# Compact Hash Tables Using Bidirectional Linear Probing

@article{Clerry1984CompactHT, title={Compact Hash Tables Using Bidirectional Linear Probing}, author={Clerry}, journal={IEEE Transactions on Computers}, year={1984}, volume={C-33}, pages={828-834} }

An algorithm is developed which reduces the memory requirements of hash tables. This is achieved by storing only a part of each key along with a few extra bits needed to ensure that all keys are stored unambiguously. The fraction of each key stored decreases as the size of the hash table increases. Significant reductions in total memory usage can be achieved especially when the key size is not much larger than the size of a memory index and when only a small amount of data is stored with each…

## Topics from this paper

## 55 Citations

m-Bonsai: a Practical Compact Dynamic Trie

- Mathematics, Computer ScienceInt. J. Found. Comput. Sci.
- 2018

The problem of implementing a space-efficient dynamic trie, with an emphasis on good practical performance, is considered, and an implementation of m-Bonsai is given which uses considerably less memory and is slightly faster than the original Bonsai.

Adaptive approximate state storage

- Computer Science
- 2010

This dissertation analyzes the approximate state storage problem in unprecedented detail, improves upon standard solutions, and demonstrates a novel approach that solves a configuration dilemma facing users of the standard solutions.

Compact Dynamic Rewritable (CDRW) Arrays

- Computer ScienceALENEX
- 2017

This paper considers the problem of compactly representing a rewritable array of bit-strings and aims to approach the minimum possible space bound.

Cache-, hash-, and space-efficient bloom filters

- Computer ScienceJEAL
- 2010

This work proposes several new variants of Bloom filters and replacements with similar functionality that have a better cache-efficiency and need less hash bits than regular Bloom filters, and some use SIMD functionality, while the others provide an even better space efficiency.

Dynamic Path-decomposed Tries

- Computer ScienceACM J. Exp. Algorithmics
- 2020

The main idea is to embrace the path decomposition technique, which was proposed for constructing cache-friendly tries, and design data structures based on recent compact hash trie representations to store the path-decomposed trie in small memory.

A Parallel Compact Hash Table

- Computer Science, MathematicsMEMICS
- 2011

We present the first parallel compact hash table algorithm. It delivers high performance and scalability due to its dynamic region-based locking scheme with only a fraction of the memory requirements…

A Simple, Fast, and Compact Static Dictionary

- Mathematics, Computer ScienceISAAC
- 2009

A new static dictionary that is very fast and compact, while also extremely easy to implement is presented, and a space bound is proved with a novel application of the Kolmogorov-Smirnov distribution.

Fast, All-Purpose State Storage

- Computer ScienceSPIN
- 2009

A scheme that adapts at run time to the number of states visited, within a fixed memory space and with remarkable speed and accuracy, wellsuited for a future in which random accesses to memory are more of a limiting factor than the size of memory.

Compact dictionaries for variable-length keys and data with applications

- Mathematics, Computer ScienceTALG
- 2008

Several applications are presented, including representations for semidynamic graphs, order queries on integers sets, cardinal trees with varying cardinality, and simplicial meshes of <i>d</i> dimensions.

Recursive Variable-Length State Compression for Multi-Core Software Model Checking

- Computer ScienceNFM
- 2021

dtree is introduced, a concurrent compression tree data structure that compactly stores variable-length states while allowing partial state reconstruction and incremental updates without concretising states and supports describing a state as a tree, allowing direct modeling of the heap.

## References

SHOWING 1-9 OF 9 REFERENCES

Universal Classes of Hash Functions

- Computer Science, MathematicsJ. Comput. Syst. Sci.
- 1979

An input independent average linear time algorithm for storage and retrieval on keys that makes a random choice of hash function from a suitable class of hash functions.

Key-To-Address Transformation Techniques

- Mathematics
- 1978

AbstractA number of key-to-address transformations are surveyed with particular emphasis given to distribution-dependent hashing methods. The open addressing, separate chaining, coalesced chaining,…

Hash Table Methods

- Computer ScienceCSUR
- 1975

It is shown that under certain conditmns the authors can guarantee that no two items belonging to a certain class will have the same hash code, thus providing an improvement over the usual notion of a hash code as a randomizing technique.

Ordered Hash Tables

- Computer ScienceComput. J.
- 1974

Abstract : Some variants of the traditional hash method, making use of the numerical or alphabetical order of the keys, lead to faster searching at the expense of a little extra work when items are…

Comment on Brent's scatter storage algorithm

- Computer ScienceCACM
- 1973

R.P. Brent in his presentation of a modification to the linear quotient algorithm [1] shares the common misconception that dynamic chaining requires larger table entries because of the space required…

General performance analysis of key-to-address transformation methods using an abstract file concept

- Computer ScienceCACM
- 1973

This paper presents a new approach to the analysis of performance of the various key-to-address transformation methods. In this approach the keys in a file are assumed to have been selected from the…

Key-to-address transform techniques: a fundamental performance study on large existing formatted files

- Computer ScienceCACM
- 1971

The intricacy of the generalized radix transformation method has motivated us to conduct further studies of the technique and it is more appropriate to change the label of that transformation in [1] from "Lin's method" to "generalized radix Transformation method" and use this term here.