[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

Order-preserving minimal perfect hash functions and information retrieval

Published: 01 July 1991 Publication History
First page of PDF

References

[1]
AUSTIN, T.L. The enumeration of point labeled chromatic graphs and trees. Canadian J. Math. 12 (1960), 535-545.
[2]
BOLLOBS, B. Random Graphs. Academic Press, London, 1985
[3]
C~EN, QI FAN. A high-performance object oriented database system for information retrieval applications. Dissertation proposal, Dept. of Computer Science, Virginia Polytechnic Inst. & State Univ., 1990.
[4]
DAOUD, A. M. Efficient Data Structures for Information Retrieval Systems. Dissertation proposal. Dept. of Computer Science, Virginia Polytechnic Inst. & State Univ., 1990.
[5]
DATTA, S. Implementation of perfect hash function schemes. Master's report, Dept. of Computer Science, Virginia Polytechnic Inst. & State Univ., 1988.
[6]
ENBODY, R. J., AND DU, H.C. Dynamic hashing schemes. ACM Comput. Surv. 20, (1988), 85-113.
[7]
Fox, E.A. Characterization of two new experimental collecLions in computer and information science containing textual and bibliographic concepts. TR 83-561, Dept. of Computer Science, Cornell Univ., Ithaca, N.Y., Sept. 1983.
[8]
Fox, E. A. Development of the CODER System: A Testbed for Artificial Intelligence Methods in Information Retrieval. Inf. Process. Manage. 23, 4 (1987), 341-366.
[9]
Fox. E. A. Optical disks and CD-ROM: Publishing and access. In Annual Review of Information Science and Technology 23, Martha E. Williams, Ed., ^SIS/Elsevier Science, Amsterdam, 1988, 85-124.
[10]
Fox, E. A., editor and project manager. Virginia Disc One. Produced by Nimbus Records, 1990. Blacksburg, VA: VPI&SU Press.
[11]
Fox, E. A., CnEN, Q. F., DAoun, A. M., ANn HEATH, L.S. Order preserving minimal perfect hash functions and information retrieval. TR 91-1, Dept. of Computer Science, Virginia Polytechnic Inst. & State Univ., Feb. 1991.
[12]
Fox, E. A., CHEN, Q. F., HEATH, L., AND DATTA, S. A mere cost effective algorithm for finding perfect hash functions. In Proceedings of the Seventeenth Annual ACM Computer Science Conference (Feb. 21-23, 1989), 114-122.
[13]
Fox, E. A., HEATH, L. S., AND CnEN, Q.F. An O(n log n) algorithm for finding minimal perfect hash functions. TR 89-10, Dept. of Computer Science, Virginia Polytechnic Inst. & State Univ, Apr. 1989. Revised version accepted for Commun. ACM, 1992.
[14]
Fox, E. A., NUTTER, J., AHLSWEDE, T., EVENS, M., AND M^RKOWITZ, J. Building a large thesaurus for information retrieval. In Proceedings Second Conference on Applied Natural Language Processing (Austin, Tex., Feb. 9-12, 1988), 101-108.
[15]
FRANCE, R. K., Fox, E., NUTTER, J. T., AND CHEN, Q.F. Building a relational lexicon for text understanding and retrieval. In Proceedings First International Language Acquisition Workshop, (Detroit, Aug. 21, 1989). 6 pages.
[16]
GARG, A. K., ANn GOTLmB, C. C. Order-preserving key l:ransformations. ACM Trans. Database Syst. 11, 2 (June 1986), 213-234.
[17]
HA~KS, P., Ed. Collin6 Enghah Dictionary. William Gollins Sons & Co., London, 1979.
[18]
MEHLHORN, K. G. On the program size of perfect and universal hash functions. In Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, (Nov 3-5. 1982) pp. 170-175.
[19]
NUTTER, J. T., Fox, E A, AND EVENS, M. Building a lexicon from machine-readable dictionaries for improved information retrieval. In The Dynamic Text: 16th ALLC and 9th ICCH InternatioTzal Conferences (Toronto, Ontario, June 6-9, 1989). Revised version to appear in L~terary and Linguistic Computing 5, 2 (1990), 129-138.
[20]
PALMER, E M. Graphzcal Evolution: An Introduction to the Theory of R,ndom Graphs. Wiley, New York, 1985.
[21]
SAGER, T. J A polynomial time generator for minimal perfect hash functions. Commun. ACM 28, (May, 1985), 523-532

Cited By

View all
  • (2024)METAL: Caching Multi-level Indexes in Domain-Specific ArchitecturesProceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 210.1145/3620665.3640402(715-729)Online publication date: 27-Apr-2024
  • (2023) Locality-preserving minimal perfect hashing of k -mers Bioinformatics10.1093/bioinformatics/btad21939:Supplement_1(i534-i543)Online publication date: 30-Jun-2023
  • (2022)Randomized First-Order Monitoring with HashingRuntime Verification10.1007/978-3-031-17196-3_1(3-24)Online publication date: 28-Sep-2022
  • Show More Cited By

Recommendations

Reviews

Aaron M. Tenenbaum

A perfect hash function h for a set of keys is a hash function such that h k1 ?h k2 for any two keys k 1 and k 2 in the set. Data associated with a key k at location h ( k ) in a table can therefore be located in a single access. The function h is order-preserving if h ( k 1) < h ( k 2) whenever k 1 < k 2 ; h is minimal if the largest value h ( k ) is minimized. This paper demonstrates a practical method for determining order-preserving minimal perfect hash functions for a given set of keys. Such algorithms are extremely important and useful, as the authors describe. While the exposition is clear and detailed, the paper is dependent on an earlier paper that appeared in Communications of the ACM [1]. That paper discusses methods to form minimal perfect hash functions, which are the basis of the methods described here. Without the first paper, this work is impossible to understand. In particular, it is unclear what to do when a trio of hash functions h 0 , h 1 , and h 2 produces duplicate triples for two different keys. The paper contains detailed algorithms (although they are dependent on the algorithms in the earlier paper) and proofs of order preservation and minimality. The two papers together are likely to be extremely valuable to the field of information retrieval. It is regrettable that lack of the horse makes evaluation of the cart problematic.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Information Systems
ACM Transactions on Information Systems  Volume 9, Issue 3
Special issue on research and development in information retrieval
July 1991
122 pages
ISSN:1046-8188
EISSN:1558-2868
DOI:10.1145/125187
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 1991
Published in TOIS Volume 9, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Dictionary structure
  2. indexing
  3. inverted file structures
  4. minimal perfect hashing
  5. perfect hashing
  6. random graph

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)405
  • Downloads (Last 6 weeks)41
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)METAL: Caching Multi-level Indexes in Domain-Specific ArchitecturesProceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 210.1145/3620665.3640402(715-729)Online publication date: 27-Apr-2024
  • (2023) Locality-preserving minimal perfect hashing of k -mers Bioinformatics10.1093/bioinformatics/btad21939:Supplement_1(i534-i543)Online publication date: 30-Jun-2023
  • (2022)Randomized First-Order Monitoring with HashingRuntime Verification10.1007/978-3-031-17196-3_1(3-24)Online publication date: 28-Sep-2022
  • (2020)Reverse Spatial Visual Top-$k$ QueryIEEE Access10.1109/ACCESS.2020.29689828(21770-21787)Online publication date: 2020
  • (2016)Forbidden-Set Distance Labels for Graphs of Bounded Doubling DimensionACM Transactions on Algorithms10.1145/281869412:2(1-17)Online publication date: 12-Feb-2016
  • (2015)Label Cover Instances with Large Girth and the Hardness of Approximating Basic k-SpannerACM Transactions on Algorithms10.1145/281837512:2(1-16)Online publication date: 31-Dec-2015
  • (2015)Linear Kernels and Single-Exponential Algorithms Via Protrusion DecompositionsACM Transactions on Algorithms10.1145/279714012:2(1-41)Online publication date: 8-Dec-2015
  • (2015)Verifying LinearisabilityACM Computing Surveys10.1145/279655048:2(1-43)Online publication date: 24-Sep-2015
  • (2015)Simultaneous PQ-Ordering with Applications to Constrained Embedding ProblemsACM Transactions on Algorithms10.1145/273805412:2(1-46)Online publication date: 8-Dec-2015
  • (2015)Minimal and Monotone Minimal Perfect Hash FunctionsMathematical Foundations of Computer Science 201510.1007/978-3-662-48057-1_1(3-17)Online publication date: 11-Aug-2015
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media