请输入您要查询的百科知识:

 

词条 Open addressing
释义

  1. Example pseudocode

  2. See also

  3. References

Open addressing, or closed hashing, is a method of collision resolution in hash tables. With this method a hash collision is resolved by probing, or searching through alternate locations in the array (the probe sequence) until either the target record is found, or an unused array slot is found, which indicates that there is no such key in the table.[1] Well-known probe sequences include:

//Linear probing">Linear probing : in which the interval between probes is fixed — often set to 1.
//Quadratic probing">Quadratic probing : in which the interval between probes increases quadratically (hence, the indices are described by a quadratic function).
//Double hashing">Double hashing : in which the interval between probes is fixed for each record but is computed by another hash function.

The main tradeoffs between these methods are that linear probing has the best cache performance but is most sensitive to clustering, while double hashing has poor cache performance but exhibits virtually no clustering; quadratic probing falls in-between in both areas. Double hashing can also require more computation than other forms of probing.

Some open addressing methods, such as

Hopscotch hashing,

Robin Hood hashing,

last-come-first-served hashing and cuckoo hashing move existing keys around in the array to make room for the new key. This gives better maximum search times than the methods based on probing.

[2][3][4][5][6]

A critical influence on performance of an open addressing hash table is the load factor; that is, the proportion of the slots in the array that are used. As the load factor increases towards 100%, the number of probes that may be required to find or insert a given key rises dramatically. Once the table becomes full, probing algorithms may even fail to terminate. Even with good hash functions, load factors are normally limited to 80%. A poor hash function can exhibit poor performance even at very low load factors by generating significant clustering, especially with the simplest linear addressing method. Generally typical load factors with most open addressing methods are 50%, whilst separate chaining typically can use up to 100%.

What causes hash functions to cluster is not well understood {{Citation needed|date=September 2009}}, and it is easy to unintentionally write a hash function that causes severe clustering.

Example pseudocode

The following pseudocode is an implementation of an open addressing hash table with linear probing and single-slot stepping, a common approach that is effective if the hash function is good. Each of the lookup, set and remove functions use a common internal function find_slot to locate the array slot that either does or should contain a given key.

  '''record''' pair { key, value }  '''var''' ''pair array'' slot[0..num_slots-1]
  '''function''' find_slot(key)      i := hash(key) modulo num_slots      ''// search until we either find the key, or find an empty slot.      '''while''' (slot[i] is occupied) and ( slot[i].key ≠ key )          i = (i + 1) modulo num_slots      '''return''' i
  '''function''' lookup(key)      i := find_slot(key)      '''if''' slot[i] is occupied   ''// key is in table''          '''return''' slot[i].value      '''else'''                     ''// key is not in table''          '''return''' not found
  '''function''' set(key, value)      i := find_slot(key)      '''if''' slot[i] is occupied   ''// we found our key''          slot[i].value = value          '''return'''      '''if''' the table is almost full          rebuild the table larger ''(note 1)''          i = find_slot(key)      slot[i].key   = key      slot[i].value = value
note 1
Rebuilding the table requires allocating a larger array and recursively using the set operation to insert all the elements of the old array into the new larger array. It is common to increase the array size exponentially, for example by doubling the old array size.
  '''function''' remove(key)      i := find_slot(key)      '''if''' slot[i] is unoccupied          return   ''// key is not in the table''      j := i      '''loop'''          mark slot[i] as unoccupied         r2: ''(note 2)''          j := (j+1) modulo num_slots          '''if''' slot[j] is unoccupied              '''exit loop'''          k := hash(slot[j].key) modulo num_slots          // determine if k lies cyclically in (i,j]          // |    i.k.j |          // |....j i.k.| or  |.k..j i...|          if ( (i<=j) ? ((i
note 2
For all records in a cluster, there must be no vacant slots between their natural hash position and their current position (else lookups will terminate before finding the record). At this point in the pseudocode, i is a vacant slot that might be invalidating this property for subsequent records in the cluster. j is such a subsequent record. k is the raw hash where the record at j would naturally land in the hash table if there were no collisions. This test is asking if the record at j is invalidly positioned with respect to the required properties of a cluster now that i is vacant.

Another technique for removal is simply to mark the slot as deleted. However this eventually requires rebuilding the table simply to remove deleted records. The methods above provide O(1) updating and removal of existing records, with occasional rebuilding if the high-water mark of the table size grows.

The O(1) remove method above is only possible in linearly probed hash tables with single-slot stepping. In the case where many records are to be deleted in one operation, marking the slots for deletion and later rebuilding may be more efficient.

See also

  • Lazy deletion – a method of deleting from a hash table using open addressing.

References

1. ^{{Citation | title=Data Structures Using C | first1=Aaron M. | last1=Tenenbaum | first2=Yedidyah | last2=Langsam | first3=Moshe J. | last3=Augenstein | publisher=Prentice Hall | year=1990 | isbn=0-13-199746-7 | pages=456–461, pp. 472}}
2. ^Poblete; Viola; Munro."The Analysis of a Hashing Scheme by the Diagonal Poisson Transform".p. 95 ofJan van Leeuwen (Ed.)[https://books.google.com/books?id=2aCoW8m40AwC "Algorithms - ESA '94"].1994.
3. ^Steve Heller.[https://books.google.com/books?id=gaajBQAAQBAJ "Efficient C/C++ Programming: Smaller, Faster, Better"]2014.p. 33.
4. ^Patricio V. Poblete, Alfredo Viola.[https://arxiv.org/abs/1605.04031 "Robin Hood Hashing really has constant average search cost and variance in full tables"].2016.
5. ^Paul E. Black, [https://xlinux.nist.gov/dads/HTML/LastComeFirstServedHashing.html "Last-Come First-Served Hashing"], in Dictionary of Algorithms and Data Structures [online], Vreda Pieterse and Paul E. Black, eds. 17 September 2015.
6. ^Paul E. Black, [https://www.nist.gov/dads/HTML/robinHoodHashing.html "Robin Hood hashing"], in Dictionary of Algorithms and Data Structures [online], Vreda Pieterse and Paul E. Black, eds. 17 September 2015.

1 : Hashing

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/21 10:50:38