2014
DOI: 10.1007/978-3-319-07959-2_12
|View full text |Cite
|
Sign up to set email alerts
|

Retrieval and Perfect Hashing Using Fingerprinting

Abstract: Recent work has shown that perfect hashing and retrieval of data values associated with a key can be done in such a way that there is no need to store the keys and that only a few bits of additional space per element are needed. We present FiRe -a new, very simple approach to such data structures. FiRe allows very fast construction and better cache efficiency. The main idea is to substitute keys by small fingerprints. Collisions between fingerprints are resolved by recursively handling those elements in an ove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(16 citation statements)
references
References 18 publications
0
16
0
Order By: Relevance
“…Recently, Müller et al [MSSZ14] introduced a completely new technique for minimal perfect hashing. A series of bit arrays of decreasing size, called levels, is used to record information about collisions between keys.…”
Section: Fingerprintingmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, Müller et al [MSSZ14] introduced a completely new technique for minimal perfect hashing. A series of bit arrays of decreasing size, called levels, is used to record information about collisions between keys.…”
Section: Fingerprintingmentioning
confidence: 99%
“…Techniques based on random linear systems, such as derivatives of the venerable construction by Majewski, Wormald, Havas, and Czech [MWHC96], are reasonably fast in construction and quite fast in lookups, but they each only achieve about 2.24 bits per key [GOV16]. Finally, techniques based on fingerprints [MSSZ14] are extremely fast in construction and lookup, but only when the space occupancy is extremely large (e.g., above 4 bits per key).…”
Section: Introductionmentioning
confidence: 99%
“…The construction of a MPHF can be hyper-graph peeling-based [16,17] or array-based [18]. The first family of algorithms leads to smaller MPHFs, close to the theoretical space lower-bound of 1.44 bits per key, while array-based MPHFs are more cache friendly and much easier conceptually despite being less memory efficient than their mainstream counterparts.…”
Section: Minimal Perfect Hashingmentioning
confidence: 99%
“…In the experimental part of this work (Section 4), we show that when applied to the k-mer counting, the error of Count-Min may not be acceptable. The construction of a MPHF can be hyper-graph peeling-based [16,17] or array-based [18]. The first family of algorithms leads to smaller MPHFs, close to the theoretical space lower-bound of 1.44 bits per key, while array-based MPHFs are more cache friendly and much easier conceptually despite being less memory efficient than their mainstream counterparts.…”
Section: K-mer Spectrummentioning
confidence: 99%
“…The construction of MPHFs can be hyper-graph peeling-based [19,20] or array-based [21]. The first family of algorithms leads to smaller MPHFs, close to theoretical space lower-bound of 1.44 bits per key, while array-based MPHFs are conceptually simpler and have practical implementations for k-mer sets, such as BBHash [22].…”
Section: Minimal Perfect Hashingmentioning
confidence: 99%