Perfect hashing
ZJ Czech, G Havas, BS Majewski - Theoretical Computer Science, 1997 - Elsevier
Let S be a set of n distinct keys belonging to some universe U. We would like to store the
keys of S so that membership queries of the form “Is x in S?” can be answered quickly. This …
keys of S so that membership queries of the form “Is x in S?” can be answered quickly. This …
PIR with compressed queries and amortized query processing
Private information retrieval (PIR) is a key building block in many privacy-preserving
systems. Unfortunately, existing constructions remain very expensive. This paper introduces …
systems. Unfortunately, existing constructions remain very expensive. This paper introduces …
Cuckoo hashing
R Pagh, FF Rodler - Journal of Algorithms, 2004 - Elsevier
We present a simple dictionary with worst case constant lookup time, equaling the
theoretical performance of the classic dynamic perfect hashing scheme of Dietzfelbinger et …
theoretical performance of the classic dynamic perfect hashing scheme of Dietzfelbinger et …
Cuckoo hashing
R Pagh, FF Rodler - European Symposium on Algorithms, 2001 - Springer
We present a simple and efficient dictionary with worst case constant lookup time, equaling
the theoretical performance of the classic dynamic perfect hashing scheme of Dietzfelbinger …
the theoretical performance of the classic dynamic perfect hashing scheme of Dietzfelbinger …
Dynamic perfect hashing: Upper and lower bounds
The dynamic dictionary problem is considered: provide an algorithm for storing a dynamic
set, allowing the operations insert, delete, and lookup. A dynamic perfect hashing strategy is …
set, allowing the operations insert, delete, and lookup. A dynamic perfect hashing strategy is …
Direct bulk-synchronous parallel algorithms
AV Gerbessiotis, LG Valiant - Journal of parallel and distributed computing, 1994 - Elsevier
We describe a methodology for constructing parallel algorithms that are transportable
among parallel computers having different numbers of processors, different bandwidths of …
among parallel computers having different numbers of processors, different bandwidths of …
[LIBRO][B] Handbook of data structures and applications
Although there are many advanced and specialized texts and handbooks on algorithms,
until now there was no book that focused exclusively on the wide variety of data structures …
until now there was no book that focused exclusively on the wide variety of data structures …
Efficient PRAM simulation on a distributed memory machine
We present a randomized simulation of an log log (n) log (n)-processor shared memory
machine (DMM) with optimal expected delay O (log log (n)) per step of simulation. The time …
machine (DMM) with optimal expected delay O (log log (n)) per step of simulation. The time …
Optimal bounds for the predecessor problem and related problems
P Beame, FE Fich - Journal of Computer and System Sciences, 2002 - Elsevier
We obtain matching upper and lower bounds for the amount of time to find the predecessor
of a given element among the elements of a fixed compactly stored set. Our algorithms are …
of a given element among the elements of a fixed compactly stored set. Our algorithms are …
An optimal algorithm for generating minimal perfect hash functions
ZJ Czech, G Havas, BS Majewski - Information processing letters, 1992 - Elsevier
A new algorithm for generating order preserving minimal perfect hash functions is
presented. The algorithm is probabilistic, involving generation of random graphs. It uses …
presented. The algorithm is probabilistic, involving generation of random graphs. It uses …