jthaler(at)fas.harvard.edu A dictionary (or map) is a key-value store that requires all keys be unique, and a multimap is a key-value store that allows for multiple values to be associated with the same key. We design hashing-based indexing schemes for dictionaries and multimaps that achieve worst-case optimal performance for lookups and updates, with a small or negligible probability the data structure will require a rehash operation, depending on whether we are working in the the external-memory (I/O) model or one of the well-known versions of the Random Access Machine (RAM) model. One of the main features of our constructions is that they are fully de-amortized, meaning that their performance bounds hold without one having to tune their ...
In this paper, we provide a polylogarithmic bound that holds with high probability on the insertion ...
The demand of efficient data structures for query processing on massive data sets has grown tremendo...
A number of recent papers have considered the influence of modern computer memory hierarchies on the...
A dictionary (or map) is a key-value store that requires all keys be unique, and a multimap is a key...
We present a simple and efficient dictionary with worst case constant lookup time, equaling the theo...
Hash tables are a ubiquitous class of dictionary data structures. However, standard hash table imple...
International audienceCuckoo hashing is a common hashing technique, guaranteeing constant-time looku...
Abstract. We present a simple and ecient dictionary with worst case constant lookup time, equaling t...
We consider the dictionary problem in external memory and improve the update time of the well-known ...
Cuckoo hashing holds great potential as a high-performance hashing scheme for real appli-cations. Up...
Analysis of AlgorithmsCuckoo hashing is a hash table data structure offering constant access time, e...
We consider the dictionary problem in external memory and improve the update time of the well-known ...
We generalize Cuckoo Hashing \cite{PagRod01} to \emph{$d$-ary Cuckoo Hashing} and show how this yiel...
Hashing is one of the fundamental techniques used to implement query processing operators such as gr...
The hash table, especially its external memory version, is one of the most important index structure...
In this paper, we provide a polylogarithmic bound that holds with high probability on the insertion ...
The demand of efficient data structures for query processing on massive data sets has grown tremendo...
A number of recent papers have considered the influence of modern computer memory hierarchies on the...
A dictionary (or map) is a key-value store that requires all keys be unique, and a multimap is a key...
We present a simple and efficient dictionary with worst case constant lookup time, equaling the theo...
Hash tables are a ubiquitous class of dictionary data structures. However, standard hash table imple...
International audienceCuckoo hashing is a common hashing technique, guaranteeing constant-time looku...
Abstract. We present a simple and ecient dictionary with worst case constant lookup time, equaling t...
We consider the dictionary problem in external memory and improve the update time of the well-known ...
Cuckoo hashing holds great potential as a high-performance hashing scheme for real appli-cations. Up...
Analysis of AlgorithmsCuckoo hashing is a hash table data structure offering constant access time, e...
We consider the dictionary problem in external memory and improve the update time of the well-known ...
We generalize Cuckoo Hashing \cite{PagRod01} to \emph{$d$-ary Cuckoo Hashing} and show how this yiel...
Hashing is one of the fundamental techniques used to implement query processing operators such as gr...
The hash table, especially its external memory version, is one of the most important index structure...
In this paper, we provide a polylogarithmic bound that holds with high probability on the insertion ...
The demand of efficient data structures for query processing on massive data sets has grown tremendo...
A number of recent papers have considered the influence of modern computer memory hierarchies on the...