Lecture 7: Hashing, Hash Functions

author: Charles E. Leiserson, Department of Brain and Cognitive Sciences, Massachusetts Institute of Technology, MIT
recorded by: Massachusetts Institute of Technology, MIT
published: Feb. 10, 2009,   recorded: October 2005,   views: 9463
released under terms of: Creative Commons Attribution Non-Commercial Share Alike (CC-BY-NC-SA)

Slides

Related content

Report a problem or upload files

If you have found a problem with this lecture or would like to send us extra material, articles, exercises, etc., please use our ticket system to describe your request and upload the data.
Enter your e-mail into the 'Cc' field, and we will keep you updated with your request's status.
Lecture popularity: You need to login to cast your vote.
  Bibliography

Description

"Today starts a two-lecture sequence on the topic of hashing, which is a really great technique that shows up in a lot of places. So we're going to introduce it through a problem that comes up often in compilers called the symbol table problem. And the idea is that we have a table S holding n records where each record, just to be a little more explicit here. So each record typically has a bunch of, this is record x. x is usually a pointer to the actual data. So when we talk about the record x, what it usually means some pointer to the data. And in the data, in the record, so this is a record, there is a key called a key of x..."

See Also:

Download slides icon Download slides: mit6046jf05_leiserson_lec07_01.pdf (223.1 KB)

Download Video - generic video source Download mit6046jf05_leiserson_lec07_01.m4v (Video - generic video source 163.9 MB)

Download Video - generic video source Download mit6046jf05_leiserson_lec07_01.rm (Video - generic video source 124.2 MB)

Download Video Download mit6046jf05_leiserson_lec07_01.flv (Video 218.0 MB)

Download Video Download mit6046jf05_leiserson_lec07_01.wmv (Video 674.0 MB)

Download audio transcript Download mit6046jf05_leiserson_lec07_01.mp3 (Audio lecture 18.0 MB)


Help icon Streaming Video Help

Link this page

Would you like to put a link to this lecture on your homepage?
Go ahead! Copy the HTML snippet !

Reviews and comments:

Comment1 Sushil Kumar, July 7, 2009 at 6:14 a.m.:

Thanks for usefull information.

http://www.customsolutionsindia.com/m...


Comment2 Gunjan, July 7, 2009 at 6:15 a.m.:

thanking you for providing me best information.

http://www.customsolutionsindia.com/e...


Comment3 Val Kotlarov, March 31, 2011 at 12:37 a.m.:

Here's the lecturer gives some basic understanding on how the hashing functions work, and analyzes their limitations. Generally he shows how hashing functions map hash keys onto some addressing space where's the values are stored. There's an analysis of the implications. More optimal algorithms is given in the end. The lecture gives you some taste of how the hashmap's size is related to the stored data structure size and what happens if the hashmap gets filled, and in some degree how it affects the algorithm's performance.

Write your own review or comment:

make sure you have javascript enabled or clear this field: