Storing a Sparse Table with 0(1) Worst Case Access Time
Journal of the ACM (JACM)
Almost optimal lower bounds for small depth circuits
STOC '86 Proceedings of the eighteenth annual ACM symposium on Theory of computing
Pseudorandom generators for space-bounded computations
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
Journal of Computer and System Sciences
Eigenvalues and expansion of regular graphs
Journal of the ACM (JACM)
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
External memory algorithms and data structures: dealing with massive data
ACM Computing Surveys (CSUR)
Algorithmic derandomization via complexity theory
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
Randomness conductors and constant-degree lossless expanders
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
SIAM Journal on Computing
Storing information with extractors
Information Processing Letters
On Universal Classes of Extremely Random Constant Time Hash Functions and their Time-space Tradeoff
On Universal Classes of Extremely Random Constant Time Hash Functions and their Time-space Tradeoff
SFCS '89 Proceedings of the 30th Annual Symposium on Foundations of Computer Science
Algorithms and Data Structures for External Memory
Algorithms and Data Structures for External Memory
Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes
Journal of the ACM (JACM)
Poly-logarithmic Independence Fools AC^0 Circuits
CCC '09 Proceedings of the 2009 24th Annual IEEE Conference on Computational Complexity
CSR'11 Proceedings of the 6th international conference on Computer science: theory and applications
Hi-index | 0.00 |
We study probabilistic bit-probe schemes for the membership problem. Given a set A of at most n elements from the universe of size m we organize such a structure that queries of type "x ∈ A?" can be answered very quickly. H. Buhrman, P.B. Miltersen, J. Radhakrishnan, and S. Venkatesh proposed a bit-probe scheme based on expanders. Their scheme needs space of O(n log m) bits, and requires to read only one randomly chosen bit from the memory to answer a query. The answer is correct with probability 2/3 with two-sided errors. In this paper we show that for the same problem there exists a bitprobe scheme with one-sided error that needs space of O(n log2m + poly(logm)) bits. The difference with the model of Buhrman, Miltersen, Radhakrishnan, and Venkatesh is that we consider a bit-probe scheme with an auxiliary word. This means that in our scheme the memory is split into two parts of different size: the main storage of O(n log2m) bits and a short word of logO(1) m bits that is pre-computed once for the stored set A and "cached". To answer a query "x ε A?" we allow to read the whole cached word and only one bit from the main storage. For some reasonable values of parameters (e.g., for poly(log m) ≪ n ≪ m) our space bound is better than what can be achieved by any scheme without cached data (the lower bound Ω(n2 log m/log n) was proven in [11]). We obtain a slightly weaker result (space of size n1+δpoly(logm) bits and two bit probes for every query) for a scheme that is effectively encodable. Our construction is based on the idea of naive derandomization, which is of independent interest. First we prove that a random combinatorial object (a graph) has the required properties, and then show that such a graph can be obtained as an outcome of a pseudo-random generator. Thus, a suitable graph can be specified by a short seed of a PRG, and we can put an appropriate value of the seed into the cache memory of the scheme.