Knowledge (XXG)

Key clustering

Source 📝

63: 331: 22: 165: 246:, the mapping of two or more keys to consecutive slots. Such clustering may cause the lookup cost to skyrocket, even if the load factor is low and 368: 283: 223: 205: 146: 49: 300: 80: 35: 127: 84: 99: 392: 106: 183: 73: 361: 113: 387: 250:
are infrequent. The popular multiplicative hash is claimed to have particularly poor clustering behaviour.
95: 175: 354: 187: 41: 279: 338: 120: 304: 247: 381: 237: 267: 62: 242: 330: 158: 56: 15: 342: 87:. Unsourced material may be challenged and removed. 278:(2nd ed.). Addison-Wesley. pp. 513–558. 362: 8: 186:. There might be a discussion about this on 50:Learn how and when to remove these messages 369: 355: 224:Learn how and when to remove this message 206:Learn how and when to remove this message 147:Learn how and when to remove this message 337:This cryptography-related article is a 259: 7: 327: 325: 85:adding citations to reliable sources 341:. You can help Knowledge (XXG) by 14: 31:This article has multiple issues. 329: 163: 61: 20: 272:The Art of Computer Programming 72:needs additional citations for 39:or discuss these issues on the 1: 299:Wang, Thomas (March 1997). 409: 324: 301:"Prime Double Hash Table" 276:Sorting and Searching 176:confusing or unclear 81:improve this article 184:clarify the article 393:Cryptography stubs 350: 349: 285:978-0-201-89685-5 234: 233: 226: 216: 215: 208: 157: 156: 149: 131: 54: 400: 371: 364: 357: 333: 326: 316: 315: 313: 312: 303:. Archived from 296: 290: 289: 264: 229: 222: 211: 204: 200: 197: 191: 167: 166: 159: 152: 145: 141: 138: 132: 130: 96:"Key clustering" 89: 65: 57: 46: 24: 23: 16: 408: 407: 403: 402: 401: 399: 398: 397: 378: 377: 376: 375: 322: 320: 319: 310: 308: 298: 297: 293: 286: 274:. Vol. 3: 266: 265: 261: 256: 230: 219: 218: 217: 212: 201: 195: 192: 181: 168: 164: 153: 142: 136: 133: 90: 88: 78: 66: 25: 21: 12: 11: 5: 406: 404: 396: 395: 390: 388:Key management 380: 379: 374: 373: 366: 359: 351: 348: 347: 334: 318: 317: 291: 284: 258: 257: 255: 252: 232: 231: 214: 213: 171: 169: 162: 155: 154: 69: 67: 60: 55: 29: 28: 26: 19: 13: 10: 9: 6: 4: 3: 2: 405: 394: 391: 389: 386: 385: 383: 372: 367: 365: 360: 358: 353: 352: 346: 344: 340: 335: 332: 328: 323: 307:on 1999-09-03 306: 302: 295: 292: 287: 281: 277: 273: 269: 268:Knuth, Donald 263: 260: 253: 251: 249: 245: 244: 240:should avoid 239: 238:hash function 228: 225: 210: 207: 199: 189: 188:the talk page 185: 179: 177: 172:This article 170: 161: 160: 151: 148: 140: 137:November 2019 129: 126: 122: 119: 115: 112: 108: 105: 101: 98: –  97: 93: 92:Find sources: 86: 82: 76: 75: 70:This article 68: 64: 59: 58: 53: 51: 44: 43: 38: 37: 32: 27: 18: 17: 343:expanding it 336: 321: 309:. Retrieved 305:the original 294: 275: 271: 262: 241: 235: 220: 202: 193: 182:Please help 173: 143: 134: 124: 117: 110: 103: 91: 79:Please help 74:verification 71: 47: 40: 34: 33:Please help 30: 382:Categories 311:2015-05-10 254:References 248:collisions 243:clustering 178:to readers 107:newspapers 36:improve it 196:June 2020 42:talk page 270:(1998). 236:Key or 174:may be 121:scholar 282:  123:  116:  109:  102:  94:  128:JSTOR 114:books 339:stub 280:ISBN 100:news 83:by 384:: 45:. 370:e 363:t 356:v 345:. 314:. 288:. 227:) 221:( 209:) 203:( 198:) 194:( 190:. 180:. 150:) 144:( 139:) 135:( 125:· 118:· 111:· 104:· 77:. 52:) 48:(

Index

improve it
talk page
Learn how and when to remove these messages

verification
improve this article
adding citations to reliable sources
"Key clustering"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
confusing or unclear
clarify the article
the talk page
Learn how and when to remove this message
Learn how and when to remove this message
hash function
clustering
collisions
Knuth, Donald
ISBN
978-0-201-89685-5
"Prime Double Hash Table"
the original
Stub icon
stub
expanding it

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.