skip to main content
research-article

Load Thresholds for Cuckoo Hashing with Overlapping Blocks

Published:05 May 2023Publication History
Skip Abstract Section

Abstract

We consider a natural variation of cuckoo hashing proposed by Lehman and Panigrahy (2009). Each of cn objects is assigned k = 2 intervals of size ℓ in a linear hash table of size n and both starting points are chosen independently and uniformly at random. Each object must be placed into a table cell within its intervals, but each cell can only hold one object. Experiments suggested that this scheme outperforms the variant with blocks in which intervals are aligned at multiples of ℓ. In particular, the load threshold is higher, i.e., the load c that can be achieved with high probability. For instance, Lehman and Panigrahy (2009) empirically observed the threshold for ℓ = 2 to be around 96.5% as compared to roughly 89.7% using blocks. They pinned down the asymptotics of the thresholds for large ℓ, but the precise values resisted rigorous analysis.

We establish a method to determine these load thresholds for all ℓ ≥ 2, and, in fact, for general k ≥ 2. For instance, for k = ℓ = 2, we get ≈ 96.4995%. We employ a theorem due to Leconte, Lelarge, and Massoulié (2013), which adapts methods from statistical physics to the world of hypergraph orientability. In effect, the orientability thresholds for our graph families are determined by belief propagation equations for certain graph limits. As a side note, we provide experimental evidence suggesting that placements can be constructed in linear time using an adapted version of an algorithm by Khosla (2013).

REFERENCES

  1. [1] Aldous David and Steele J. Michael. 2004. The Objective Method: Probabilistic Combinatorial Optimization and Local Weak Convergence. Springer, Berlin, 172. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Beyer Stephan. 2012. Analysis of the Linear Probing Variant of Cuckoo Hashing. Master’s Thesis. Technische Universität Ilmenau. Retrieved from http://gso.gbv.de/DB=2.1/PPNSET?PPN=685166759.Google ScholarGoogle Scholar
  3. [3] Cain Julie Anne, Sanders Peter, and Wormald Nicholas C.. 2007. The random graph threshold for \(k\)-orientiability and a fast algorithm for optimal multiple-choice allocation. In Proceedings of the 18th SODA. 469476. Retrieved from http://dl.acm.org/citation.cfm?id=1283383.1283433.Google ScholarGoogle Scholar
  4. [4] Dietzfelbinger Martin, Goerdt Andreas, Mitzenmacher Michael, Montanari Andrea, Pagh Rasmus, and Rink Michael. 2010. Tight thresholds for cuckoo hashing via XORSAT. In Proceedings of the 37th ICALP (1). 213225. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Dietzfelbinger Martin and Weidling Christoph. 2005. Balanced allocation and dictionaries with tightly packed constant size bins. In Proceedings of the 32nd ICALP. 166178. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Dietzfelbinger Martin and Weidling Christoph. 2007. Balanced allocation and dictionaries with tightly packed constant size bins. Theor. Comput. Sci. 380, 1-2 (2007), 4768. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Fernholz Daniel and Ramachandran Vijaya. 2007. The \(k\)-orientability Thresholds for \(G_{n,p}\). In Proceedings of the 18th SODA. 459468. Retrieved from http://dl.acm.org/citation.cfm?id=1283383.1283432.Google ScholarGoogle Scholar
  8. [8] Fotakis Dimitris, Pagh Rasmus, Sanders Peter, and Spirakis Paul G.. 2005. Space efficient hash tables with worst case constant access time. Theory Comput. Syst. 38, 2 (2005), 229248. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Fountoulakis Nikolaos, Khosla Megha, and Panagiotou Konstantinos. 2011. The multiple-orientability thresholds for random hypergraphs. In Proceedings of the 22nd SODA. 12221236. Retrieved from http://www.siam.org/proceedings/soda/2011/SODA11_092_fountoulakisn.pdf.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Fountoulakis Nikolaos and Panagiotou Konstantinos. 2010. Orientability of random hypergraphs and the power of multiple choices. In Proceedings of the 37th ICALP (1). 348359. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Fountoulakis Nikolaos and Panagiotou Konstantinos. 2012. Sharp load thresholds for cuckoo hashing. Random Struct. Algorithms 41, 3 (2012), 306333. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Frieze Alan M. and Melsted Páll. 2012. Maximum matchings in random bipartite graphs and the space utilization of cuckoo hash tables. Random Struct. Algorithms 41, 3 (2012), 334364. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Gao Pu and Wormald Nicholas C.. 2010. Load balancing and orientability thresholds for random hypergraphs. In Proceedings of the 42nd STOC. 97104. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Janson Svante and Luczak Malwina J.. 2007. A simple solution to the k-core problem. Random Struct. Algorithms 30, 1-2 (2007), 5062. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Khosla Megha. 2013. Balls into bins made faster. In Proceedings of the 21st ESA. 601612. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Khosla Megha and Anand Avishek. 2019. A faster algorithm for cuckoo insertion and bipartite matching in large graphs. Algorithmica 81, 9 (2019), 37073724. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Leconte Mathieu. 2013. Double hashing thresholds via local weak convergence. In Proceedings of the 51st Annual Allerton Conference. 131137. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Leconte M., Lelarge M., and Massoulié L.. 2013. Convergence of multivariate belief propagation, with applications to cuckoo hashing and load balancing. In Proceedings of the 24th SODA. 3546. http://dl.acm.org/citation.cfm?id=2627817.2627820.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Lehman Eric and Panigrahy Rina. 2009. 3.5-way cuckoo hashing for the price of 2-and-a-Bit. In Proceedings of the 17th ESA. 671681. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Lelarge Marc. 2012. A new approach to the orientation of random hypergraphs. In Proceedings of the 23rd SODA. 251264. Retrieved from http://dl.acm.org/citation.cfm?id=2095139.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Mitzenmacher Michael, Panagiotou Konstantinos, and Walzer Stefan. 2018. Load thresholds for cuckoo hashing with double hashing. In SWAT (Leibniz International Proceedings in Informatics (LIPIcs’18)), Eppstein David (Ed.), Vol. 101. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 29:1–29:9. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Molloy Michael. 2005. Cores in random hypergraphs and Boolean formulas. Random Struct. Algorithms 27, 1 (2005), 124135. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Pagh Rasmus and Rodler Flemming Friche. 2004. Cuckoo hashing. J. Algorithms 51, 2 (2004), 122144. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Porat Ely and Shalem Bar. 2012. A cuckoo hashing variant with improved memory utilization and insertion time. In Proceedings of the 22nd DCC. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Load Thresholds for Cuckoo Hashing with Overlapping Blocks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Algorithms
        ACM Transactions on Algorithms  Volume 19, Issue 3
        July 2023
        281 pages
        ISSN:1549-6325
        EISSN:1549-6333
        DOI:10.1145/3592471
        • Editor:
        • Edith Cohen
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 5 May 2023
        • Online AM: 31 March 2023
        • Accepted: 7 March 2023
        • Revised: 11 September 2021
        • Received: 19 October 2018
        Published in talg Volume 19, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)140
        • Downloads (Last 6 weeks)10

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format