Results 1 
6 of
6
Individual displacements for linear probing hashing with different insertion policies
 ACM Transactions on Algorithms
, 2005
"... Abstract. We study the distribution of the individual displacements in hashing with linear probing for three different versions: First Come, Last Come and Robin Hood. Asymptotic distributions and their moments are found when the the size of the hash table tends to infinity with the proportion of occ ..."
Abstract

Cited by 4 (1 self)
 Add to MetaCart
Abstract. We study the distribution of the individual displacements in hashing with linear probing for three different versions: First Come, Last Come and Robin Hood. Asymptotic distributions and their moments are found when the the size of the hash table tends to infinity with the proportion of occupied cells converging to some α, 0 < α < 1. (In the case of Last Come, the results are more complicated and less complete than in the other cases.) We also show, using the diagonal Poisson transform studied by Poblete, Viola and Munro, that exact expressions for finite m and n can be obtained from the limits as m, n → ∞. We end with some results, conjectures and questions about the shape of the limit distributions. These have some relevance for computer applications. 1.
Analytical Depoissonization And Its Applications To Combinatorics And Analysis Of Algorithms
 In Formal Power Series and Algebraic Combinatorics
"... . In combinatorics and analysis of algorithms often a Poisson version of a problem (called Poisson model or poissonization) is easier to solve than the original one, which is known as the Bernoulli model. Poissonization is a technique that replaces the original input by a Poisson process. More prec ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
. In combinatorics and analysis of algorithms often a Poisson version of a problem (called Poisson model or poissonization) is easier to solve than the original one, which is known as the Bernoulli model. Poissonization is a technique that replaces the original input by a Poisson process. More precisely, an analytical Poisson transform maps a sequence (e.g., characterizing the Bernoulli model) into a generating function of a complex variable. However, after poissonization one must depoissonize in order to translate the results of the Poisson model into the original (i.e., Bernoulli) model. We present here some analytical depoissonization results that fall into the following general scheme: if the Poisson transform has an appropriate growth in the complex plane, then an asymptotic expansion of the sequence can be expressed in terms of the Poisson transform and its derivatives evaluated on the real line. We illustrate our results on a few examples from combinatorics and the analysis of...
Epidemics with two levels of mixing: The exact moments
, 1999
"... The probabilities n 1 k 1 p(pk) k 2 (1 pk) n k occur in an epidemics model. It is demonstrated how one can compute the moments. This research was partially supported by the Stiftung Aktion OsterreichUngarn, Projektnummer 34 OU24 Helmut Prodinger, Epidemics with two levels of mixing , ..."
Abstract
 Add to MetaCart
The probabilities n 1 k 1 p(pk) k 2 (1 pk) n k occur in an epidemics model. It is demonstrated how one can compute the moments. This research was partially supported by the Stiftung Aktion OsterreichUngarn, Projektnummer 34 OU24 Helmut Prodinger, Epidemics with two levels of mixing , EJS, 2(1) 14 (1999) 2 In [1], the probabilities n 1 k 1 p(pk) k 2 (1 pk) n k ; (1 k n) where considered in the study of an epidemics model (the `inverse model,' p. 83). It was stated that the direct computation of the expected value is dicult. In the present note we will show how it can be done. We also sketch how all moments can be obtained. It is somehow more appealing to change k to k +1 and n to n+ 1, i. e. to consider the probabilities n k p(p + pk) k 1 (1 p pk) n k ; (0 k n): We will compute the sum n X k=0 n k (p + pk) k (1 p pk) n k ; in this way, we can compute the expectation by a simple linear combination. Let us consider S := n ...
Analysis of Algorithms (AofA): Part I: 1993  1998 ("Dagstuhl Period")
"... This is the rst installment of the Algorithmics Column dedicated to Analysis of Algorithms (AofA) that sometimes goes under the name AverageCase Analysis of Algorithms or Mathematical Analysis of Algorithms. The area of analysis of algorithms (at least, the way we understand it here) was born on ..."
Abstract
 Add to MetaCart
This is the rst installment of the Algorithmics Column dedicated to Analysis of Algorithms (AofA) that sometimes goes under the name AverageCase Analysis of Algorithms or Mathematical Analysis of Algorithms. The area of analysis of algorithms (at least, the way we understand it here) was born on July 27, 1963, when D. E. Knuth wrote his \Notes on Open Addressing". Since 1963 the eld has been undergoing substantial changes. We report here how it evolved since then. For a long time this area of research did not have a real \home". But in 1993 the rst seminar entirely devoted to analysis of algorithms took place in Dagstuhl, Germany. Since then seven seminars were organized, and in this column we briey summarize the rst three meetings held in Schloss Dagstuhl (thus \Dagstuhl Period") and discuss various scienti c activities that took place, describing some research problems, solutions, and open problems discussed during these meetings. In addition, we describe three special issues dedicated to these meetings.
PROBING HASHING
"... Abstract. In this paper we study the maximum displacement for linear probing hashing. We use the standard probabilistic model together with the insertion policy known as FirstCome(FirstServed). The results are of asymptotic nature and focus on dense hash tables. That is, the number of occupied ce ..."
Abstract
 Add to MetaCart
Abstract. In this paper we study the maximum displacement for linear probing hashing. We use the standard probabilistic model together with the insertion policy known as FirstCome(FirstServed). The results are of asymptotic nature and focus on dense hash tables. That is, the number of occupied cells n, and the size of the hash table m, tend to infinity with ratio n/m → 1. We present distributions and moments for the size of the maximum displacement, as well as for the number of items with displacement larger than some critical value. This is done via process convergence of the (appropriately normalized) length of the largest block of consecutive occupied cells, when the total number of occupied cells n varies. 1.