skip to main content
article
Free access

Space/time trade-offs in hash coding with allowable errors

Published: 01 July 1970 Publication History

Abstract

In this paper trade-offs among certain computational factors in hash coding are analyzed. The paradigm problem considered is that of testing a series of messages one-by-one for membership in a given set of messages. Two new hash-coding methods are examined and compared with a particular conventional hash-coding method. The computational factors considered are the size of the hash area (space), the time required to identify a message as a nonmember of the given set (reject time), and an allowable error frequency.
The new methods are intended to reduce the amount of space required to contain the hash-coded information from that associated with conventional methods. The reduction in space is accomplished by exploiting the possibility that a small fraction of errors of commission may be tolerable in some applications, in particular, applications in which a large amount of data is involved and a core resident hash area is consequently not feasible using conventional methods.
In such applications, it is envisaged that overall performance could be improved by using a smaller core resident hash area in conjunction with the new methods and, when necessary, by using some secondary and perhaps time-consuming test to “catch” the small fraction of errors associated with the new methods. An example is discussed which illustrates possible areas of application for the new methods.
Analysis of the paradigm problem demonstrates that allowing a small number of test messages to be falsely identified as members of the given set will permit a much smaller hash area to be used without increasing reject time.

References

[1]
BATSON, A. The organization of symbol tables. Comm. ACM 8, 2 (Feb. 1965), 111-112.
[2]
MAURER, W. D. An improved hash code for scatter storage. Comm. ACM 11, 1 (Jan. 1968), 35-38.
[3]
MORRIS, R. Scatter storage techniques. Comm. ACM 11, 1 (Jan. 1968), 38-44.

Cited By

View all
  • (2025)SWQC: Efficient sequencing data quality control on the next-generation sunway platformFuture Generation Computer Systems10.1016/j.future.2024.107577164(107577)Online publication date: Mar-2025
  • (2025)Skip index: Supporting efficient inter-block queries and query authentication on the blockchainFuture Generation Computer Systems10.1016/j.future.2024.107556164(107556)Online publication date: Mar-2025
  • (2024)Adoption of Bloom Filter and Firebase Framework to Enhance Authentication Time for Healthcare Systems Based on Blockchain TechnologyBasrah Researches Sciences10.56714/bjrs.50.1.2350:1(16)Online publication date: 30-Jun-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 13, Issue 7
July 1970
70 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/362686
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 1970
Published in CACM Volume 13, Issue 7

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. hash addressing
  2. hash coding
  3. retrieval efficiency
  4. retrieval trade-offs
  5. scatter storage
  6. searching
  7. storage efficiency
  8. storage layout

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3,707
  • Downloads (Last 6 weeks)435
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2025)SWQC: Efficient sequencing data quality control on the next-generation sunway platformFuture Generation Computer Systems10.1016/j.future.2024.107577164(107577)Online publication date: Mar-2025
  • (2025)Skip index: Supporting efficient inter-block queries and query authentication on the blockchainFuture Generation Computer Systems10.1016/j.future.2024.107556164(107556)Online publication date: Mar-2025
  • (2024)Adoption of Bloom Filter and Firebase Framework to Enhance Authentication Time for Healthcare Systems Based on Blockchain TechnologyBasrah Researches Sciences10.56714/bjrs.50.1.2350:1(16)Online publication date: 30-Jun-2024
  • (2024)ELECTProceedings of the 22nd USENIX Conference on File and Storage Technologies10.5555/3650697.3650715(293-310)Online publication date: 27-Feb-2024
  • (2024)In-memory key-value store live migration with NetMigrateProceedings of the 22nd USENIX Conference on File and Storage Technologies10.5555/3650697.3650710(209-224)Online publication date: 27-Feb-2024
  • (2024)A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional DataInternational Journal of Web Services Research10.4018/IJWSR.34039121:1(1-17)Online publication date: 9-Apr-2024
  • (2024)Enhanced Multi-Party Privacy-Preserving Record Linkage Using Trusted Execution EnvironmentsMathematics10.3390/math1215233712:15(2337)Online publication date: 26-Jul-2024
  • (2024)Efficient and Verifiable Range Query Scheme for Encrypted Geographical Information in Untrusted Cloud EnvironmentsISPRS International Journal of Geo-Information10.3390/ijgi1308028113:8(281)Online publication date: 11-Aug-2024
  • (2024)Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash ChainsElectronics10.3390/electronics1317346713:17(3467)Online publication date: 31-Aug-2024
  • (2024)CrptAC: Find the Attack Chain with Multiple Encrypted System LogsElectronics10.3390/electronics1307137813:7(1378)Online publication date: 5-Apr-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media