Asymmetric Hashing in Data Structure

In this section we will see what is Asymmetric Hashing technique. In this technique, the hash table is split into d number of blocks. Each split is of length n/d. The probe value xi, 0 ≤ i ≤ d, is drawn uniformly from $$\lbrace\frac{i*n}{d},...,\frac{(i+1)*n}{d-1}\rbrace$$. As with multiple choice hashing, to insert x, the algorithm checks the length of the list A[x0], A[x1], . . ., A[xd – 1]. Then appends x to the shortest of these lists. If there is a tie, then it inserts x to the list with smallest index.

According to Vocking, the expected length of longest list for asymmetric hashing is −


The function 𝜙𝑑 is a generalization of golden ratio, so $$\phi_{2}=\frac{(1+\sqrt{5})}{2}$$

Updated on: 11-Aug-2020


Kickstart Your Career

Get certified by completing the course

Get Started