Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

A polynomial time generator for minimal perfect hash functions

Published: 01 May 1985 Publication History

Abstract

A perfect hash function PHF is an injection F from a set W of M objects into the set consisting of the first N nonnegative integers where N ⩾ M. If N = M, then F is a minimal perfect hash function, MPHF. PHFs are useful for the compact storage and fast retrieval of frequently used objects such as reserved words in a programming language or commonly employed words in a natural language.
The mincycle algorithm for finding PHFs executes with an expected time complexity that is polynomial in M and has been used successfully on sets of cardinality up to 512. Given three pseudorandom functions h0, h1, and h2, the mincycle algorithm searches for a function g such that F(w) = (h0(w) + g ° h1(w) + g ° h2(w)) mod N is a PHF.

References

[1]
Chang. C.C. The study of an ordered minimal perfect hashing
[2]
Cichelli. R.). Minimal perfect hash functions made simple. Commun. ACM 23, 1 (Jan. 1980). 17-19.
[3]
Dewey. G. Relativ Frequency of English Speech Sounds. Harvard University Press, Cambridge, Mass. 1923.
[4]
Harary. F. Graph Theory. Addison-Wesley, Reading, Mass. 1969.
[5]
Jaeschke, G. and Osterburg, G. On Cichelli's minimal perfect hash functions method. Commun. ACM 23,12 (Dec. 1980), 728-729.
[6]
Jaeschke, G. Reciprocal hashing: A method for generating minimal perfect hashing functions. Commun. ACM 24, 12 (Dec. 1981). 829- 833.
[7]
Sager, T.J. A new method for generating minimal perfect hash functions. Tech. Rep. CSc-64-15, University of Missouri-Rolla, Rolla, MO. Nov. 1984.
[8]
Sprugnoli. R. Perfect hashing functions: A single probe retrieval method for static sets. Commun. ACM 20, 11 (Nov. 1977). 841-850.

Cited By

View all
  • (2021)HIDE: Short IDs for Robust and Anonymous Linking of Users Across Multiple Sessions in Small HCI ExperimentsExtended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411763.3451794(1-6)Online publication date: 8-May-2021
  • (2021)BRIDGE: Administering Small Anonymous Longitudinal HCI Studies with Snowball-Type SamplingHuman-Computer Interaction – INTERACT 202110.1007/978-3-030-85610-6_17(287-297)Online publication date: 30-Aug-2021
  • (2018)Generating a Rotation Reduction Perfect Hashing FunctionMathematics Magazine10.1080/0025570X.1995.1199627168:1(35-41)Online publication date: 11-Apr-2018
  • Show More Cited By

Recommendations

Reviews

Theodore David Brown

Minimal perfect hashing functions have wide application. The unappealing aspect of the solution given here is that the functions h 0, h 1:- 0E, h 2 and g that are the basis for the hashing function F, i.e., F( w) = ( h 0( w) + g:.M- C2 :9D h 1( w) + g 2:9D h 2( w)) mod n have to be guessed at. The author suggests (arbitrarily ): :Ch:A:0I0:0E(:Cw:A):9T=(length( w) + &Sgr; ord( w[ i]), i- = 1 to length ( w) by 3)) h 1( w) =(&Sgr; ord( w[ i]), i := 1 to length ( w) by 2) mod r h 2( w) =(&Sgr; ord( w[ i]), i := 2 to length ( w) by 2) mod r + r where r = smallest power of 2 greater than card ( w)3. (The function g is found by the algorithm; one with appropriate properties always exists.) Sager says that the above choices worked well in most cases (it has been used successfully on sets of cardinality up to 512). An example of when it did not work is for the 40 predeclared identifiers of PASCAL. However, since the function choices have few restrictions, another set of choices did work. This current work is a direct outgrowth of Cichellis algorithm [1].

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 28, Issue 5
May 1985
88 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/3532
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 May 1985
Published in CACM Volume 28, Issue 5

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)62
  • Downloads (Last 6 weeks)5
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2021)HIDE: Short IDs for Robust and Anonymous Linking of Users Across Multiple Sessions in Small HCI ExperimentsExtended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411763.3451794(1-6)Online publication date: 8-May-2021
  • (2021)BRIDGE: Administering Small Anonymous Longitudinal HCI Studies with Snowball-Type SamplingHuman-Computer Interaction – INTERACT 202110.1007/978-3-030-85610-6_17(287-297)Online publication date: 30-Aug-2021
  • (2018)Generating a Rotation Reduction Perfect Hashing FunctionMathematics Magazine10.1080/0025570X.1995.1199627168:1(35-41)Online publication date: 11-Apr-2018
  • (2018)Exclusive grouped spatial hashingComputers & Graphics10.1016/j.cag.2017.08.01270(71-79)Online publication date: Feb-2018
  • (2009)An efficient hash-based searching for specimens in the museum's exhibitProceedings of the 3rd International Conference on Ubiquitous Information Management and Communication10.1145/1516241.1516251(45-50)Online publication date: 15-Feb-2009
  • (2007)Perfect hash functions for large dictionariesProceedings of the ACM first workshop on CyberInfrastructure: information management in eScience10.1145/1317353.1317368(67-72)Online publication date: 9-Nov-2007
  • (2006)Perfect spatial hashingACM SIGGRAPH 2006 Papers10.1145/1179352.1141926(579-588)Online publication date: 30-Jul-2006
  • (2006)Perfect spatial hashingACM Transactions on Graphics10.1145/1141911.114192625:3(579-588)Online publication date: 1-Jul-2006
  • (2005)Graphs, hypergraphs and hashingGraph-Theoretic Concepts in Computer Science10.1007/3-540-57899-4_49(153-165)Online publication date: 26-May-2005
  • (2005)Minimal perfect hashing for large sets of dataAdvances in Computing and Information — ICCI '9010.1007/3-540-53504-7_85(275-284)Online publication date: 7-Jun-2005
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media