Skip to main content

The analysis of a hashing scheme by the diagonal poisson transform

Extended abstract

  • Conference paper
  • First Online:
Algorithms — ESA '94 (ESA 1994)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 855))

Included in the following conference series:

Abstract

We present an analysis of the effect of the last-come-first-served heuristic on a linear probing hash table. We study the behavior of successful searches, assuming searches for all elements of the table are equally likely. It is known that the Robin Hood heuristic achieves minimum variance over all linear probing algorithms. We show that the last-come-first-served heuristic achieves this minimum up to lower order terms.

An accurate analysis of this algorithm is made by introducing a new transform which we call the diagonal Poisson transform as it resembles the Poisson transform. We present important properties of this transform, as well as its application to solve some classes of recurrences. We feel this is the main contribution of the paper.

This research was supported in part by the Natural Sciences and Engineering Research Council of Canada under grant No. A8237, the Information Technology Research Centre of Ontario, and FONDECYT(Chile) under grant 1940271.

Part of this work was done while the first author was on sabbatical at the University of Waterloo.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abramowitz and I.A. Stegun. Handbook of Mathematical Functions. Dover Publications, New York, 1972.

    Google Scholar 

  2. O. Amble and D.E. Knuth. Ordered hash tables. Computer Journal, 17(2):135–142, 1974.

    Article  MathSciNet  Google Scholar 

  3. R.P. Brent. Reducing the retrieval time of scatter storage techniques. C.ACM, 16(2): 105–109, 1973.

    MATH  MathSciNet  Google Scholar 

  4. B.W.Char, K.O.Geddes, G.H.Gonnet, B.L.Leong, M.B.Monagan, and S.M.Watt. MAPLE V Reference Manual. Springer-Verlag, 1991.

    Google Scholar 

  5. S. Carlsson, J.I. Munro, and P.V. Poblete. On linear probing hashing. Unpublished Manuscript.

    Google Scholar 

  6. P. Celis, P.-A. Larson, and J.I. Munro. Robin Hood hashing. In 26th IEEE Sympusium on the Foundations of Computer Science, pages 281–288, 1985.

    Google Scholar 

  7. G.H. Gonnet and J.I. Munro. Efficient ordering of hash tables. SIAM Journal on Computing, 8(3):463–478, 1979.

    Article  MathSciNet  Google Scholar 

  8. G.H. Gonnet and J.I. Munro. The analysis of linear probing sort by the use of a new mathematical transform. Journal of Algorithms, 5:451–470, 1984.

    Article  MathSciNet  Google Scholar 

  9. R.L. Graham, D.E. Knuth, and O.Patashnik. Concrete Mathematics. Addison-Wesley, 1989.

    Google Scholar 

  10. D.E. Knuth. The Art of Computer Programming: Fundamental Algorithms, volume 1. Addison-Wesley, 1973.

    Google Scholar 

  11. D.E. Knuth. The Art of Computer Programming: Sorting and Searching, volume 3. Addison-Wesley, 1973.

    Google Scholar 

  12. D.E. Knuth and A. Schönhage. The expected linearity of a simple equivalence algorithm. Theoretical Computer Science, 6:281–315, 1978.

    Article  MathSciNet  Google Scholar 

  13. P.V. Poblete. Approximating functions by their poisson transform. Information Processing Letters, 23:127–130, 1986.

    Article  MATH  MathSciNet  Google Scholar 

  14. P.V. Poblete and J.I. Munro. Last-come-first-served hashing. Journal of Algorithms, 10:228–248, 1989.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jan van Leeuwen

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Poblete, P.V., Viola, A., Munro, J.I. (1994). The analysis of a hashing scheme by the diagonal poisson transform. In: van Leeuwen, J. (eds) Algorithms — ESA '94. ESA 1994. Lecture Notes in Computer Science, vol 855. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0049400

Download citation

  • DOI: https://doi.org/10.1007/BFb0049400

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-58434-6

  • Online ISBN: 978-3-540-48794-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics