Imagine handling collisions in a hash table by storing, in each cell, the bit-wise exclusive-or of the set of keys hashing there. This appears to be a terrible idea: For $\alpha n$ keys and $n$ buckets, where $\alpha$ is constant, we expect that a constant fraction of the keys will be unrecoverable due to collisions. We show that if this collision resolution strategy is repeated three times independently the situation reverses: If $\alpha$ is below a threshold of $\approx 0.81$ then we can recover the set of all inserted keys in linear time with high probability. Even though the description of our data structure is simple, its analysis is nontrivial. Our approach can be seen as a variant of the Invertible Bloom Filter (IBF) of Eppstein ...
Approximated homomorphic encryption (HE) schemes such as CKKS are commonly used to perform computati...
A number of recent papers have considered the influence of modern computer memory hierarchies on the...
The cuckoo filter data structure of Fan, Andersen, Kaminsky, and Mitzenmacher (CoNEXT 2014) performs...
CountSketch and Feature Hashing (the ``hashing trick'') are popular randomized dimensionality redu...
This lecture discusses a very neat paper of Mitzenmacher and Vadhan [8], which proposes a robust mea...
Given the original set $X$ where $|X|=s$, a sketch $P$ is computed from $X$ and made public. From an...
Linear sketches are powerful algorithmic tools that turn an n-dimensional input into a concise lower...
It is sometimes argued that finding meaningful hash collisions might prove difficult. We show that f...
We introduce and analyse a family of hash and predicate functions that are more likely to produce co...
AbstractIn this paper we analyze the performance of double hashing, a well-known hashing algorithm i...
Consider the set H of all linear (or affine) transformations between two vector spaces over a finite...
We consider invertible Bloom lookup tables (IBLTs) which are probabilistic data structures that allo...
Sketching via hashing is a popular and useful method for processing large data sets. Its basic idea ...
Property-preserving hashing is a method of compressing a large input x into a short hash h(x) in suc...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
Approximated homomorphic encryption (HE) schemes such as CKKS are commonly used to perform computati...
A number of recent papers have considered the influence of modern computer memory hierarchies on the...
The cuckoo filter data structure of Fan, Andersen, Kaminsky, and Mitzenmacher (CoNEXT 2014) performs...
CountSketch and Feature Hashing (the ``hashing trick'') are popular randomized dimensionality redu...
This lecture discusses a very neat paper of Mitzenmacher and Vadhan [8], which proposes a robust mea...
Given the original set $X$ where $|X|=s$, a sketch $P$ is computed from $X$ and made public. From an...
Linear sketches are powerful algorithmic tools that turn an n-dimensional input into a concise lower...
It is sometimes argued that finding meaningful hash collisions might prove difficult. We show that f...
We introduce and analyse a family of hash and predicate functions that are more likely to produce co...
AbstractIn this paper we analyze the performance of double hashing, a well-known hashing algorithm i...
Consider the set H of all linear (or affine) transformations between two vector spaces over a finite...
We consider invertible Bloom lookup tables (IBLTs) which are probabilistic data structures that allo...
Sketching via hashing is a popular and useful method for processing large data sets. Its basic idea ...
Property-preserving hashing is a method of compressing a large input x into a short hash h(x) in suc...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
Approximated homomorphic encryption (HE) schemes such as CKKS are commonly used to perform computati...
A number of recent papers have considered the influence of modern computer memory hierarchies on the...
The cuckoo filter data structure of Fan, Andersen, Kaminsky, and Mitzenmacher (CoNEXT 2014) performs...