2014
DOI: 10.1007/978-3-319-07959-2_14
|View full text |Cite
|
Sign up to set email alerts
|

Wear Minimization for Cuckoo Hashing: How Not to Throw a Lot of Eggs into One Basket

Abstract: We study wear-leveling techniques for cuckoo hashing, showing that it is possible to achieve a memory wear bound of log log n + O(1) after the insertion of n items into a table of size Cn for a suitable constant C using cuckoo hashing. Moreover, we study our cuckoo hashing method empirically, showing that it significantly improves on the memory wear performance for classic cuckoo hashing and linear probing in practice.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(18 citation statements)
references
References 29 publications
0
18
0
Order By: Relevance
“…In particular, we require that c < 1/(q(q − 1)), which results in an underlying hypergraph that is all trees and unicyclic components with high probability. See [11] for a discussion of and definitions for trees an unicyclic components in the hypergraph.…”
Section: Invertible Bloom Lookup Tablesmentioning
confidence: 99%
“…In particular, we require that c < 1/(q(q − 1)), which results in an underlying hypergraph that is all trees and unicyclic components with high probability. See [11] for a discussion of and definitions for trees an unicyclic components in the hypergraph.…”
Section: Invertible Bloom Lookup Tablesmentioning
confidence: 99%
“…Prior work [7,21,25,38,39,47] has studied read-write asymmetries in NAND flash memory, but this work has focused on (i) the asymmetric granularity of reads and writes in NAND flash chips: bits can only be cleared by incurring the overhead of erasing a large block of memory, and/or (ii) the asymmetric endurance of reads and writes: individual cells wear out after tens of thousands of writes to the cell. Emerging memories, in contrast, can read and write arbitrary bytes in-place and have many orders of magnitude higher write endurance, enabling system software to readily balance application writes across individual physical cells by adjusting its virtual-to-physical mapping.…”
Section: Related Workmentioning
confidence: 99%
“…1 This trend poses the interesting question of how to design algorithms that are more efficient in the number of writes than in the number of reads. To this end recent works have studied models that account for asymmetric read-write costs and have analyzed a variety of algorithms in these models [8,9,12,13,15,17,24,25,31,38,46,47].…”
Section: Introductionmentioning
confidence: 99%