Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/73007.73041acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

On aspects of university and performance for closed hashing

Published: 01 February 1989 Publication History
  • Get Citation Alerts
  • Abstract

    We consider two hashing models for storing a set S ⊂ {0, 1, 2, …, m - 1} in a table T of size n.
    The first model uses universal hashing for a partially loaded table. A set of hash functions is universal if, for any the input set, a randomly selected function has an efficient expected performance. Universal hash functions originate in [CW79], where they were used for open hashing using chaining. [CW79] poses as an open question whether comparable results can be achieved for any closed hashing schemes.
    The second model is perfect hashing for a full table. In preprocessing the input set is used to determine a hash function that achieves some desired performance criteria. This model was used among others in [ME82] and [FKS84].
    In both models a key problem is to construct a “small” set of functions, which will permit a short description (program) for each function in the set.
    We show, for the first time, that universal hashing can be successfully used for closed hashing and in particular for double hashing. Specifically, the set of congruential polynomials of Ο(log n) degree is universal for double hashing if the table load is below .75; the program size (or number of random bits generated by the algorithm) is Ο(log log m + log2 n).
    For perfect hashing, we obtain nearly tight results on the size of oblivious Ο(1)-probe hash functions:
    Oblivious k-probe hash functions require Ω(n/k2e-k + log log m) bits of description.
    A probabilistic construction is presented, which shows that oblivious k-probe hash functions, can be specified in Ο(ne-k + log log m) bits, which nearly matches the above lower bound.
    We give a variation of an Ο(1) time 1-probe (perfect) hash function that can be specified in Ο(n + log log m) bits, which is tight to within a constant factor of the lower bound.
    In view of the adaptive schemes presented in [FNSS88], these bounds establish a significant gap between oblivious and non-oblivious Ο(1)-probe search.

    References

    [1]
    M. Ajtai. "A Lower Bound for Finding Predecessors in Yao's Cell Probe Model," IBM RJ 4867 (51297) 10/3/85, Computer Science.
    [2]
    F. Berman, M.E. Bock, E. Dittert, M.J. O'Donnell and D. Plank. "Collections of Functions for Perfect Hashing," SiAM Journal on Computing, Vol 15, No. 2, May 1986, pp. 604-618. July 1984, pp. 538-544.
    [3]
    J. L. Carter and M. N. Wegman "Universal Classes of Hash Functions," Journal of Computer and System Sciences 18, pp. 143-154 (1979).
    [4]
    M. Dietzfelbinger, A. Karlin, K. Mehlhorn, F. Meyer auf der Heide, H. Rohnert, and R.E. Tarjan. "Dynamic Perfect Hashing: Upper and Lower Bounds," 29th Annual Symposium on the Foundations of Computing, 1988, pp. 524-531.
    [5]
    A. Fiat and M. Naor. Personal communication, 1988.
    [6]
    A. Fiat and M. Naor. "Implicit O(1) Probe Search," these Proceedings.
    [7]
    A. Fiat, M. Naor, J. P. Schmidt and A. Siegel. "Non-Oblivious Hashing," Proc. 20th ACM Symp. on Theory of Computing, 1988.
    [8]
    M.L. Fredman. Personal communication, 1988.
    [9]
    M.L. Fredman and J. Koml6s. "On The Size Of Separating Systems And Families Of Perfect Hash Functions," SIAM Journal of Algebraic and Discrete Methods, Vo} 5, No. 1, March 1984, pp. 61-68.
    [10]
    M.L. Fredman, J. Koralbs and E. Szemer~di. "Storing a Sparse Table with O(1) Worst Case Access Time," Journal of the Association for Computing Machinery, Vol 31, No. 3, July 1984, pp. 538-544.
    [11]
    J.E. Hopcroft and R.M. Karp. "An n5/2 Algorithm for Maximum Match~ngs in Bipartite Graphs," SIAM Journal on Computing, Vol 2, No. 4, (1973), pp. 225-231.
    [12]
    C.T.M. Jacobs and P. van Emde Boas. "Two Results on Tables," Information Processing Letters 22 (1986), pp. 43-48.
    [13]
    G. Lueker and M. Molodowitch. "More Analysis of Double Hashing," 20th Annual Symposium on Theory of Computing, May, 1988, pp. 354- 359.
    [14]
    H. G. Mairson. "The Program Complexity of Searching a Table," 24th Symposium on Foundation of Computer Science, November, 1983.
    [15]
    H. G. Mairson. "The Program Complexity of Searching a Table," PhD Dissertation, Stanford, 1984, STAN-CS-83-988.
    [16]
    K. Mehlhorn. "On the Program size of Perfect and Universal Hash functions," Proc. 23rd Ann. Symp. on Foundations of Computer Science, 1982, pp. 170-175.
    [17]
    K. Mehlhorn. Data Structures and Algorithms 1: Sorting and Searching, Springer-Verlag, Berlin Heidelberg, 1984.
    [18]
    C. Slot and P. van Emde Boas. "On Tape versus Core; An Application of Space Efficient Hash Functions to the Invariance of Space," 16th Annual symposium on Theory of Computing, May, 1984.
    [19]
    R.E. Tarjan and A.C. Yao. "Storing a Sparse Table," Communications of the ACM, Vol 22, No. 11, November 1978, pp. 606-611.
    [20]
    M. N. Wegman and J. L. Carter. "New Classes and Applications of Hash Functions," 20th Annual Symposium on Foundations of Computer Science, October 1979, pp. 175-182.
    [21]
    A.C. Ygo. "Should Tables Be Sorted?," Journal of the Association for Computing Machinery, Vol 28, No. 3, July 1981, pp. 615-628.

    Cited By

    View all
    • (2007)Perfect hash functions for large dictionariesProceedings of the ACM first workshop on CyberInfrastructure: information management in eScience10.1145/1317353.1317368(67-72)Online publication date: 9-Nov-2007
    • (2005)Graphs, hypergraphs and hashingGraph-Theoretic Concepts in Computer Science10.1007/3-540-57899-4_49(153-165)Online publication date: 26-May-2005
    • (2003)Uniform hashing in constant time and linear spaceProceedings of the thirty-fifth annual ACM symposium on Theory of computing10.1145/780542.780633(622-628)Online publication date: 9-Jun-2003
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    STOC '89: Proceedings of the twenty-first annual ACM symposium on Theory of computing
    February 1989
    600 pages
    ISBN:0897913078
    DOI:10.1145/73007
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 February 1989

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Conference

    STOC89
    Sponsor:
    STOC89: 21st Annual ACM Symposium on the Theory of Computing
    May 14 - 17, 1989
    Washington, Seattle, USA

    Acceptance Rates

    STOC '89 Paper Acceptance Rate 56 of 196 submissions, 29%;
    Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)38
    • Downloads (Last 6 weeks)10
    Reflects downloads up to 10 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2007)Perfect hash functions for large dictionariesProceedings of the ACM first workshop on CyberInfrastructure: information management in eScience10.1145/1317353.1317368(67-72)Online publication date: 9-Nov-2007
    • (2005)Graphs, hypergraphs and hashingGraph-Theoretic Concepts in Computer Science10.1007/3-540-57899-4_49(153-165)Online publication date: 26-May-2005
    • (2003)Uniform hashing in constant time and linear spaceProceedings of the thirty-fifth annual ACM symposium on Theory of computing10.1145/780542.780633(622-628)Online publication date: 9-Jun-2003
    • (2001)Anti-persistenceProceedings of the thirty-third annual ACM symposium on Theory of computing10.1145/380752.380844(492-501)Online publication date: 6-Jul-2001
    • (1993)Chernoff-Hoeffding bounds for applications with limited independenceProceedings of the fourth annual ACM-SIAM symposium on Discrete algorithms10.5555/313559.313797(331-340)Online publication date: 1-Jan-1993
    • (1993)More analysis of double hashingCombinatorica10.1007/BF0120279113:1(83-96)Online publication date: Mar-1993
    • (1992)Practical minimal perfect hash functions for large databasesCommunications of the ACM10.1145/129617.12962335:1(105-121)Online publication date: 2-Jan-1992
    • (1990)The analysis of closed hashing under limited randomnessProceedings of the twenty-second annual ACM symposium on Theory of Computing10.1145/100216.100245(224-234)Online publication date: 1-Apr-1990
    • (1989)On universal classes of fast high performance hash functions, their time-space tradeoff, and their applicationsProceedings of the 30th Annual Symposium on Foundations of Computer Science10.1109/SFCS.1989.63450(20-25)Online publication date: 30-Oct-1989

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media