Tabulation-based 5-independent hashing with applications to linear probing and second moment estimation

M Thorup, Y Zhang�- SIAM Journal on Computing, 2012 - SIAM
SIAM Journal on Computing, 2012SIAM
In the framework of Wegman and Carter, ak-independent hash function maps any k keys
independently. It is known that 5-independent hashing provides good expected performance
in applications such as linear probing and second moment estimation for data streams. The
classic 5-independent hash function evaluates a degree 4 polynomial over a prime field
containing the key domain n={0,...,n-1\}. Here we present an efficient 5-independent hash
function that uses no multiplications. Instead, for any parameter c, we make 2c-1 lookups in�…
In the framework of Wegman and Carter, a k-independent hash function maps any k keys independently. It is known that 5-independent hashing provides good expected performance in applications such as linear probing and second moment estimation for data streams. The classic 5-independent hash function evaluates a degree 4 polynomial over a prime field containing the key domain . Here we present an efficient 5-independent hash function that uses no multiplications. Instead, for any parameter c, we make lookups in tables of size . In experiments on different computers, our scheme gained factors of 1.8 to 10 in speed over the polynomial method. We also conducted experiments on the performance of hash functions inside the above applications. In particular, we give realistic examples of inputs that make the most popular 2-independent hash function perform quite poorly. This illustrates the advantage of using schemes with provably good expected performance for all inputs.
Society for Industrial and Applied Mathematics