skip to main content
article
Free Access

Uniform hashing is optimal

Published:01 July 1985Publication History
Skip Abstract Section

Abstract

It was conjectured by J. Ullman that uniform hashing is optimal in its expected retrieval cost among all open-address hashing schemes [4]. In this paper, we show that, for any open-address hashing scheme, the expected cost of retrieving a record from a large table that is α-fraction full is at least (1/α) log (1/(1 - α)) + o(1). This proves Ullman's conjecture to be true in the asymptotic sense.

References

  1. 1 AJTAI, M., KOMLOS, J., AND SZEMEREDI, E.There is no fast single hashing function. Inf. Proc. Lett. 7 (1978), 270-273.Google ScholarGoogle Scholar
  2. 2 KNUTH, D.E.Computer science and its relation to mathematics. Am. Math. Monthly 8 (1974), 323-343.Google ScholarGoogle Scholar
  3. 3 KNUTH, D.E.The Art of Computer Programming. Vol. 3, Sorting and Searching. Addison- Welsley, Reading, Mass., 1975 (2nd printing). Google ScholarGoogle Scholar
  4. 4 ULLMAN, J. D. A note on the efficiency of hashing functions, at. ACM 19, 3 (July 1972), 569-575. Google ScholarGoogle Scholar

Index Terms

  1. Uniform hashing is optimal

      Recommendations

      Reviews

      Alfs T. Berztiss

      Open addressing is a method for constructing hash tables. Under this method, the key of a record maps to a sequence that is a permutation of all the locations of a hash table. A record is inserted in the first free location found by following the sequence. In the uniform hashing variant of open addressing, the permutations are random. Yao proves that the average cost of retrieving a record from any open-addressing hash table is no smaller than this cost under uniform hashing. The question of whether uniform hashing is also the optimal open addressing method for insertion remains open.

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Journal of the ACM
        Journal of the ACM  Volume 32, Issue 3
        July 1985
        245 pages
        ISSN:0004-5411
        EISSN:1557-735X
        DOI:10.1145/3828
        Issue’s Table of Contents

        Copyright © 1985 ACM

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 July 1985
        Published in jacm Volume 32, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader