1994
DOI: 10.1007/3-540-57899-4_49
|View full text |Cite
|
Sign up to set email alerts
|

Graphs, hypergraphs and hashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

1996
1996
2018
2018

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 40 publications
0
9
0
Order By: Relevance
“…A recently discovered algorithm for generating minimal perfect hash functions uses random r-uniform hypergraphs, in which the threshold of the appearance of the r-analogue of a cycle is crucial (see Havas et al [13], where rough estimates on the threshold are derived). The problem of determining this threshold is very similar to that for the k-core of a random graph.…”
Section: Introductionmentioning
confidence: 99%
“…A recently discovered algorithm for generating minimal perfect hash functions uses random r-uniform hypergraphs, in which the threshold of the appearance of the r-analogue of a cycle is crucial (see Havas et al [13], where rough estimates on the threshold are derived). The problem of determining this threshold is very similar to that for the k-core of a random graph.…”
Section: Introductionmentioning
confidence: 99%
“…A further improvement consists in using hypergraphs (generalization of graphs in higher dimensions): As soon as |V| > 1.23 × |E|, a random 3-hypergraph has an "acyclic" property with a probability of almost 1 [30], [32]. In practice, assignment and computation of phf on 3-hypergraphs are…”
Section: B Graph-based Perfect Hash Functionsmentioning
confidence: 99%
“…• Checking the acyclicity can be done with the algorithm of [32]. In the unlikely cases where the graph is not acyclic, another random graph can be generated by choosing three other hash functions.…”
Section: A Indexation With 3-hypergraphs Generationmentioning
confidence: 99%
“…It is known that finding a perfect hash function for sets with n keys cannot be done in o(n) time [3], although many O(n)-time perfect hashing schemes are known from literature [2,10,11,12]. For example, the randomized hashing scheme presented in [3], which maps the n keys to the edges of an acyclic graph on 2.09n vertices and then uses a depth-first search to label the edges with the values 1, .…”
Section: Related Workmentioning
confidence: 99%