International audienceCuckoo hashing is a common hashing technique, guaranteeing constant-time lookups in the worst case. Adding a stash was proposed by Kirsch, Mitzenmacher, and Wieder at SICOMP 2010, as a way to reduce the probability of failure (i.e., the probability that a valid Cuckoo assignment fails to exist). It has since become a standard technique in areas such as cryptography, where a negligible probability of failure is often required. We focus on an extension of Cuckoo hashing that allows multiple items per bucket, which improves the load factor. That extension was also analyzed by Kirsch et al. in the presence of a stash. In particular, letting d be the number of items per bucket, and s be the stash size, Kirsch et al. showed ...
The cuckoo filter data structure of Fan, Andersen, Kaminsky, and Mitzenmacher (CoNEXT 2014) performs...
We generalize Cuckoo Hashing \cite{PagRod01} to \emph{$d$-ary Cuckoo Hashing} and show how this yiel...
Abstract. Although cuckoo hashing has significant applications in both theoretical and practical set...
Cuckoo hashing holds great potential as a high-performance hashing scheme for real appli-cations. Up...
Analysis of AlgorithmsCuckoo hashing is a hash table data structure offering constant access time, e...
Cuckoo hashing is a powerful primitive that enables storing items using small space with efficient q...
In this paper, we provide a polylogarithmic bound that holds with high probability on the insertion ...
In k-ary cuckoo hashing, each of cn objects is associated with k random buckets in a hash table of s...
Cuckoo hashing was introduced by Pagh and Rodler in 2001. Its main feature is that it provides const...
The aim of this paper is to extend the analysis of Cuckoo Hashing of Devroye and Morin in 2003. In p...
Cuckoo hashing is an efficient technique for creating large hash tables with high space utilization ...
jthaler(at)fas.harvard.edu A dictionary (or map) is a key-value store that requires all keys be uniq...
Abstract. We study wear-leveling techniques for cuckoo hashing, showing that it is possible to achie...
Part 3: Reliability and ResilienceInternational audiencePeacock and Cuckoo hashing schemes are curre...
We present a simple and efficient dictionary with worst case constant lookup time, equaling the theo...
The cuckoo filter data structure of Fan, Andersen, Kaminsky, and Mitzenmacher (CoNEXT 2014) performs...
We generalize Cuckoo Hashing \cite{PagRod01} to \emph{$d$-ary Cuckoo Hashing} and show how this yiel...
Abstract. Although cuckoo hashing has significant applications in both theoretical and practical set...
Cuckoo hashing holds great potential as a high-performance hashing scheme for real appli-cations. Up...
Analysis of AlgorithmsCuckoo hashing is a hash table data structure offering constant access time, e...
Cuckoo hashing is a powerful primitive that enables storing items using small space with efficient q...
In this paper, we provide a polylogarithmic bound that holds with high probability on the insertion ...
In k-ary cuckoo hashing, each of cn objects is associated with k random buckets in a hash table of s...
Cuckoo hashing was introduced by Pagh and Rodler in 2001. Its main feature is that it provides const...
The aim of this paper is to extend the analysis of Cuckoo Hashing of Devroye and Morin in 2003. In p...
Cuckoo hashing is an efficient technique for creating large hash tables with high space utilization ...
jthaler(at)fas.harvard.edu A dictionary (or map) is a key-value store that requires all keys be uniq...
Abstract. We study wear-leveling techniques for cuckoo hashing, showing that it is possible to achie...
Part 3: Reliability and ResilienceInternational audiencePeacock and Cuckoo hashing schemes are curre...
We present a simple and efficient dictionary with worst case constant lookup time, equaling the theo...
The cuckoo filter data structure of Fan, Andersen, Kaminsky, and Mitzenmacher (CoNEXT 2014) performs...
We generalize Cuckoo Hashing \cite{PagRod01} to \emph{$d$-ary Cuckoo Hashing} and show how this yiel...
Abstract. Although cuckoo hashing has significant applications in both theoretical and practical set...