دورية أكاديمية

Iceberg Hashing: Optimizing Many Hash-Table Criteria at Once.

التفاصيل البيبلوغرافية
العنوان: Iceberg Hashing: Optimizing Many Hash-Table Criteria at Once.
المؤلفون: BENDER, MICHAEL A., CONWAY, ALEX, FARACH-COLTON, MARTÍN, KUSZMAUL, WILLIAM, TAGLIAVINI, GUIDO
المصدر: Journal of the ACM; Dec2023, Vol. 70 Issue 6, p1-51, 51p
مصطلحات موضوعية: ICEBERGS, COMPUTER science
مستخلص: Despite being one of the oldest data structures in computer science, hash tables continue to be the focus of a great deal of both theoretical and empirical research. A central reason for this is that many of the fundamental properties that one desires from a hash table are difficult to achieve simultaneously; thus many variants offering different trade-offs have been proposed. This article introduces Iceberg hashing, a hash table that simultaneously offers the strongest known guarantees on a large number of core properties. Iceberg hashing supports constant-time operationswhile improving on the state of the art for space efficiency, cache efficiency, and low failure probability. Iceberg hashing is also the first hash table to support a load factor of up to 1-o(1) while being stable, meaning that the positionwhere an element is stored only ever changes when resizes occur. In fact, in the setting where keys are T(logn) bits, the space guarantees that Iceberg hashing offers, namely that it uses at most log x |U | n x +O(n log logn) bits to store n items froma universeU, matches a lower bound by Demaine et al. that applies to any stable hash table. Iceberg hashing introduces new general-purpose techniques for some of the most basic aspects of hashtable design. Notably, our indirection-free technique for dynamic resizing, which we call waterfall addressing, and our techniques for achieving stability and very-high probability guarantees, can be applied to any hash table that makes use of the front-yard/backyard paradigm for hash table design. [ABSTRACT FROM AUTHOR]
Copyright of Journal of the ACM is the property of Association for Computing Machinery and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index
الوصف
تدمد:00045411
DOI:10.1145/3625817