Tight Thresholds for Cuckoo Hashing via XORSAT

نویسندگان

  • Martin Dietzfelbinger
  • Andreas Goerdt
  • Michael Mitzenmacher
  • Andrea Montanari
  • Rasmus Pagh
  • Michael Rink
چکیده

Abstract. We settle the question of tight thresholds for offline cuckoo hashing. The problem can be stated as follows: we have n keys to be hashed into m buckets each capable of holding a single key. Each key has k ≥ 3 (distinct) associated buckets chosen uniformly at random and independently of the choices of other keys. A hash table can be constructed successfully if each key can be placed into one of its buckets. We seek thresholds ck such that, as n goes to infinity, if n/m ≤ c for some c < ck then a hash table can be constructed successfully with high probability, and if n/m ≥ c for some c > ck a hash table cannot be constructed successfully with high probability. Here we are considering the offline version of the problem, where all keys and hash values are given, so the problem is equivalent to previous models of multiple-choice hashing. We find the thresholds for all values of k > 2 by showing that they are in fact the same as the previously known thresholds for the random k-XORSAT problem. We then extend these results to the setting where keys can have differing number of choices, and provide evidence in the form of an algorithm for a conjecture extending this result to cuckoo hash tables that store multiple keys in a bucket.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tight Thresholds for Cuckoo Hashing via XORSAT (Extended Abstract)

We settle the question of tight thresholds for o ine cuckoo hashing. The problem can be stated as follows: we have n keys to be hashed into m buckets each capable of holding a single key. Each key has k ≥ 3 (distinct) associated buckets chosen uniformly at random and independently of the choices of other keys. A hash table can be constructed successfully if each key can be placed into one of it...

متن کامل

Load Thresholds for Cuckoo Hashing with Overlapping Blocks

Dietzfelbinger and Weidling [DW07] proposed a natural variation of cuckoo hashing where each of cn objects is assigned k = 2 intervals of size ` in a linear (or cyclic) hash table of size n and both start points are chosen independently and uniformly at random. Each object must be placed into a table cell within its intervals, but each cell can only hold one object. Experiments suggested that t...

متن کامل

Maximum Bipartite Matching Size And Application to Cuckoo Hashing

Cuckoo hashing with a stash is a robust multiplechoice hashing scheme with high memory utilization that canbe used in many network device applications. Unfortunately, formemory loads beyond 0.5, little is known on its performance.In this paper, we analyze its average performance over suchloads. We tackle this problem by recasting the problem as ananalysis of the expected...

متن کامل

Cuckoo Hashing for Undergraduates

This lecture note presents and analyses two simple hashing algorithms: “Hashing with Chaining”, and “Cuckoo Hashing”. The analysis uses only very basic (and intuitively understandable) concepts of probability theory, and is meant to be accessible even for undergraduates taking their first algorithms course.

متن کامل

Wear Minimization for Cuckoo Hashing: How Not to Throw a Lot of Eggs into One Basket

We study wear-leveling techniques for cuckoo hashing, showing that it is possible to achieve a memory wear bound of log logn + O(1) after the insertion of n items into a table of sizeCn for a suitable constantC using cuckoo hashing. Moreover, we study our cuckoo hashing method empirically, showing that it significantly improves on the memory wear performance for classic cuckoo hashing and linea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010