Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Utilizing Temporal Locality for Hash Tables with Circular Chaining

Full metadata record
DC Field Value Language
dc.contributor.authorPyo, C.-
dc.contributor.authorKim, T.-
dc.date.accessioned2023-04-24T03:40:35Z-
dc.date.available2023-04-24T03:40:35Z-
dc.date.created2023-04-24-
dc.date.issued2022-01-01-
dc.identifier.issn1976-4677-
dc.identifier.urihttps://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/31105-
dc.description.abstractA hash table with separate chaining typically adopts linearly linked lists as buckets to resolve collisions. This study demonstrates that converting bucket structures from linear to circular chaining enables buckets to utilize temporal locality and improve search performance. Unlike linear chaining, circular chaining can track the most recently accessed entry and preserve the reachability of all bucket entries without complicated data structures and operations. We defined temporal locality interval (TLI) to represent the period during which subsequent bucket access repeats itself on a single entry. We analyzed the average search cost using the TLI length and load factor. The average search cost converges to the minimum when the TLI length dominates the load factor. In our experiments using the SPEC CPU 2006 benchmark suite, circular chaining manifested 1.14 comparisons, reducing the cost of linear chaining by 45.71% when the load factor was 0.99. The improvement is notable, particularly for tables with a high load factor and uneven distribution of bucket sizes © 2022. The Korean Institute of Information Scientists and Engineers-
dc.language영어-
dc.language.isoen-
dc.publisherKorean Institute of Information Scientists and Engineers-
dc.titleUtilizing Temporal Locality for Hash Tables with Circular Chaining-
dc.typeArticle-
dc.contributor.affiliatedAuthorPyo, C.-
dc.identifier.doi10.5626/JCSE.2022.16.4.194-
dc.identifier.scopusid2-s2.0-85151921035-
dc.identifier.bibliographicCitationJournal of Computing Science and Engineering, v.16, no.4, pp.194 - 198-
dc.relation.isPartOfJournal of Computing Science and Engineering-
dc.citation.titleJournal of Computing Science and Engineering-
dc.citation.volume16-
dc.citation.number4-
dc.citation.startPage194-
dc.citation.endPage198-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordAuthorBucket structure-
dc.subject.keywordAuthorCircular chaining-
dc.subject.keywordAuthorHash table-
dc.subject.keywordAuthorLinear chaining-
dc.subject.keywordAuthorLocality-
dc.subject.keywordAuthorTemporal locality interval-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE