A Probabilistic Study on Combinatorial Expanders and Hashing

نویسندگان

  • Phillip G. Bradford
  • Michael N. Katehakis
چکیده

This paper gives a new way of showing that certain constant degree graphs are graph expanders. This is done by giving new proofs of expansion for three permutations of the Gabber–Galil expander. Our results give an expansion factor of 3 16 for subgraphs of these three-regular graphs with (p− 1)2 inputs for p prime. The proofs are not based on eigenvalue methods or higher algebra. The same methods show the expected number of probes for unsuccessful search in double hashing is bounded by 1 1−α , where α is the load factor. This assumes a double hashing scheme in which two hash functions are randomly and independently chosen from a specified uniform distribution. The result is valid regardless of the distribution of the inputs. This is analogous to Carter and Wegman’s result for hashing with chaining. This paper concludes by elaborating on how any sufficiently sized subset of inputs in any distribution expands in the subgraph of the Gabber–Galil graph expander of focus. This is related to any key distribution having expected 1 1−α probes for unsuccessful search for double hashing given the initial random, independent, and uniform choice of two universal hash functions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cs 59000 Ctt Current Topics in Theoretical Cs

There are many notions of expansion and in previous lectures we have seen edge and spectrum expansion. In this lecture, we will see the notion of vertex expansion. Many of these notions of expansion are in fact equivalent, but we won’t discuss in this course why. Our goal today is to show that expanders exist using the probabilistic method. According to the probabilistic method, in order to sho...

متن کامل

Probabilistic analysis of the asymmetric digital search trees

In this paper, by applying three functional operators the previous results on the (Poisson) variance of the external profile in digital search trees will be improved. We study the profile built over $n$ binary strings generated by a memoryless source with unequal probabilities of symbols and use a combinatorial approach for studying the Poissonized variance, since the probability distribution o...

متن کامل

Reconstructive Surgery of Extensive Face and Neck Burn Scars Using Tissue Expanders

BACKGROUND Neck reconstruction is considered as one of the most important surgeries in cosmetic and reconstructive surgery. The present study aimed to assess the results of reconstructive surgery of extensive face and neck burning scars using tissue expanders. METHODS This descriptive prospective study was conducted on 36 patients with extensive burning scars on the neck and face. Operatio...

متن کامل

A unified approach to linear probing hashing

We give a unified analysis of linear probing hashing with a general bucket size. We use both a combinatorial approach, giving exact formulas for generating functions, and a probabilistic approach, giving simple derivations of asymptotic results. Both approaches complement nicely, and give a good insight in the relation between linear probing and random walks. A key methodological contribution, ...

متن کامل

Systolic Expanders of Every Dimension

In recent years a high dimensional theory of expanders has emerged. The notion of combinatorial expanders of graphs (i.e. the Cheeger constant of a graph) has seen two generalizations to high dimensional simplicial complexes. One generalization, known as coboundary expansion is due to Linial and Meshulem; the other, which we term here systolic expansion, is due to Gromov, who showed that systol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • SIAM J. Comput.

دوره 37  شماره 

صفحات  -

تاریخ انتشار 2007