Tight Cell-Probe Lower Bounds for Dynamic Succinct Dictionaries

被引:1
作者
Li, Tianxiao [1 ]
Liang, Jingxun [1 ]
Yu, Huacheng [2 ]
Zhou, Renfei [1 ]
机构
[1] Tsinghua Univ, Inst Interdisciplinary Informat Sci, Beijing, Peoples R China
[2] Princeton Univ, Dept Comp Sci, Princeton, NJ USA
来源
2023 IEEE 64TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, FOCS | 2023年
关键词
lower bounds; dictionary; cell-probe model; succinct data structures;
D O I
10.1109/FOCS57990.2023.00112
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A dictionary data structure maintains a set of at most n keys from the universe [U] under key insertions and deletions, such that given a query x is an element of [U], it returns if x is in the set. Some variants also store values associated to the keys such that given a query x, the value associated to x is returned when x is in the set. This fundamental data structure problem has been studied for six decades since the introduction of hash tables in 1953. A hash table occupies O(n log U) bits of space with constant time per operation in expectation. There has been a vast literature on improving its time and space usage. The state-of-the-art dictionary by Bender, Farach-Colton, Kuszmaul, Kuszmaul and Liu [1] has space consumption close to the information-theoretic optimum, using a total of log (U n) + O(n log((k)) n) bits, while supporting all operations in O(k) time, for any parameter k <= log * n. The term O(log((k)) n) = O(log ... log n k) is referred to as the wasted bits per key. In this paper, we prove a matching cell-probe lower bound: For U = n(1+Theta(1)), any dictionary with O(log((k)) n) wasted bits per key must have expected operational time Omega(k), in the cellprobe model with word-size w = Theta(logU). Furthermore, if a dictionary stores values of Theta(log U) bits, we show that regardless of the query time, it must have Omega(k) expected update time. It is worth noting that this is the first cell-probe lower bound on the trade-off between space and update time for general data structures.
引用
收藏
页码:1842 / 1862
页数:21
相关论文
共 44 条
  • [1] Alman J, 2020, Disc Algorithms, P1803
  • [2] Cell-Probe Lower Bounds from Online Communication Complexity
    Alman, Josh
    Wang, Joshua R.
    Yu, Huacheng
    [J]. STOC'18: PROCEEDINGS OF THE 50TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2018, : 1003 - 1012
  • [3] [Anonymous], 2004, Proceedings of the 36th ACM symposium on theory of computing
  • [4] Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation
    Arbitman, Yuriy
    Naor, Moni
    Segev, Gil
    [J]. 2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 787 - 796
  • [5] Arbitman Y, 2009, LECT NOTES COMPUT SC, V5555, P107, DOI 10.1007/978-3-642-02927-1_11
  • [6] Bender MA, 2023, Arxiv, DOI arXiv:2109.04548
  • [7] On the Optimal Time/Space Tradeoff for Hash Tables
    Bender, Michael A.
    Farach-Colton, Martin
    Kuszmaul, John
    Kuszmaul, William
    Liu, Mingmou
    [J]. PROCEEDINGS OF THE 54TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING (STOC '22), 2022, : 1284 - 1297
  • [8] Bloom Filters, Adaptivity, and the Dictionary Problem
    Bender, Michael A.
    Farach-Colton, Martin
    Goswami, Mayank
    Johnson, Rob
    McCauley, Samuel
    Singh, Shikha
    [J]. 2018 IEEE 59TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2018, : 182 - 193
  • [9] Bercea I., 2020, SCAND WORKSH ALG THE
  • [10] Berger A., 2020, P INT C AUT LANG PRO