DHash: Enabling Dynamic and Efficient Hash Tables

06/01/2020
by   Junchang Wang, et al.
0

Given a specified average load factor, hash tables offer the appeal of constant time lookup operations. However, hash tables could face severe hash collisions because of malicious attacks, buggy applications, or even bursts of incoming data, compromising this practical advantage. In this paper, we present DHash, a hash table that overcomes this challenge by allowing programmers to dynamically change its hash function on the fly, without affecting other concurrent operations such as lookup, insert, and delete. DHash is modular and allows programmers to select a variety of lock-free/wait-free set algorithms as the implementation of hash table buckets. With this flexibility, they can make trade-offs between the algorithm's progress guarantee, performance, and engineering efforts, and create DHash implementations that meet their requirements best. Evaluations on three types of architectures show that DHash noticeably outperforms other practical alternatives under heavy workloads. With a load factor of 20, DHash outperforms the other three most widely used hash tables by factors of 1.4-2.0, and when the load factor increases to 200, DHash is 2.3-6.2 times faster.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/16/2021

Better GPU Hash Tables

We revisit the problem of building static hash tables on the GPU and des...
research
07/05/2019

HashGraph – Scalable Hash Tables Using A Sparse Graph Data Structure

Hash tables are ubiquitous and used in a wide range of applications for ...
research
07/02/2021

Linear Probing Revisited: Tombstones Mark the Death of Primary Clustering

First introduced in 1954, linear probing is one of the oldest data struc...
research
08/08/2023

Defending Hash Tables from Subterfuge with Depth Charge

We consider the problem of defending a hash table against a Byzantine at...
research
12/30/2020

When Load Rebalancing Does Not Work for Distributed Hash Table

Distributed hash table (DHT) is the foundation of many widely used stora...
research
02/11/2022

Insertion Time of Random Walk Cuckoo Hashing below the Peeling Threshold

When it comes to hash tables, the only truly respectable insertion time ...
research
03/14/2023

One Size Cannot Fit All: a Self-Adaptive Dispatcher for Skewed Hash Join in Shared-nothing RDBMSs

Shared-nothing architecture has been widely adopted in various commercia...

Please sign up or login with your details

Forgot password? Click here to reset