{"id":"https://openalex.org/W2054711061","doi":"https://doi.org/10.1137/080728743","title":"More Robust Hashing: Cuckoo Hashing with a Stash","display_name":"More Robust Hashing: Cuckoo Hashing with a Stash","publication_year":2009,"publication_date":"2009-12-02","ids":{"openalex":"https://openalex.org/W2054711061","doi":"https://doi.org/10.1137/080728743","mag":"2054711061"},"language":"en","primary_location":{"id":"doi:10.1137/080728743","is_oa":false,"landing_page_url":"https://doi.org/10.1137/080728743","pdf_url":null,"source":{"id":"https://openalex.org/S153560523","display_name":"SIAM Journal on Computing","issn_l":"0097-5397","issn":["0097-5397","1095-7111"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320508","host_organization_name":"Society for Industrial and Applied Mathematics","host_organization_lineage":["https://openalex.org/P4310320508"],"host_organization_lineage_names":["Society for Industrial and Applied Mathematics"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIAM Journal on Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111963396","display_name":"Adam Kirsch","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Adam Kirsch","raw_affiliation_strings":["kirsch@eecs.harvard.edu and michaelm@eecs.harvard.edu#TAB#"],"affiliations":[{"raw_affiliation_string":"kirsch@eecs.harvard.edu and michaelm@eecs.harvard.edu#TAB#","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062318856","display_name":"Michael Mitzenmacher","orcid":"https://orcid.org/0000-0001-5430-5457"},"institutions":[{"id":"https://openalex.org/I2801851002","display_name":"Harvard University Press","ror":"https://ror.org/006v7bf86","country_code":"US","type":"other","lineage":["https://openalex.org/I136199984","https://openalex.org/I2801851002"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Mitzenmacher","raw_affiliation_strings":["Harvard University"],"affiliations":[{"raw_affiliation_string":"Harvard University","institution_ids":["https://openalex.org/I2801851002"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025142058","display_name":"Udi Wieder","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Udi Wieder","raw_affiliation_strings":["uwieder@microsoft.com#TAB#"],"affiliations":[{"raw_affiliation_string":"uwieder@microsoft.com#TAB#","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5111963396"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":11.7423,"has_fulltext":false,"cited_by_count":167,"citation_normalized_percentile":{"value":0.98588775,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"39","issue":"4","first_page":"1543","last_page":"1561"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/universal-hashing","display_name":"Universal hashing","score":0.7737565636634827},{"id":"https://openalex.org/keywords/dynamic-perfect-hashing","display_name":"Dynamic perfect hashing","score":0.771538496017456},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.679309606552124},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.6766728758811951},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6533291339874268},{"id":"https://openalex.org/keywords/cuckoo","display_name":"Cuckoo","score":0.6393636465072632},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.5520784854888916},{"id":"https://openalex.org/keywords/linear-hashing","display_name":"Linear hashing","score":0.5290250778198242},{"id":"https://openalex.org/keywords/cuckoo-search","display_name":"Cuckoo search","score":0.48480501770973206},{"id":"https://openalex.org/keywords/k-independent-hashing","display_name":"K-independent hashing","score":0.47487375140190125},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.4137609601020813},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37124013900756836},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22250163555145264},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19928592443466187},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.10885927081108093}],"concepts":[{"id":"https://openalex.org/C116058348","wikidata":"https://www.wikidata.org/wiki/Q846912","display_name":"Universal hashing","level":5,"score":0.7737565636634827},{"id":"https://openalex.org/C122907437","wikidata":"https://www.wikidata.org/wiki/Q5318999","display_name":"Dynamic perfect hashing","level":5,"score":0.771538496017456},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.679309606552124},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.6766728758811951},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6533291339874268},{"id":"https://openalex.org/C2776810535","wikidata":"https://www.wikidata.org/wiki/Q26381","display_name":"Cuckoo","level":2,"score":0.6393636465072632},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.5520784854888916},{"id":"https://openalex.org/C36375716","wikidata":"https://www.wikidata.org/wiki/Q6553456","display_name":"Linear hashing","level":5,"score":0.5290250778198242},{"id":"https://openalex.org/C117241572","wikidata":"https://www.wikidata.org/wiki/Q5192379","display_name":"Cuckoo search","level":3,"score":0.48480501770973206},{"id":"https://openalex.org/C187062812","wikidata":"https://www.wikidata.org/wiki/Q6322840","display_name":"K-independent hashing","level":5,"score":0.47487375140190125},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.4137609601020813},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37124013900756836},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22250163555145264},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19928592443466187},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.10885927081108093},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C90856448","wikidata":"https://www.wikidata.org/wiki/Q431","display_name":"Zoology","level":1,"score":0.0},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1137/080728743","is_oa":false,"landing_page_url":"https://doi.org/10.1137/080728743","pdf_url":null,"source":{"id":"https://openalex.org/S153560523","display_name":"SIAM Journal on Computing","issn_l":"0097-5397","issn":["0097-5397","1095-7111"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320508","host_organization_name":"Society for Industrial and Applied Mathematics","host_organization_lineage":["https://openalex.org/P4310320508"],"host_organization_lineage_names":["Society for Industrial and Applied Mathematics"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIAM Journal on Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W52628824","https://openalex.org/W62758726","https://openalex.org/W1564577918","https://openalex.org/W1595409123","https://openalex.org/W1945549020","https://openalex.org/W2048541619","https://openalex.org/W2059271645","https://openalex.org/W2123214545","https://openalex.org/W2136399778","https://openalex.org/W2166542473","https://openalex.org/W2611804663","https://openalex.org/W2912601938","https://openalex.org/W3144881883"],"related_works":["https://openalex.org/W3030563642","https://openalex.org/W2164322063","https://openalex.org/W2023326318","https://openalex.org/W2008682098","https://openalex.org/W2084899141","https://openalex.org/W2044784665","https://openalex.org/W2094127768","https://openalex.org/W102859714","https://openalex.org/W2008159385","https://openalex.org/W2076162755"],"abstract_inverted_index":{"Cuckoo":[0],"hashing":[1,8,22,119],"holds":[2],"great":[3],"potential":[4],"as":[5],"a":[6,29,37,74],"high-performance":[7],"scheme":[9],"for":[10],"real":[11],"applications.":[12],"Up":[13],"to":[14,24,91],"this":[15,58,63],"point,":[16],"the":[17,42,55,71,122],"greatest":[18],"drawback":[19],"of":[20,44,51,73,88,116],"cuckoo":[21,101,118],"appears":[23],"be":[25,67],"that":[26,36,62,86],"there":[27],"is":[28],"polynomially":[30],"small":[31,76],"but":[32],"practically":[33],"significant":[34],"probability":[35,65],"failure":[38,64],"will":[39],"occur":[40],"during":[41],"insertion":[43],"an":[45,48],"item,":[46],"requiring":[47],"expensive":[49],"rehashing":[50],"all":[52],"items":[53,96],"in":[54,105,127],"table.":[56],"In":[57],"paper,":[59],"we":[60],"show":[61],"can":[66],"dramatically":[68],"reduced":[69],"by":[70],"addition":[72],"very":[75],"constant-sized":[77],"stash.":[78],"We":[79],"demonstrate":[80],"both":[81,106],"analytically":[82],"and":[83,108,121],"through":[84],"simulations":[85],"stashes":[87],"size":[89],"equivalent":[90],"only":[92],"three":[93],"or":[94],"four":[95],"yield":[97],"tremendous":[98],"improvements,":[99],"enhancing":[100],"hashing's":[102],"practical":[103],"viability":[104],"hardware":[107],"software.":[109],"Our":[110],"analysis":[111],"naturally":[112],"extends":[113],"previous":[114],"analyses":[115],"multiple":[117],"variants,":[120],"approach":[123],"may":[124],"prove":[125],"useful":[126],"further":[128],"related":[129],"schemes.":[130]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":16},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":11},{"year":2018,"cited_by_count":10},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":10},{"year":2015,"cited_by_count":10},{"year":2014,"cited_by_count":11},{"year":2013,"cited_by_count":7},{"year":2012,"cited_by_count":9}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
