2013
DOI: 10.1007/s00453-013-9763-6
|View full text |Cite
|
Sign up to set email alerts
|

Cache-Oblivious Hashing

Abstract: The hash table, especially its external memory version, is one of the most important index structures in large databases. Assuming a truly random hash function, it is known that in a standard external hash table with block size b, searching for a particular key only takes expected average t q = 1 + 1/2disk accesses for any load factor α bounded away from 1. However, such near-perfect performance is achieved only when b is known and the hash table is particularly tuned for working with such a blocking. In this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 26 publications
0
12
0
Order By: Relevance
“…MemC3 [8] not only ensured the high space utilization but also eliminated the limitation of the hash table size through labeling and an optimized locking mechanism. Hopscotch hashing [14] and Cache-oblivious hashing [15] improved the throughput performance by increasing the index pointer space to ensure access concurrency. Li et al [31] achieved the high concurrency of access through Hardware Transaction Memory (HTM) and a coarse locking mechanism.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…MemC3 [8] not only ensured the high space utilization but also eliminated the limitation of the hash table size through labeling and an optimized locking mechanism. Hopscotch hashing [14] and Cache-oblivious hashing [15] improved the throughput performance by increasing the index pointer space to ensure access concurrency. Li et al [31] achieved the high concurrency of access through Hardware Transaction Memory (HTM) and a coarse locking mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…Li et al [31] achieved the high concurrency of access through Hardware Transaction Memory (HTM) and a coarse locking mechanism. FlashStore [15] mapped an object to 16 bucket positions with Cuckoo hash, and increased the probability of looking for a free slot when inserting the object. Kirsch et al [16] used additional hidden space to reduce the overhead of looking for free space.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The competition between the two technology routes has intensified in recent years, from the basic CPU platform [92] to the NUMA platform [93], and it will certainly be extended to the new processor platforms in the future. The underlying reason behind this phenomenon is that it is difficult to quantify the optimization techniques, as in the field of in-memory database technology, although there are numerous hash structures and join algorithms currently [94][95][96], the simple question of which is the best in-memory hash join algorithm is still unknown [97]. In the future, when the new hardware environment is more and more complicated, performance should not be the only indicator to evaluate the advantages and disadvantages of algorithm.…”
Section: Query Processing and Optimization In Platforms With New Hardmentioning
confidence: 99%
“…We note that cache-oblivious data structures are not limited to search trees. They have been proposed in a variety of settings, some of which include hash tables [9], meshes [10], [11], and Bloom filters [12].…”
Section: Introductionmentioning
confidence: 99%