Non-oblivious hashing

  • Authors:
  • Amos Fiat;Moni Naor;Jeanette Schmidt;Alan Siegel

  • Affiliations:
  • Computer Science Division, University of California at Berkeley, Berkeley, CA;Computer Science Division, University of California at Berkeley, Berkeley, CA;Computer Science Department, Courant Institute, New York University, New York, NY;Computer Science Department, Courant Institute, New York University, New York, NY

  • Venue:
  • STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
  • Year:
  • 1988

Quantified Score

Hi-index 0.00

Visualization

Abstract

Non-oblivious hashing, where the information gathered by performing “unsuccessful” probes determines the probe strategy, is introduced and used to obtain the following results for static lookup on full tables:An &Ogr;(1) worst case scheme that requires only logarithmic additional memory (improving on the [FKS84] linear space upper bound).An almost sure &Ogr;(1) probabilistic worst case scheme, without any additional memory (improving on previous logarithmic time upper bounds).Enhancements to hashing: Solving (a) and (b) in the multikey record environment, search can be performed under any key in time &Ogr;(1); finding the nearest neighbor, the rank, etc. in logarithmic time.Our non-oblivious upper bounds are much better than the appropriate oblivious lower bounds.