Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Storing a Sparse Table with 0(1) Worst Case Access Time

Published: 26 June 1984 Publication History
First page of PDF

References

[1]
JAESCHKE, G.Reciprocal hashing: A method for generating miaimal perfect hashing funcaons. Commun. ACM 24, 12 (Dec. 1981), 829-833.
[2]
SPRUGNOLI, R. Perfect hashing functions: A single probe retrieving method for static sets. Commun. ACM 20, 11 (Nov. 1977), 841-850.
[3]
TAP, JAN, R. E., AND YAO, A. C.-C.Storing a sparse table. Commun. ACM 21, 11 (Nov, 1979), 606-611.
[4]
YAO, A. C.-C. Should tables be sorted? J. ACM 28, 3 (July 1981), 615-628.

Cited By

View all
  • (2024)Deterministic Replacement Path CoveringACM Transactions on Algorithms10.1145/367376020:4(1-35)Online publication date: 5-Aug-2024
  • (2024)Parallel and External-Memory Construction of Minimal Perfect Hash Functions With PTHashIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.330334136:3(1249-1259)Online publication date: 1-Mar-2024
  • (2024)Pattern Masking for Dictionary Matching: Theory and PracticeAlgorithmica10.1007/s00453-024-01213-886:6(1948-1978)Online publication date: 1-Jun-2024
  • Show More Cited By

Recommendations

Reviews

William Fennell Smyth

This important little paper describes methods which almost achieve for searching n items what heapsort achieves for sorting: worst case execution time at the theoretical minimum order of magnitude using only n storage locations. The main idea is to store the items in a two-tier data structure, where the first tier consists of pointers to the second; the second tier consists of blocks, each of which typically contains one or two of the n items arranged so as to be directly accessible by a perfect hashing function. The authors first describe the basic method, which guarantees 0(1) worst case execution time using 0( n) storage locations. At the cost of multiplying storage requirements by a constant factor, the basic data structure may be updated in “expected” time 0( n). Applying an auxiliary data structure attributed to Tarjan and Yao [1], the authors then show how the basic method may be modified to reduce storage requirement to n+ o( n) locations, while at the same time maintaining 0(1) execution time. Other possible variations on the basic method are briefly described. Although the data structure is certainly of more than theoretical interest, no implementation of update/retrieval algorithms is given or discussed. The use of the term “sparse” in the title really disguises the importance and generality of the methods described since, as the authors point out, the methods apply independent of the sparseness of the n items in their universe of items.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

cover image Journal of the ACM
Journal of the ACM  Volume 31, Issue 3
July 1984
236 pages
ISSN:0004-5411
EISSN:1557-735X
DOI:10.1145/828
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 June 1984
Published in JACM Volume 31, Issue 3

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)515
  • Downloads (Last 6 weeks)51
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Deterministic Replacement Path CoveringACM Transactions on Algorithms10.1145/367376020:4(1-35)Online publication date: 5-Aug-2024
  • (2024)Parallel and External-Memory Construction of Minimal Perfect Hash Functions With PTHashIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.330334136:3(1249-1259)Online publication date: 1-Mar-2024
  • (2024)Pattern Masking for Dictionary Matching: Theory and PracticeAlgorithmica10.1007/s00453-024-01213-886:6(1948-1978)Online publication date: 1-Jun-2024
  • (2024)Predecessor on the Ultra-Wide Word RAMAlgorithmica10.1007/s00453-023-01193-186:5(1578-1599)Online publication date: 10-Jan-2024
  • (2024)Near-Optimal Search Time in -Optimal Space, and Vice VersaAlgorithmica10.1007/s00453-023-01186-086:4(1031-1056)Online publication date: 1-Apr-2024
  • (2024)A Deterministic Parallel Reduction from Weighted Matroid Intersection Search to DecisionAlgorithmica10.1007/s00453-023-01184-286:4(1057-1079)Online publication date: 1-Apr-2024
  • (2024)Elastic-Degenerate String Matching with 1 Error or MismatchTheory of Computing Systems10.1007/s00224-024-10194-868:5(1442-1467)Online publication date: 1-Oct-2024
  • (2023)Two-Way Linear Probing RevisitedAlgorithms10.3390/a1611050016:11(500)Online publication date: 28-Oct-2023
  • (2023)Text Indexing for Long Patterns: Anchors are All you NeedProceedings of the VLDB Endowment10.14778/3598581.359858616:9(2117-2131)Online publication date: 1-May-2023
  • (2023)Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted ArchitectureACM Computing Surveys10.1145/361782456:3(1-40)Online publication date: 5-Oct-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media