Not all keys can be hashed in constant time.

Joseph Gil*, Friedhelm Meyer auf der Heide, Avi Wigderson

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Scopus citations

Abstract

The authors present a simple new model that captures many natural (sequential and parallel) hashing algorithms. In a game against nature, the algorithm and coin-tosses cause the evolution of a random tree, whose size corresponds to space (hash table size), and two notions of depth correspond respectively to the largest probe sequences for insertion (parallel insertion time) and search of a key. It was observed, that although average insertion time per element is constant, parallel application of this (and other) algorithms cannot work in constant time. The reason is that while the average is constant, some elements will have to be hashed nonconstant number of times. The main results exhibit tight trade-offs between space and parallel time, in the basic model and three variants, which capture standard hashing practice.

Original languageEnglish
Title of host publicationProc 22nd Annu ACM Symp Theory Comput
PublisherPubl by ACM
Pages244-253
Number of pages10
ISBN (Print)0897913612, 9780897913614
DOIs
StatePublished - 1990
EventProceedings of the 22nd Annual ACM Symposium on Theory of Computing - Baltimore, MD, USA
Duration: 14 May 199016 May 1990

Publication series

NameProc 22nd Annu ACM Symp Theory Comput

Conference

ConferenceProceedings of the 22nd Annual ACM Symposium on Theory of Computing
CityBaltimore, MD, USA
Period14/05/9016/05/90

Fingerprint

Dive into the research topics of 'Not all keys can be hashed in constant time.'. Together they form a unique fingerprint.

Cite this