2009
DOI: 10.1007/978-3-642-04128-0_60
|View full text |Cite
|
Sign up to set email alerts
|

3.5-Way Cuckoo Hashing for the Price of 2-and-a-Bit

Abstract: Abstract. The study of hashing is closely related to the analysis of balls and bins; items are hashed to memory locations much as balls are thrown into bins. In particular, Azar et. al.[2] considered putting each ball in the less-full of two random bins. This lowers the probability that a bin exceeds a certain load from exponentially small to doubly exponential, giving maximum load log log n + O(1) with high probability. Cuckoo hashing [20] draws on this idea. Each item is hashed to two buckets of capacity k. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(31 citation statements)
references
References 26 publications
0
24
0
Order By: Relevance
“…Ref. [2] do not provide a theoretical memory utilization threshold for small k. The empirical results of Ref. [2] show that in the CUCKOO-OVERLAP algorithm β Overlap (k = 2, d = 2, t = n) = 0.9650 and β Overlap (k = 3, d = 2, t = n) = 0.9945.…”
Section: 1mentioning
confidence: 97%
See 2 more Smart Citations
“…Ref. [2] do not provide a theoretical memory utilization threshold for small k. The empirical results of Ref. [2] show that in the CUCKOO-OVERLAP algorithm β Overlap (k = 2, d = 2, t = n) = 0.9650 and β Overlap (k = 3, d = 2, t = n) = 0.9945.…”
Section: 1mentioning
confidence: 97%
“…Empirical results show that our modification dramatically decreases the number of candidate look-ups required to insert an item compared to Ref. [2]. In the overlapping buckets variant [2], some buckets are split between two pages, so that each item resides in up to 2d pages.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Several variants of cuckoo hashing have been considered, including the use of a small cache (called a "stash") and the use of more than two hash functions (e.g., see [2,11,12,14,20]). Also, as mentioned above, there has also been work improving the space complexity [13,22], as well as experimental analyses of cuckoo hashing [1,35]. Nevertheless, we are not familiar with any previous work on the memory-wear performance of cuckoo hashing, from either a theoretical or experimental viewpoint.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, the cuckoo hashing with a stash variation sacrifices some of the elegance of the basic algorithm by adding an auxiliary cache to break insertion cycles, greatly reducing the failure probability of the algorithm and reducing the need to rebuild the structure when a failure happens [20]. There have also been improvements to the space complexity for cuckoo hashing [13,22], as well as experimental studies of the practical applications of cuckoo hashing [1,35]. In spite of its elegance, efficiency, and practicality, however, cuckoo hashing has a major drawback with respect to modern memory technologies.…”
Section: Introductionmentioning
confidence: 99%