2004
DOI: 10.1007/s00224-004-1195-x
|View full text |Cite
|
Sign up to set email alerts
|

Space Efficient Hash Tables with Worst Case Constant Access Time

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

4
140
1

Year Published

2005
2005
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 127 publications
(145 citation statements)
references
References 23 publications
4
140
1
Order By: Relevance
“…The variants of random walk way [26] and d-ary extension [27] further demonstrated the flexibility and efficiency of cuckoo-driven method due to its simplicity. The items can hence "move" among multiple positions to achieve load balance and guarantee constant-scale complexity of operations.…”
Section: Cuckoo Hashingmentioning
confidence: 98%
See 1 more Smart Citation
“…The variants of random walk way [26] and d-ary extension [27] further demonstrated the flexibility and efficiency of cuckoo-driven method due to its simplicity. The items can hence "move" among multiple positions to achieve load balance and guarantee constant-scale complexity of operations.…”
Section: Cuckoo Hashingmentioning
confidence: 98%
“…Authors in [47] present the methods of greatly improving the failure probability bounds for a large class of cuckoo hashing variants by using only a constant amount of additional space. The d-ary Cuckoo Hashing [27] further generalizes the cuckoo hashing to show how to yield a simple hash table data structure that stores n elements in ð1 þ Þn memory cells, for any constant > 0. This structure indicates that cuckoo hashing can obtain better performance in practical situations.…”
Section: Related Workmentioning
confidence: 99%
“…Our approach creates look-up tables for these predefined operations and uses a hash function that offers constant time performance for the basic operations (e.g., add and search) [17], [18].…”
Section: Block Tree Contiguity Checking Algorithmmentioning
confidence: 99%
“…Proof: Given two nodes u and v, the Lowest Common Ancestor (LCA) algorithm gives an answer in constant time after linear-time pre-processing [17], [18]. The LCA function has commutative (e.g., LCA(u, v) = LCA(v, u)) and associative (e.g., LCA(LCA(u, v), w) = LCA(u, LCA(v, w))) properties.…”
Section: Analysis Of Btcc Approach To Sa Contiguitymentioning
confidence: 99%
“…As described in Section 5, our protocol uses a 4-way cuckoo hash table [7]. A 2 GB 4-way cuckoo hash table can hold roughly 130 million 129-bit secret tuples (consisting of two 64-bit secrets), which is enough for approximately 4,500 ASes to send 20 secrets per minute for a day to a single incoming interface on a prover's router.…”
Section: Offline Setup and Secret Exchangementioning
confidence: 99%