Storing a Sparse Table with 0(1) Worst Case Access Time
Journal of the ACM (JACM)
Information Processing Letters
Collections of functions for perfect hashing
SIAM Journal on Computing
Searching a two key table under a single key
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Storing and searching a multikey table
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Optimal Arrangement of Keys in a Hash Table
Journal of the ACM (JACM)
Expected Length of the Longest Probe Sequence in Hash Code Searching
Journal of the ACM (JACM)
Journal of the ACM (JACM)
Communications of the ACM
An Improved Program for Constructing Open Hash Tables
Proceedings of the 7th Colloquium on Automata, Languages and Programming
The program complexity of searching a table (data structures, applied combinatorics)
The program complexity of searching a table (data structures, applied combinatorics)
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
Storing and searching a multikey table
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
On aspects of university and performance for closed hashing
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Error correcting codes, perfect hashing circuits, and deterministic dynamic dictionaries
Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms
ACM Transactions on Algorithms (TALG)
Hi-index | 0.00 |
Non-oblivious hashing, where the information gathered by performing “unsuccessful” probes determines the probe strategy, is introduced and used to obtain the following results for static lookup on full tables:An &Ogr;(1) worst case scheme that requires only logarithmic additional memory (improving on the [FKS84] linear space upper bound).An almost sure &Ogr;(1) probabilistic worst case scheme, without any additional memory (improving on previous logarithmic time upper bounds).Enhancements to hashing: Solving (a) and (b) in the multikey record environment, search can be performed under any key in time &Ogr;(1); finding the nearest neighbor, the rank, etc. in logarithmic time.Our non-oblivious upper bounds are much better than the appropriate oblivious lower bounds.