In this thesis we study the standard probabilistic model for hashing with linear probing. The main purpose is to determine the asymptotic distribution for the maximum displacement. Depending on the ratio between the number of items and the number of cells, there are several cases to consider. Paper I solves the problem for the special case of almost full hash tables. That is, hash tables where every cell but one is occupied. Paper II completes the analysis by solving the problem for all remaining cases. That is, for every case where the number of items divided by the number of cells lies in the interval [0,1]. The last two papers treat quite different topics. Paper III studies the area covered by the supremum process of Brownian motion. One...
This lecture discusses a very neat paper of Mitzenmacher and Vadhan [8], which proposes a robust mea...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
We consider open addressing hashing, and implement it by using the Robin Hood strategy, that is, in ...
In this thesis we study the standard probabilistic model for hashing with linear probing. The main p...
This paper presents the first distributional analysis of a linear probing hashing scheme with bucket...
: This paper presents moment analyses and characterizations of limit distributions for the construct...
We study the asymptotic behavior of a sum of independent and identically distributed random variable...
We study the asymptotic behavior of a sum of independent and identically distributed random variable...
International audienceWe consider the model of hashing with linear probing and we establish the mode...
We give a unified analysis of linear probing hashing with a general bucket size. We use both a combi...
Abstract. We give a unified analysis of linear probing hashing with a gen-eral bucket size. We use b...
Linear probing continues to be one of the best practical hashing algorithms due to its good average ...
This paper presents the first distributional analysis of both, a parking problem and a linear probin...
Abstract. This paper develops two probabilistic methods that allow the analysis of the maximum data ...
This paper develops two probabilistic methods that allow the analysis of the maximum data structure ...
This lecture discusses a very neat paper of Mitzenmacher and Vadhan [8], which proposes a robust mea...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
We consider open addressing hashing, and implement it by using the Robin Hood strategy, that is, in ...
In this thesis we study the standard probabilistic model for hashing with linear probing. The main p...
This paper presents the first distributional analysis of a linear probing hashing scheme with bucket...
: This paper presents moment analyses and characterizations of limit distributions for the construct...
We study the asymptotic behavior of a sum of independent and identically distributed random variable...
We study the asymptotic behavior of a sum of independent and identically distributed random variable...
International audienceWe consider the model of hashing with linear probing and we establish the mode...
We give a unified analysis of linear probing hashing with a general bucket size. We use both a combi...
Abstract. We give a unified analysis of linear probing hashing with a gen-eral bucket size. We use b...
Linear probing continues to be one of the best practical hashing algorithms due to its good average ...
This paper presents the first distributional analysis of both, a parking problem and a linear probin...
Abstract. This paper develops two probabilistic methods that allow the analysis of the maximum data ...
This paper develops two probabilistic methods that allow the analysis of the maximum data structure ...
This lecture discusses a very neat paper of Mitzenmacher and Vadhan [8], which proposes a robust mea...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
We consider open addressing hashing, and implement it by using the Robin Hood strategy, that is, in ...