2-choice hashing

2-choice hashing, also known as 2-choice chaining, is "a variant of a hash table in which keys are added by hashing with two hash functions. The key is put in the array position with the fewer (colliding) keys. Some collision resolution scheme is needed, unless keys are kept in buckets. The average-case cost of a successful search is O(2 + (m1)/n), where m is the number of keys and n is the size of the array. The most collisions is with high probability."[1]

How It Works

2-choice hashing utilizes two hash functions h1(x) and h2(x) which work as hash functions are expected to work (i.e. mapping integers from the universe into a specified range). The two hash functions should be independent and have no correlation to each other. Having two hash functions allows any key x to have up to two potential locations to be stored based on the values of the respective outputs, h1(x) and h2(x). It is important to note that, although there are two hash functions, there is only one table; both hash functions map to locations on that table.

Implementation

The most important functions of the hashing implementation in this case are insertion and search.

  • Insertion: When inserting the values of both hash functions are computed for the to-be-inserted object. The object is then placed in the bucket which contains fewer objects. If the buckets are equal in size, the default location is the h1(x) value.
  • Search: Effective searches are done by looking in both buckets (the bucket locations to which h1(x) and h2(x) mapped) for the desired value.

Performance

As is true with all hash tables, the performance is based on the largest bucket. Although there are instances where bucket sizes happen to be large based on the values and the hash functions used, this is rare. Having two hash functions and, therefore, two possible locations for any one value, makes the possibility of large buckets even more unlikely to happen.

The expected bucket size while using 2-choice hashing is: θ(log(log(n))). This improvement is due to the randomized concept known as The Power of Two Choices.

Using two hash functions offers substantial benefits over a single hash function. There is little improvement (and no change to the expected order statistics) if more than two hash functions are used: "Additional hash functions only decrease the maximum by a constant factor."[2]

Some people recommend a type of 2-choice hashing called two-way skewed-associative cache in some CPU caches.[3]

2-left hashingusing two hash tables of equal size n/2, and asymmetrically resolving ties by putting the key in the left hash tablehas fewer collisions and therefore better performance than 2-choice hashing with one large hash table of size n.[4]

gollark: Images are *pretty* big, although new lossy compression stuff like AVIF can get really small sizes without horrible quality loss, and videos are gigantic since they're effectively images and audio stitched together at 60 frames a second (well, or 25, or various other ones).
gollark: Anyway, text is not big - you can fit an entire book (again with compression) into less than a megabyte. In many ebooks the cover image and such are larger than the actual text.
gollark: > Take that backNo. They're basically just PICTURES OF PAGES with some metadata. They are AWFUL for anything but scanned documents.
gollark: It's a highly compressed archive of HTML pages and images and stuff.
gollark: No, PDFs are terrible.

References

  1.  This article incorporates public domain material from the NIST document: Black, Paul E. "2-choice hashing". Dictionary of Algorithms and Data Structures. 2008. (accessed 2016-07-28).
  2. Paul E. Black, DADS, retrieved 29 January 2015.
  3. "Micro-Architecture".
  4.  This article incorporates public domain material from the NIST document: Black, Paul E. "2-left hashing". Dictionary of Algorithms and Data Structures. 19 December 2012. (accessed 2015-09-15).

 This article incorporates public domain material from the NIST document: Black, Paul E. "2-choice hashing". Dictionary of Algorithms and Data Structures.

Further reading

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.