This lecture discusses a very neat paper of Mitzenmacher and Vadhan [8], which proposes a robust measure of “sufficiently random data ” and notes interesting consequences for hashing and some related applications. We consider hash functions from N = {0, 1}n to M = {0, 1}m. Canonically, m is much smaller than n. We abuse notation and use N,M to denote both the sets and the cardinalities of the sets. Since a hash function h: N → M is effectively compressing a larger set into a smaller one, collisions (distinct elements x, y ∈ N with h(x) = h(y)) are inevitable. There are many way of resolving collisions. One that is common in practice is linear probing, where given a data element x, one starts at the slot h(x), and then proceeds to h(x) + 1,...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
Following the success of hashing methods for multidi-mensional indexing, more and more works are int...
We investigate probabilistic hashing techniques for addressing computational and memory challenges i...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
A number of recent papers have considered the influence of modern computer memory hierarchies on the...
.We present three explicit constructions of hash functions, which exhibit a trade-off between the si...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
AbstractIn this paper we analyze the performance of double hashing, a well-known hashing algorithm i...
Randomized algorithms are often enjoyed for their simplicity, but the hash functions employed to yie...
Many algorithms and data structures employing hashing have been analyzed under the uniform hashing a...
Random hashing can provide guarantees regarding the performance of data structures such as hash ta...
The aim of this tutorial article is to provide an introduction to methods based on universal hashing...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
Randomized algorithms are often enjoyed for their simplicity, but the hash functions used to yield t...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
Following the success of hashing methods for multidi-mensional indexing, more and more works are int...
We investigate probabilistic hashing techniques for addressing computational and memory challenges i...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
A number of recent papers have considered the influence of modern computer memory hierarchies on the...
.We present three explicit constructions of hash functions, which exhibit a trade-off between the si...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
AbstractIn this paper we analyze the performance of double hashing, a well-known hashing algorithm i...
Randomized algorithms are often enjoyed for their simplicity, but the hash functions employed to yie...
Many algorithms and data structures employing hashing have been analyzed under the uniform hashing a...
Random hashing can provide guarantees regarding the performance of data structures such as hash ta...
The aim of this tutorial article is to provide an introduction to methods based on universal hashing...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
Randomized algorithms are often enjoyed for their simplicity, but the hash functions used to yield t...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
Following the success of hashing methods for multidi-mensional indexing, more and more works are int...
We investigate probabilistic hashing techniques for addressing computational and memory challenges i...