The hash table, especially its external memory version, is one of the most important index structures in large databases. Assuming a truly random hash function, it is known that in a standard external hash table with block size b, searching for a particular key only takes expected average t-q=1+1/2 <sup>Ω(b)</sup> disk accesses for any load factor α bounded away from $1$. However, such near-perfect performance is achieved only when b is known and the hash table is particularly tuned for working with such a blocking. In this paper we study if it is possible to build a cache-oblivious hash table that works well with any blocking. Such a hash table will automatically perform well across all levels of the memory hierarchy and does not need any ...
We propose to demonstrate EaseDB, the first cache-oblivious queryprocessor for in-memory relational ...
The non-overlapping indexing problem is defined as follows: pre-process a given text T[1, n] of leng...
Abstract. We consider open addressing hashing, and implement it by using the Robin Hood strategy, th...
A hash table is a representation of a set in a linear size data structure that supports constanttime...
Cache-oblivious techniques, proposed in the theory community, have optimal asymptotic bounds on the ...
Abstract. A hash table is a representation of a set in a linear size data structure that supports co...
A number of recent papers have considered the influence of modern computer memory hierarchies on the...
We propose a radical approach to relational query processing that aims at automatically and consiste...
jthaler(at)fas.harvard.edu A dictionary (or map) is a key-value store that requires all keys be uniq...
This thesis discusses cache oblivious data structures. These are structures which have good cachin...
In this paper we present a lock-free version of Hopscotch Hashing. Hopscotch Hashing is an open add...
This lecture discusses a very neat paper of Mitzenmacher and Vadhan [8], which proposes a robust mea...
A dictionary (or map) is a key-value store that requires all keys be unique, and a multimap is a key...
Randomized algorithms are often enjoyed for their simplicity, but the hash functions employed to yie...
A minimal perfect hash function maps a set S of n keys into the set { 0, 1,..., n − 1} bijectively. ...
We propose to demonstrate EaseDB, the first cache-oblivious queryprocessor for in-memory relational ...
The non-overlapping indexing problem is defined as follows: pre-process a given text T[1, n] of leng...
Abstract. We consider open addressing hashing, and implement it by using the Robin Hood strategy, th...
A hash table is a representation of a set in a linear size data structure that supports constanttime...
Cache-oblivious techniques, proposed in the theory community, have optimal asymptotic bounds on the ...
Abstract. A hash table is a representation of a set in a linear size data structure that supports co...
A number of recent papers have considered the influence of modern computer memory hierarchies on the...
We propose a radical approach to relational query processing that aims at automatically and consiste...
jthaler(at)fas.harvard.edu A dictionary (or map) is a key-value store that requires all keys be uniq...
This thesis discusses cache oblivious data structures. These are structures which have good cachin...
In this paper we present a lock-free version of Hopscotch Hashing. Hopscotch Hashing is an open add...
This lecture discusses a very neat paper of Mitzenmacher and Vadhan [8], which proposes a robust mea...
A dictionary (or map) is a key-value store that requires all keys be unique, and a multimap is a key...
Randomized algorithms are often enjoyed for their simplicity, but the hash functions employed to yie...
A minimal perfect hash function maps a set S of n keys into the set { 0, 1,..., n − 1} bijectively. ...
We propose to demonstrate EaseDB, the first cache-oblivious queryprocessor for in-memory relational ...
The non-overlapping indexing problem is defined as follows: pre-process a given text T[1, n] of leng...
Abstract. We consider open addressing hashing, and implement it by using the Robin Hood strategy, th...