A combinatorial analysis of the average time for open-address hash coding insertion
نویسنده
چکیده
In analysing a well-known hash-coding method, Knuth gave an exact expression for the average number of rejections encountered by players of a variant of musical chairs. We study a variant more closely related to musical chairs itself and deduce the same expression by a purely combinatorial approach. In an analysis of the average time to insert an item when using openaddress hash-coding, Knuth [1, p. 528-530] reduced the problem to the following question about musical chairs. Givenm chairs arranged in a circle and numbered clockwise from 0 to m− 1, if in turn each of n people arrives at a randomly selected chair (his initial chair) and walks clockwise until he finds an empty chair (his final chair), what is the average number of rejections (chairs found occupied during the search) per player? For m ≥ n, Knuth showed that the average number of rejections is
منابع مشابه
On the insertion time of random walk cuckoo hashing
Cuckoo Hashing is a hashing scheme invented by Pagh and Rodler [9]. It uses d ≥ 2 distinct hash functions to insert items into the has table. It has been an open question for some time as to the expected time for Random Walk Insertion to add items. We show that if the number of hash functions d = O(1) is sufficiently large, then the expected insertion time is O(1) per item.
متن کاملOn Hash - Coding Algorithms
We examine the efficiency of generalized hash-coding algorithms for performing partial-match searches of a random--access file of binary words. A precise charac terization is given of those hash functions which minimize the average number of buckets examined for a search ; and a new class of combinatorial designs is introduced which permits the construction of hash functions with worst-case be...
متن کاملA Cuckoo Filter Modification Inspired by Bloom Filter
Probabilistic data structures are so popular in membership queries, network applications, and so on. Bloom Filter and Cuckoo Filter are two popular space efficient models that incorporate in set membership checking part of many important protocols. They are compact representation of data that use hash functions to randomize a set of items. Being able to store more elements while keeping a reaso...
متن کاملToward a Model for Risks of Change Management Process in Teaching Hospitals
Introduction: Teaching Hospitals are constantly confronted with environmental changes that are forcing them to implement change management. However, there are risks that make this process unsuccessful. Therefore, the purpose of this study was explanation of the model of change management process risks in the teaching hospitals. Methods: This qualitative study was conducted through grounded the...
متن کاملHash-Based Data Structures for Extreme Conditions
This thesis is about the design and analysis of Bloom filter and multiple choice hash table variants for application settings with extreme resource requirements. We employ a very flexible methodology, combining theoretical, numerical, and empirical techniques to obtain constructions that are both analyzable and practical. First, we show that a wide class of Bloom filter variants can be effectiv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1208.5956 شماره
صفحات -
تاریخ انتشار 2012