Perfect hashing

ZJ Czech, G Havas, BS Majewski - Theoretical Computer Science, 1997 - Elsevier
Let S be a set of n distinct keys belonging to some universe U. We would like to store the
keys of S so that membership queries of the form “Is x in S?” can be answered quickly. This …

PIR with compressed queries and amortized query processing

S Angel, H Chen, K Laine… - 2018 IEEE symposium on …, 2018 - ieeexplore.ieee.org
Private information retrieval (PIR) is a key building block in many privacy-preserving
systems. Unfortunately, existing constructions remain very expensive. This paper introduces …

Cuckoo hashing

R Pagh, FF Rodler - Journal of Algorithms, 2004 - Elsevier
We present a simple dictionary with worst case constant lookup time, equaling the
theoretical performance of the classic dynamic perfect hashing scheme of Dietzfelbinger et …

Cuckoo hashing

R Pagh, FF Rodler - European Symposium on Algorithms, 2001 - Springer
We present a simple and efficient dictionary with worst case constant lookup time, equaling
the theoretical performance of the classic dynamic perfect hashing scheme of Dietzfelbinger …

Dynamic perfect hashing: Upper and lower bounds

M Dietzfelbinger, A Karlin, K Mehlhorn… - SIAM Journal on …, 1994 - SIAM
The dynamic dictionary problem is considered: provide an algorithm for storing a dynamic
set, allowing the operations insert, delete, and lookup. A dynamic perfect hashing strategy is …

Direct bulk-synchronous parallel algorithms

AV Gerbessiotis, LG Valiant - Journal of parallel and distributed computing, 1994 - Elsevier
We describe a methodology for constructing parallel algorithms that are transportable
among parallel computers having different numbers of processors, different bandwidths of …

[LIBRO][B] Handbook of data structures and applications

DP Mehta, S Sahni - 2004 - taylorfrancis.com
Although there are many advanced and specialized texts and handbooks on algorithms,
until now there was no book that focused exclusively on the wide variety of data structures …

Efficient PRAM simulation on a distributed memory machine

RM Karp, M Luby, F Meyer auf der Heide - Proceedings of the twenty …, 1992 - dl.acm.org
We present a randomized simulation of an log log (n) log (n)-processor shared memory
machine (DMM) with optimal expected delay O (log log (n)) per step of simulation. The time …

Optimal bounds for the predecessor problem and related problems

P Beame, FE Fich - Journal of Computer and System Sciences, 2002 - Elsevier
We obtain matching upper and lower bounds for the amount of time to find the predecessor
of a given element among the elements of a fixed compactly stored set. Our algorithms are …

An optimal algorithm for generating minimal perfect hash functions

ZJ Czech, G Havas, BS Majewski - Information processing letters, 1992 - Elsevier
A new algorithm for generating order preserving minimal perfect hash functions is
presented. The algorithm is probabilistic, involving generation of random graphs. It uses …