Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/800116.803765acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

Hashing schemes for extendible arrays (Extended Abstract)

Published: 05 May 1975 Publication History

Abstract

The use of hashing schemes for storing extendible arrays is investigated. It is shown that extendible hashing schemes whose worst-case access behavior is close to optimal must utilize storage inefficiently; conversely, hashing schemes that utilize storage too conservatively are inevitably poor in expected access time. If requirements on the utilization of storage are relaxed slightly, then one can find rather efficient extendible hashing schemes. Specifically, for any dimensionality of arrays, one can find extendible hashing schemes which at once utilize storage well [fewer than 2p storage locations need be set aside for storing arrays having p or fewer positions] and enjoy good access characteristics [expected access time is 0(1), and worst-case access time is 0(log log p) for p- or fewer-position arrays]. Moreover, at the cost of only an additive increase in access time, storage demands can be decreased to (l+ε)p locations for arbitrary ε>0. In fact, if one will abide a more drastic degradation of access efficiency, one can lower storage demands to p+o(p) locations.

References

[1]
A. L. Rosenberg, Allocating storage for extendible arrays. JACM, 21 (1974) 652-670.
[2]
A. L. Rosenberg, Managing storage for extendible arrays. SIAM J. Comput., to appear.
[3]
D. E. Knuth, The Art of Computer Programming I: Fundamental Algorithms, Addison-Wesley, Reading, Mass., 1968.
[4]
E.v.d.S. de Villiers and L. B. Wilson, Hash coding methods for sparse matrices. Tech. Rpt. 45, Univ. of Newcastle-upon-Tyne (Computing Lab.), May, 1973. See also, Hashing the subscripts of a sparse matrix. BIT, 14 (1974) 347-358.
[5]
L. J. Stockmeyer, Extendible array realizations with additive traversal. IBM Report RC-4578, 1973.
[6]
A. L. Rosenberg, Computed access in ragged arrays. in Information Processing 74 (J. Rosenfeld, ed.) North-Holland, Amsterdam, 1974, pp. 642-646.
[7]
D. E. Knuth, The Art of Computer Programming III: Sorting and Searching, Addison-Wesley, Reading, Mass., 1973.
[8]
O. Amble and D. E. Knuth, Ordered hash tables. Comput. J., 17 (1974) 135-142.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '75: Proceedings of the seventh annual ACM symposium on Theory of computing
May 1975
265 pages
ISBN:9781450374194
DOI:10.1145/800116
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 May 1975

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Acceptance Rates

STOC '75 Paper Acceptance Rate 31 of 87 submissions, 36%;
Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)31
  • Downloads (Last 6 weeks)7
Reflects downloads up to 01 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media