Comparison of Different Open Addressing Hashing Algorithms

نویسندگان

  • Wenbin Luo
  • Gregory L. Heileman
چکیده

Hash functions are among the oldest and most widely used data structures in computer science. Different hash functions exist. So, it is very important to compare their performance. In this paper, we introduced our new hash function which was proposed recently in [1], and compared its performance with two different open addressing hashing algorithms: double hashing and exponential hashing. Double hashing is a widely-used hash function, which offers good performance. Exponential hashing, proposed by Smith et al [2], has been shown through experimental analysis to be superior to double hashing when the data elements are not uniformly distributed. The good performance of exponential hashing is due to its ability of spreading the table elements more randomly than double hashing. While exponential hashing has some desirable characteristics, Smith points out that it produces less than full probe length on 1/2 of the table elements. This is undesirable since it could potentially lead to insertion and search failures. Our new hash function has the ability of spreading the table elements randomly, and produces full probe length on all the table elements at the same time. From this point of view, our new hash function combines the strength of both double hashing and exponential hashing with their weakness eliminated. Experimental results are presented to support our claims, which is followed by some theoretic analysis.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improved Version of Cuckoo Hashing: Average Case Analysis of Construction Cost and Search Operations

Cuckoo hashing is a hash table data structure introduced in [1], that offers constant worst case search time. As a major contribution of this paper, we analyse modified versions of this algorithm with improved performance. Further, we provide an asymptotic analysis of the search costs of all this variants of cuckoo hashing and compare this results with the well known properties of double hashin...

متن کامل

An Exponential Open Hashing Function Based on Dynamical Systems Theory

In this paper an eecient open addressing hash function called exponential hashing is developed using concepts from dynamical systems theory and number theory. A comparison of exponential hashing versus a widely-used double hash function is performed using an analysis based on Lya-punov exponents and entropy. Proofs of optimal table parameter choices are provided for a number of hash functions. ...

متن کامل

Addressing a fixed charge transportation problem with multi-route and different capacities by novel hybrid meta-heuristics

In most real world application and problems, a homogeneous product is carried from an origin to a destination by using different transportation modes (e.g., road, air, rail and water). This paper investigates a fixed charge transportation problem (FCTP), in which there are different routes with different capacities between suppliers and customers. To solve such a NP-hard problem, four meta-heur...

متن کامل

Application of Minimal Perfect Hashing in Main Memory Indexing

With the rapid decrease in the cost of random access memory (RAM), it will soon become economically feasible to place full-text indexes of a library in main memory. One essential component of the indexing system is a hashing algorithm, which maps a keyword into the memory address of the index information corresponding to that keyword. This thesis studies the application of the minimal perfect h...

متن کامل

Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records

Searchable symmetric encryption (SSE) has been studied extensively for its full potential in enabling exact-match queries on encrypted records. Yet, situations for similarity queries remain to be fully explored. In this paper, we design privacy-assured similarity search schemes over millions of encrypted high-dimensional records. Our design employs locality-sensitive hashing (LSH) and SSE, wher...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003