Advertisement

The analysis of linear probing hashing with buckets

Extended abstract
  • Alfredo Viola
  • Patricio V. Poblete
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1136)

Abstract

We present the first exact analysis of a linear probing hashing scheme with buckets of size b. From the generating function for the Robin Hood heuristic we obtain exact expressions for the cost of successful searches. For a full table, with the help of Singularity Analysis, we find the asymptotic expansion of this cost up to O((bm)−1). We conclude with a new approach to study certain recurrences that involve truncated exponentials. A new family of numbers that satisfies a recurrence resembling that of the Bernoulli numbers is introduced. These numbers may prove helpful in studying recurrences involving truncated generating functions.

Keywords

Hash Function Hash Table Average Cost Probability Generate Function Bernoulli Number 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    I.F. Blake and A.G. Konheim. Big buckets are (are not) better! J. ACM, 24(4):591–606, October 1977.Google Scholar
  2. 2.
    B.W.Char, K.O.Geddes, G.H.Gonnet, B.L.Leong, M.B.Monagan, and S.M.Watt. MAPLE V Reference Manual. Springer-Verlag, 1991.Google Scholar
  3. 3.
    S. Carlsson, J.I. Munro, and P.V. Poblete. On linear probing hashing. Unpublished Manuscript.Google Scholar
  4. 4.
    P. Celis. Robin Hood Hashing. PhD thesis, Computer Science Department, University of Waterloo, April 1986. Technical Report CS-86-14.Google Scholar
  5. 5.
    P. Celis, P.-Å. Larson, and J.I. Munro. Robin hood hashing. In 26th IEEE Sympusium on the Foundations of Computer Science, pages 281–288, 1985.Google Scholar
  6. 6.
    P. Flajolet and A. M. Odlyzko. Singularity analysis of generating functions. SIAM Journal on Discrete Mathematics, 3(2):216–240, 1990.CrossRefGoogle Scholar
  7. 7.
    P. Flajolet, M Régnier, and R. Sedgewick. Some uses of the mellin integral transform in the analysis of algorithm. In A. Apostolico and Z. Galil, editors, Combinatorial Algorithms on Words, volume 12 of NATO Advance Science Institute Series. Series F: Computer and System Sciences, pages 241–254. Springer Verlag, 1985. (invited lecture).Google Scholar
  8. 8.
    P. Flajolet and R. Sedgewick. The average case analysis of algorithms: Complex asymptotics and generating functions. Research Report 2026, INRIA, Sept 1993.Google Scholar
  9. 9.
    G.H. Gonnet and R. Baeza-Yates. Handbook of Algorithms and Data Structures. Addison-Wesley, 1991. Second Edition.Google Scholar
  10. 10.
    G.H. Gonnet and J.I. Munro. The analysis of linear probing sort by the use of a new mathematical transform. Journal of Algorithms, 5:451–470, 1984.Google Scholar
  11. 11.
    R.L. Graham, D.E. Knuth, and O.Patashnik. Concrete Mathematics. Addison-Wesley Publishing Company, 1989.Google Scholar
  12. 12.
    P. Jacquet and M Régnier. Trie partitioning process: Limiting distributions. In A. Apostolico and Z. Galil, editors, Proceedings of the 11th Colloquim on Trees in Algebra and Programming (CAAP), volume 214 of Lecture Notes in Computer Science, pages 196–210. Springer Verlag, March 1986.Google Scholar
  13. 13.
    D.E. Knuth. The Art of Computer Programming, volume 3. Addison-Wesley Publishing Company, 1973.Google Scholar
  14. 14.
    A.G. Konheim and B. Weiss. An occupancy discipline and applications. SIAM Journal on Applied Mathematics, 6(14):1266–1274, 1966.Google Scholar
  15. 15.
    H. Mendelson. Analysis of linear probing with buckets. Information Systems, 8(3):207–216, 1983.Google Scholar
  16. 16.
    H. Mendelson and U. Yechiali. A new approach to the analysis of linear probing schemes. J. ACM, 27:474–483, 1980.Google Scholar
  17. 17.
    W.W. Peterson. Addressing for random-access storage. IBM Journal of Research and Development, 1(2):130–146, 1957.Google Scholar
  18. 18.
    R. Sedgewick. Mathematical analysis of combinatorial algorithms. In G. Louchard and G. Latouche, editors, Probability Theory and Computer Science, pages 123–205. Academic Press, Inc., 1983.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1996

Authors and Affiliations

  • Alfredo Viola
    • 1
  • Patricio V. Poblete
    • 2
  1. 1.Institute de ComputacionUniversidad de la RepúblicaMontevideoUruguay
  2. 2.Department of Computer ScienceUniversity of ChileSantiagoChile

Personalised recommendations