loops backto step 206 and determines that there are no adjacent nodes; therefore,in step 212 the head node, which is currently the origin, is removedfrom the priority queue. Table 1 reflects the contents of the originpriority queue and the visited list at this point in the pathfindingcomputation. There are three nodes on the origin priority queue: B, Gand A. Their keys represent the cost of traveling from the origin tothat node. The visited list has three columns: Node, Cost and Prev. Thenode column lists the node identification, the cost column lists thelowest known cost of traveling from the origin to that node and the Prevcolumn lists the previous node along the path from the origin to thelisted node when traveling along the path utilizing the lowest knowncost. The order that the nodes are listed in the visited list can be anyorder that makes it easy to search the list. For example, the nodes canbe listed in alphabetical order. In one implementation, the nodes arenamed by numerical codes and the visited list is a hash table.

                  TABLE 1                                                         ______________________________________                                        Origin                                                                        Priority Queue   Origin Visited List                                          Node      Key    Node        Cost Prey                                        ______________________________________                                        B         3      A           9    O                                           G         7      B           3    O                                           A         9      G           3    O                                                            O           0    --                                          ______________________________________                                    

In step 214 the system determines whether a stopping condition hasoccurred. There are many stopping conditions which are suitable for thepresent invention, for example, stopping when a node has been the headnode on both the origin priority queue and the destination priorityqueue. Another stopping condition, which is the stopping condition usedin this example, is stopping when the cost of traveling from the originto the head node in the origin priority queue plus the cost of travelingfrom the head node of the destination priority queue to the destinationis greater than or equal to the total cost of the best connection node.A connection node is the node that appears on the destination visitedlist and the origin visited list. Total cost of a connection node is thecost from the origin to the connection node plus the cost from theconnection node to the destination. The best connection node is theconnection node with the lowest total cost. In the present case there isno connection nodes so the stopping condition fails and, in step 204,the system picks a queue.

As discussed above, the queue selection algorithm in the present exampleis alternating; therefore, the system picks the destination queue. Instep 206 the system determines whether there are any nodes adjacent tothe destination D. In the present example there are two adjacent nodes Cand F. In step 208 the system looks at node C and determines whetherthere is a lower known cost. Since there is not, in step 210 thedestination priority queue and visited list are edited to add node C andits cost. The method loops back to step 206 which determines that thereis another adjacent node, node F. In step 208 the system determines thatthere is not a lower known cost known for F. In step 210 the destinationpriority queue and the destination visited list are edited to add nodeF. In step 206 the system determines there are no more adjacent nodes tonode D and node D is removed from the destination priority queue in step212. Table 2 reflects the state of the destination priority queue andvisited list at this point in the method. The column labeled Next listthe next node along the path from the listed node to the destinationwhen traveling along the path utilizing the lowest cost known.

                  TABLE 2                                                         ______________________________________                                        Dest. Priority Queue                                                                           Dest. Visited List                                           Node      Key    Node        Cost Next                                        ______________________________________                                        F         4      C           5    D                                           C         5      D           0    --                                                           F           4    D                                           ______________________________________                                    

Since there are no connection nodes, the stopping condition fails (step214) and the system picks the origin priority queue (step 204). FromTable 1, it can be seen that the head node on the origin priority queueis node B. The adjacent nodes to node B are nodes A and E. In step 208,there is not a lower known cost for node A. Although node A does appearon the visited list with a cost of 9, the cost of traveling from theorigin to node A via node B is 6. That is, the cost of traveling from Oto B is 3 and the cost of traveling from B to A is 3. Thus, the cost oftraveling from O to B to A is 6 which is lower than the cost oftraveling from O directly to A. Therefore, in step 210 the visited listand priority queue are edited so that the cost of traveling to node A is6 and the previous node in the visited list for node A is B. That is, toget to A from O at a cost of 6 you must travel through node B. In step206 the system determines that there is another adjacent node, E. Instep 208 the system determines that there is not a lower known cost forE and the priority queue and visited list are edited to include E. Table3 reflects the current state of the origin priority queue and thevisited list after node B was removed from the priority queue (step212).

                  TABLE 3                                                         ______________________________________                                        Origin                                                                        Priority Queue   Origin Visited List                                          Node      Key    Node        Cost Prey                                        ______________________________________                                        E         5      A           6    B                                           A         6      B           3    O                                           G         7      E           5    B                                                            G           3    O                                                            O           0    --                                          ______________________________________                                    

At this point, the stopping condition fails because there is noconnection node and the system picks the destination queue (step 204).In step 206 the system looks for nodes adjacent to the head node on thedestination queue. Since the head node is node F, the adjacent nodes arenodes E and D. The cost of traveling from E to F is 2, thus, the costtraveling from E to F to D is 6. In step 208 the system determines thatthere is not a lower known cost for traveling from E to D so the visitedlist and priority queue are updated accordingly. The cost of travelingfrom D to F to D is eight which is more than the cost of zero associatedwith Node D in the visited list, so the visited lot and priority queueare not updated. In step 206 the system determines that there is notanother adjacent node and F is removed from the priority queue in step212. Table 4 reflects the state of the destination priority queue andvisited list at this point in the method.

                  TABLE 4                                                         ______________________________________                                        Dest.                                                                         Priority Queue   Dest. Visited List                                           Node      Key    Node        Cost Next                                        ______________________________________                                        C         5      C           5    D                                           E         6      D           0    --                                                           E           6    F                                                            F           4    D                                           ______________________________________                                    

In step 214 the system determines whether the stopping condition hasbeen met. At this point there is a connection node. Node E is on thevisited list for the origin and the destination. The total cost for nodeE is 11. That is, the cost from traveling from the origin to node E is 5and from node E to the destination is 6. The stopping condition is notmet because the cost of traveling from the origin to the head node inthe origin priority queue (E) is 5 and the cost of traveling from thehead node of the destination priority queue C to the destination is also5. The sum of the two costs is 10 which is lower than the total cost forthe connection node which is 11, therefore the stopping condition failsand the system picks the origin priority queue in step 204.

The head node in the origin priority queue is node E, which has twoadjacent nodes: C and F. In step 208 the system determines whether alower cost for traveling from the origin to F is already known. Since Fis not on the origin priority queue, there is no known cost and the costof traveling from the origin to E to P, which is 7, is added to theorigin priority queue and the visited list. In step 206 the systemdetermines that there is another adjacent node, C, and in step 208 thesystem determines whether there is a known cost traveling to C from theorigin already known. The cost of traveling from the origin to E to C is9. Since there is no known lower cost from traveling from the origin toC, C is added to the priority queue and the visited list. At this pointthere are no more adjacent nodes to node E and node E is removed fromthe queue (step 212). Table 5 reflects the current state of the originpriority queue at this point in the method.

                  TABLE 5                                                         ______________________________________                                        Origin                                                                        Priority Queue   Origin Visited List                                          Node      Key    Cost        Prev Prev                                        ______________________________________                                        A         6      A           6    B                                           G         7      B           3    O                                           F         7      C           9    E                                           C         9      E           5    B                                                            F           7    E                                                            G           3    O                                                            O           0    --                                          ______________________________________                                    

In Step 214 the system determines that the stopping condition has beenmet. At this point there are three connection nodes. The total cost ofconnection node C is 14, the total cost of connection node F is 11 andthe total cost of connection node E is 11. Since nodes E and F have thelowest total costs of all the connection nodes, nodes E and F areconsidered the best connection nodes. Various alternatives within thescope of the present invention may utilize other definitions of "bestconnection node." The cost of traveling from the origin to the head nodeon the origin priority queue is 6. The cost of traveling from the headnode of the destination priority queue to the destination is 5.Therefore, the cost of traveling to and from the head nodes is eleven,which is equal to the total cost of the best cost connection node, whichis also eleven. Thus, the stopping condition is met and the systembuilds the path in step 216.

The step of building the path is as follows. A rule selects someconnection node. One such rule is to choose the best connection node.The selected connection node K is looked up in the origin visited listand the previous node P₁ on the path from the origin is found. If P₁ isnot the origin, then P₁ is looked up in the visited list and theprevious node P₂ is found. This continues until the origin is reached.Suppose the origin is reached as node P_(L). Similarly, K is looked upin the destination visited list and the next node N₁ is found. If N₁ isnot the destination, then N₁ is looked up in the visited list Thiscontinues until the destination is reached. Suppose the destination isreached as node N_(M). At this point the path from the origin to thedestination is known: it is the path from P_(L) (the origin) to P_(L-1),to P_(L-2), . . . , to P₂, to P₁, to K, to N₁, . . . , to N_(M-1), toN_(M) (the destination).

In the present example, nodes E and F were both the best connectionnodes. The system arbitrarily picks node E. Looking at the visited listin Table 5, the best known cost of traveling from the origin to node Einvolves traveling from node B to node E. Thus, the path being builtwill travel from B to E. The system then finds node B in the visitedlist and determines that the best path to node B is directly from theorigin O. At this point the path built includes traveling from O to B toE. After the system reaches the origin, the system builds a path fromthe connection node to the destination. Looking at the visited list inTable 4, the best path from E to the destination involves traveling fromE to F. Thus, F is added to the path. The visited list also indicatesthat the best path from F to D is directly from F to D. Thus, the pathbuilt is O-B-E-F-D.

Many automotive navigation systems that perform pathfinding calculationswill typically have a means for caching map data. For example, a portionof the DRAM Memory 18 will be dedicated to act as a cache forpathfinding purposes. When the system looks at adjacent nodes in step206, it needs to access data for that node. The system will first lookin the cache portion of DRAM Memory 18. If the node information is foundin DRAM Memory 18 the system reads that information and proceeds tocarry out the steps in the method. If the data is not found in the cacheportion of DRAM Memory 18, then the system will access the electronicmap database which may be on a CD-ROM. Other processor readable storagemedia sufficiently local to the processor can also be used to cachedata.

In some systems, the pathfinding computation is speeded up by notconsidering all nodes to which a head node is connected to. Rather, theexploration is limited to certain neighboring nodes. One such methodclassifies nodes according to the importance of the roads on which theyoccur, and progressively restricts the use of neighboring nodes as adistance from the origin (or to the destination) increases. For example,if the cost measure being used is an estimate of driving time, theexploration might not use residential-level roads more than two minutes'driving time from the origin or destination, nor use arterial-levelroads more than ten minutes' driving time from the origin ordestination, and so on.

The present invention loads data into the cache so that some of the dataneeded for the pathfinding computation is already in the cache when thecomputation begins, therefore, saving time accessing the CD-ROM or otherstorage device during the pathfinding computation. FIG. 5 is a flowchart which explains how the current invention can be used as part of apathfinding computation. In step 280 a pathfinding exploration is run inthe background, that is, using available and otherwise unusedcomputation time of the system's processor. This background process is amodified pathfinding computation which loads the cache with some of thedata needed to make a subsequent full pathfinding computation. In onealternative, step 280 can be run as a regular process rather than in thebackground. In another alternative, step 280 can be a full pathfindingcomputation. This background process chooses, automatically, an originin an electronic map without the pathfinding computation being requestedand commences a pathfinding calculation based on that origin. The systemdetermines whether the background process should terminate by testingwhether a stopping condition is met. The details of the stoppingcondition will be discussed below with respect to FIG. 6. If thestopping condition is not met, the background process continues. If thestopping condition is met, the system can terminate the backgroundprocess and wait for a path to be requested by a user, start a newbackground process without purging the cache, purge the cache and starta new background process, wait a specified amount of time and start anew background process, or perform another suitable alternative. If auser requests a path while the background process is running, thebackground process 280 will be terminated and the pathfindingcalculation will commence (step 286). In alternative embodiments, whenthere is a request by a user to find a path, the system may allow thebackground process to finish its course, or the background process canstop and perform a second exploration (described below) prior tocommencing the requested pathfinding computation. As described below,background process 280 loads data in the cache so that some of the dataneeded for pathfinding computation 286 is already in the cache whenpathfinding computation 286 begins.

FIG. 6 is a flow chart which describes the background process (step280). In step 302 the system chooses an origin. Each iteration of thebackground process consists of exploring outward from an origin,determined by a reference to the current and recent positions of thevehicle. In some applications of the invention, the origin is simply thecurrent position of the vehicle when the background process begins. Inother applications, the origin is a position intended to be an estimateof a future position of the vehicle. For example, a system mightconsider the distance between the current position of the vehicle andthe position of the vehicle when the previous background processstarted, multiply that distance by some constant (for example, 0.5 or1), extrapolate that distance further down the current road, and usethat extrapolated position as the origin of the new exploration. Thestep of determining or choosing the origin is done automatically withoutthe user requesting that a pathfinding computation begin. Additionally,the origin should be a location in the electronic map. In step 304 thedata for the chosen origin is loaded into the cache memory. The presentinvention will work with data stored in sets of data or data that is notgrouped. Various types of "sets of data" are within the scope of thepresent invention. FIG. 6 assumes (for example purposes only) that a setof data is a cluster of data grouped geographically or by connectivity.In step 306 the origin priority queue and origin visited list areinitialized. The background process does not use a destination priorityqueue and visited list because the destination is unknown.

It is contemplated that in some embodiments, a destination can beestimated and, thus, the destination queue would be set up. Theestimated destination can be used to bias the exploration. However, inthe preferred embodiment there is no destination known and, thus, nodestination priority queue. Since the destination is not known, the keyin the priority queue cannot utilize information regarding thedestination. Thus, in this example the key for the origin priority queueis the cost of traveling from the origin to the node. In the embodimentwhere the destination is estimated, the key can reflect an estimateddistance to the destination in order to bias the exploration toward thedestination.

In step 308, the system determines whether there is an adjacent node.Step 308 is analogous to step 206. If there is more than one adjacentnode, the system arbitrarily chooses one of those nodes. The systemlooks to see if the data for the adjacent node is in the cache (step310). The data for that node typically includes the following useful forpathfinding: the nodes location, associated links, adjacent nodes,associated costs, etc. If the data for the node is not in the cache, thecluster containing the data for that node is loaded into the cache instep 312. After the cluster is loaded into the cache, or if the data wasalready in the cache, the system determines whether a lower cost forthat particular adjacent node is already known (step 314). Step 314 isanalogous to step 208. If there is not a known lower cost, then thevisited list and priority queue are edited in step 316, similar to whatis performed in step 210. The system loops through steps 308-316 foreach adjacent node. When there are no more adjacent nodes, the head nodein the priority queue is removed in step 318 and a stopping condition istested in step 320. In step 314, if there is a lower cost known, thenthe system loops to step 308.

The stopping condition in step 320 is likely to be different than thestopping condition in step 214. There are many examples of stoppingconditions that are suitable for step 320, including stopping when acertain fraction (or percentage) of the cache has been filed, stoppingwhen a predetermined number of sets of data (or clusters or records)have been loaded in the cache, stopping when a predetermined number ofnodes have been processed, stopping when the cost of the path from theorigin to the node at the head of the priority queue reaches apredetermined threshold, and stopping after a predetermined amount oftime. TIhese are only some examples of stopping conditions that aresuitable for the current invention and many other stopping conditionscan be determined by experimentation and fine-tuning the performance ofthe entire navigation or pathfinding system. If the stopping conditionof step 320 is not met, the system checks adjacent nodes of the currenthead node and steps 308 to 316 are repeated for each adjacent node tothe current head node.

In one embodiment, when the stopping condition of step 320 is met thebackground process ends. In another embodiment, after the stoppingcondition is met a second (or reduced) exploration (step 322) isperformed. In the second exploration, the background process continueswith respect to nodes whose data is already stored in the cache, butignores nodes whose data is not stored in the cache. That is, theexploration deletes ignored nodes from the queue without otherwiseprocessing them. This second exploration has the effect of marking dataas recently used at a very low cost in time since only nodes whoseclusters are already in the cache are processed. Data that is marked asrecently used is generally not removed from the cache until data that isnot marked recently used is removed. The second exploration terminateswhen the priority queue is empty.

FIG. 7 is a flow chart illustrating the second exploration. In step 400,the systems looks to see if there are any adjacent nodes to the currenthead node for which the data is already in the cache. If so, that datais marked as "recently used" (step 402). In step 404 the systemdetermines whether a lower cost for that particular adjacent node isalready known (step 404). Step 404 is analogous to step 314. If there isnot a known lower cost, then the visited list and priority queue areedited in step 406, similar to what is performed in step 316. The systemloops through steps 400-406 for each adjacent node whose data is in thecache. When there are no more adjacent nodes with data in the cache, thehead node in the priority queue is removed in step 408 and a stoppingcondition is tested in step 410. Step 408 is analogous to step 318. Ifthe stopping condition is met, the method of FIG. 7 is done. If thestopping condition of step 410 is not met, the system loops to step 400.The stopping condition can include stopping after a number of nodes havebeen processed, after a predetermined amount of time has passed, whenthe queue is empty or other suitable conditions. One alternativecontemplates no stopping condition. That is the second exploration willcontinue until a user requests that a path be calculated or there are nomore nodes to process. At any time during the steps of FIGS. 6 and 7, ifa user requests that a path be calculated background process 280terminates and pathfinding computation 286 begins. When pathfindingcomputation 286 is performed, some of the data needed to compute thepath has already been loaded into the cache during step 280; therefore,the pathfinding computation may use at least some of the data in thecache in lieu of accessing the map database. For example, the data forthe origin and/or adjacent nodes may be in the cache so a CD-ROM neednot be accessed to perform some of the steps of FIG. 4.

The following discussion illustrates the method described in FIG. 6using the electronic map (or other network) of FIG. 3. Assume forexemplar purposes that a driver in a car is traveling from G to O whenbackground process 280 commences and the system chooses O as its origin(step 302). The cluster including data for origin O is loaded from aCD-ROM into the cache (step 304) and the queues are initialized (step306). Origin O has three adjacent nodes: A, B and G (step 308). Thesystem arbitrarily chooses node A and looks to see if the data for nodeA is in the cache (step 310). As discussed above, a cluster may containdata for more than one node. For exemplar purposes only we will assumethat a first cluster includes data for nodes O and G, a second clusterincludes data for nodes A, C and D and a third cluster includes data fornodes B, E and F.

The system determines that data for node A is not in the cache (step310) and, therefore, loads the cluster which includes the data for nodeA into the cache (step 312). In step 314, the system determines whetherthere is a lower cost node on the visited list or the priority queue forthe adjacent node picked, which in this case is A. Since the explorationhas just begun, node A is not on the visited list or the priority queueso there is not a known cost. In step 316, the system edits the visitedlist and the priority queue to add node A and its cost. The method loopsback to step 308 to determine whether there any additional nodes thathave not been considered. In this case there are two adjacent nodes thathave not been considered: B and G. The system arbitrarily chooses node Bfor the next iteration of steps 308 through 316.

In step 310 the system determines whether the data for node B is alreadyin the cache. Since the data for node B is in the third cluster whichhas not been loaded into the cache, in step 312, the system loads thethird cluster (data for nodes B, E and F) into the cache. In step 314the system determines whether there is a lower known cost for node B.Since B does not appear on the priority queue or the visited list thereis no lower cost known (step 314), and node B is added to the priorityqueue and visited list (step 316). The system loops back to step 308 andconsiders node G. Since the data for node G is in the same cluster asthe data for origin O there is no need to load a new cluster in. Becausethere is no known cost lower than the cost of traveling directly fromorigin O to G, G is added to the priority queue and visited list. Thesystem loops back to step 308 and determines that there are no moreadjacent nodes; therefore, in step 318 the head node, which is currentlythe origin, is removed from the priority queue. Table 1 (above) reflectsthe contents of the origin priority queue and the visited list at thispoint in the exploration.

In step 320 the system determines whether a stopping condition hasoccurred. Assume for this example only that the stopping condition ismet when 6 nodes have been processed. At the present state of theexploration, the stopping condition (step 320) is not met because onlyfour nodes have been processed: G, O, A and B. Since the stoppingcondition is not met the system loops back to step 308 which looks atthe adjacent nodes to the head node, which is currently node B. Theadjacent nodes to node B are nodes A and E, and the system arbitrarilychooses node A. The data for node A is already in the cache and so thesystem skips step 312 and determines whether there is a lower cost knownfor node A (step 314). Although node A does appear in the visited listwith the cost of 9, the cost of traveling from the origin to node A vianode B is 6, which is lower than the cost of traveling from origin Odirectly to node A. Therefore, in step 316 the visited list and priorityqueue are edited so that the cost of traveling to node A is 6 and B isinserted into the visited list as the previous node for node A.

The system loops back to step 308 and determines that there is anotheradjacent node, E. The data for node E is in the same cluster as the datafor node B, which is already loaded into the cache; therefore, step 312is skipped. In step 314, the system determines that there is not a lowercost known for node E and the priority queue and visited list are editedto include node E (step 316). Node B is then removed from the priorityqueue (step 318). Table 3 (above) reflects the current state of theorigin priority queue and the visited list after node B is removed fromthe priority queue. At this point, the stopping condition fails becauseonly 5 nodes have been processed and the stopping condition requiresthat 6 nodes be processed.

The system loops back to step 308 and determines that the head node onthe origin priority queue, node E, has two adjacent nodes: C and F. Thesystem arbitrarily chooses node F, whose data has already loaded intothe cache. Since F is not on the origin priority queue, there cannot bea lower known cost (step 314). The cost of traveling from the origin toF via E, which is 7, is added to the origin priority queue and thevisited list (step 316). In step 308 the system determines that there isanother adjacent node, C, whose data has already been loaded into thecache (second cluster). The system determines that a lower cost is notknown for traveling from the origin to C (step 314) and C is added tothe priority queue and the visited list (step 316). At this point thereare no more adjacent nodes (step 308) and node E is removed from thequeue (step 318). Table 5 reflects the current state of the originpriority queue and the visited list at this point in the exploration.

In step 320 the system determines that the stopping condition has beenmet. The stopping condition requires that at least 6 nodes have beenprocessed and the system determines that 7 nodes have been processed.Since the stopping condition has been met the background process isover. As discussed above, one alternative includes beginning a secondexploration (step 322) after the stopping condition is met. The secondexploration of step 322 continues the exploration for only those nodeswhose data is already in the cache. In the current example, the nodeswith data in the cache include nodes G, O, A, C, D, B, E and F. Theinventors contemplate that background process 280 can be implementedwith or without the second exploration. After the background process isterminated, it is possible that a pathfinding computation will commence.If, for example, the pathfinding computation is computing a path from Oto D, then when considering nodes G, O, A, C, D, BY E and F in steps202-216, the system will read the data from the cache without having toaccess the map database.

Although the examples used above to describe the present invention weredirected to an electronic map of roads, the present invention alsoapplies to other processor readable representations of networks. Anetwork is defined in its most general sense as something that includesa number of paths that interconnect or branch out. Many systems thatinvolve decisions can be modeled as a network. A network can berepresented in electronic form (or other processor readable form) andstored on a processor readable storage medium so that software can becreated for using the network. Suitable networks include graphs of amanufacturing process, intermodal travel plan (e.g., a graphrepresenting travel between points via airplanes, trains, automobiles,buses, etc.), a system for providing medical treatment, etc. Forexample, if the network represents a manufacturing process, the nodesmay represent decision points in the process (e.g. which station totransport the article of manufacture or which semiconductor process touse), and the links can represent process time or manufacturing costs.

The foregoing detailed description of the invention has been presentedfor purposes of illustration and description. It is not intended to beexhaustive or to limit the invention to the precise form disclosed, andobviously many modifications and variations are possible in light of theabove teaching. The described embodiment was chosen in order to bestexplain the principles of the invention and its practical application tothereby enable others skilled in the art to best utilize the inventionin various embodiments and with various modifications as are suited tothe particular use contemplated. It is intended that the scope of theinvention be defined by the claims appended hereto.

We claim:
 1. A method for loading data into a processor readable storagemedium, comprising the steps of:choosing, automatically, a first originin a processor readable representation of a network; commencing apathfinding exploration using a processor, said pathfinding explorationexplores from said first origin, said steps of choosing and commencingbeing performed without a pathfinding computation being requested;loading sets of data, as needed by said pathfinding exploration, intosaid processor readable storage medium; terminating said pathfindingexploration when a predefined condition is met; receiving a request tocompute a path from a new origin and a new destination; storing anindication of said new origin and an indication of said new destination;and computing a path from said new origin to said new destination usingat least a subset of said loaded data, said step of computing a pathbeing performed after said step of commencing.
 2. A method according toclaim 1, further including the steps of:choosing, automatically, asecond origin in said processor readable representation of a networkwithout said pathfinding computation being requested; commencing asecond pathfinding exploration using said processor, said secondpathfinding exploration explores from said second origin; loading newsets of data, as needed by said second pathfinding exploration, intosaid processor readable storage medium; and terminating said secondpathfinding exploration when said predefined condition is met.
 3. Amethod according to claim 1, wherein:said predefined condition is metwhen a path is requested.
 4. A method according to claim 1, wherein:saidsteps of choosing, commencing, loading and terminating are performed asa background process.
 5. A method according to claim 1, wherein:saiddata is stored on a CD-ROM; and said step of loading loads said datafrom said CD-ROM into a cache memory.
 6. A method according to claim 1,wherein:said steps of choosing and commencing are performed withoutstoring an indication of a destination.
 7. A method according to claim1, wherein:said processor readable representation of a network is anelectronic map; said electronic map includes a plurality of nodes, eachnode having at least one cost for traveling to or from an adjacent node;and said step of commencing a pathfinding exploration includes:(a)setting up a priority queue and a visited list, said priority queuestores node identifications and keys, said visited list stores nodeidentifications and costs of traveling from said origin; (b)initializing said priority queue to include said origin; (c) finding aset of nodes adjacent to said origin; (d) determining a cost oftraveling to each of said adjacent nodes from said origin; (e) insertingsaid adjacent nodes into said priority queue, sorted by cost; (f)inserting said adjacent nodes into said visited list; (g) removing saidorigin from said priority queue; (h) finding a set of nodes adjacent toa node at said priority queue's head; (i) determining a cost oftraveling to each of said nodes adjacent to said node at said priorityqueue's head; (j) inserting into said priority queue at least a subsetof said nodes adjacent to said node at said priority queue's head; (k)inserting into said visited list, if not already in said visited listwith a lower cost, said nodes adjacent to said node at said priorityqueue's head; and (l) removing from said priority queue said node atsaid priority queue's head.
 8. A method according to claim 7wherein:said key includes a cost of traveling from said origin and saidkey does not include any information about a destination.
 9. A methodaccording to claim 7, wherein:said predefined condition is met when acost for traveling from said origin to said node at said priorityqueue's head reaches a predetermined threshold.
 10. A method accordingto claim 1, wherein:said processor readable representation of a networkis an electronic map.
 11. A method according to claim 10, wherein:saidstep of choosing a first origin chooses a current position of a vehicle.12. A method according to claim 10, wherein:said step of choosing afirst origin chooses a position in said electronic map that is adistance from a current position.
 13. A method according to claim 10,wherein:said sets of data are loaded into a cache memory in saidprocessor readable storage medium.
 14. A method according to claim 13,wherein:said processor readable storage medium is memory; and said cachememory is a portion of said memory.
 15. A method according to claim 13,further including the step of:determining when a predeterminedpercentage of said cache memory is filled, said predefined condition ismet when said predetermined percentage of said cache memory is filled.16. A method according to claim 13, further including the stepof:determining when a predetermined number of nodes have been processed,said predefined condition is met when said predetermined number of nodeshave been processed.
 17. A method according to claim 13, furtherincluding the step of:performing a second exploration, said secondexploration only considers data residing in said cache memory when saidsecond exploration commences, data used by said second exploration ismarked as being recently used.
 18. A method according to claim 13,further including the step of:continuing said pathfinding explorationutilizing data in said cache memory and not loading any additional datainto said cache memory.
 19. A method according to claim 9, wherein:saidstep of continuing is performed after said step of terminating saidpathfinding exploration when a predefined condition is met.
 20. A methodfor computing a path in an electronic representation of a network,comprising the steps of:running a background process for loading networkdata from a mass storage device into a memory, said background processincludes an exploration of said network from a chosen origin and loadingdata needed by said exploration; terminating said background processwhen a stopping condition is met or when a pathfinding calculation isrequested; storing a first origin and a first destination; anddetermining a path from said first origin to said first destination,after terminating said background process, using said network dataloaded into said memory.
 21. A method according to claim 20,wherein:said background process loads data from a CD-ROM to a cache. 22.A method according to claim 19, wherein:said steps of running andterminating are continuously repeated until said step of performing apathfinding calculation is commenced.
 23. An apparatus for pathfinding,comprising:a processor; a memory, in communication with said processor;and a processor readable storage medium; in communication with saidprocessor and said memory; said processor programmed to perform themethod of:choosing, automatically, a first origin in an electronic map;commencing a pathfinding exploration, said pathfinding explorationexplores from said first origin, said steps of choosing and commencingbeing performed without a pathfinding computation being requested;loading sets of data, as needed by said pathfinding exploration, fromsaid processor readable storage medium into a cache portion of saidmemory; terminating said pathfinding exploration when a predefinedcondition is met; receiving a request to compute a path from a neworigin and a new destination, storing an indication of said new originand an indication of said new destination, and computing a path fromsaid new origin to said new destination using at least a subset of saiddata loaded in said cache portion of said memory, said step of computingbeing performed after said step of terminating.
 24. An apparatusaccording to claim 23, wherein:said step of choosing includes saidprocessor choosing a position in said electronic map that is a distancefrom a current position of a vehicle.
 25. An apparatus according toclaim 23, wherein said method further includes the step of:determiningwhen a predetermined amount of data is loaded in said memory saidpredefined condition is met when said predetermined amount of data isloaded in said memory.
 26. An apparatus according to claim 23, whereinis said method further includes the steps of:choosing, automatically, anew origin in said electronic map without said pathfinding computationbeing requested; commencing a second pathfinding exploration using saidprocessor; loading new sets of data, as needed by said secondpathfinding exploration, from said processor readable storage mediuminto said cache portion of said memory; and terminating said secondpathfinding exploration when said predefined condition is met.
 27. Amethod for loading data for pathfinding, comprising the stepsof:choosing, automatically, a first origin in an electronic map;commencing a pathfinding exploration using a processor, said pathfindingexploration explores from said first origin, said steps of choosing andcommencing being performed without a destination being indicated;loading data, as needed by said pathfinding exploration, into a cachememory; terminating said pathfinding exploration when a predefinedcondition is met; storing a new origin and a new destination; andcomputing a path from said new origin to said new destination using atleast a subset of said data loaded in said cache memory, said step ofcomputing being performed after said step of commencing.
 28. A processorreadable storage medium, said processor readable storage medium havingprocessor readable program code embodied on said processor readablestorage medium, said processor readable program code for programming aprocessor to perform a method comprising the steps of:choosing,automatically, a first origin in an electronic map; commencing apathfinding exploration using a processor, said pathfinding explorationexplores from said first origin, said steps of choosing and commencingbeing performed without a pathfinding computation being requested;loading data, as needed by said pathfinding exploration, into saidprocessor readable storage medium; terminating said pathfindingexploration when a predefined condition is met; receiving a request tocompute a path from a new origin and a new destination storing anindication of said new origin and an indication of said new destination;and computing a path from said new origin to said new destination usingat least a subset of said loaded data, said step of computing beingperformed after said step of commencing.
 29. A processor readablestorage medium according to claim 28, wherein:said data is loaded into acache memory; and said cache memory is a portion of main memory.
 30. Aprocessor readable storage medium according to claim 28, wherein saidmethod further includes the step of:determining when a predeterminedpercentage of said processor readable storage medium is filled, saidpredefined condition is met when said predetermined percentage of saidprocessor readable storage medium is filled.
 31. A processor readablestorage medium according to claim 28, wherein:said data is stored in aCD-ROM; and said step of loading loads said data from said CD-ROM into acache memory.
 32. A processor readable storage medium according to claim28, wherein:said steps of choosing and commencing are performed withoutstoring an indication of a destination.
 33. A processor readable storagemedium according to claim 28, wherein said method further includes thestep of:performing a second exploration, said second exploration onlyconsiders data residing in said processor readable storage medium whensaid second exploration commences, data used by said second explorationis marked as being recently used.
 34. A processor readable storagemedium according to claim 28, wherein:said steps of choosing,commencing, loading and terminating are performed as a backgroundprocess.