Fighting the Duplicates in Hashing: Conflict Detection-aware Vectorization of Linear Probing
dc.contributor.author | Pietrzyk, Johannes | |
dc.contributor.author | Ungethüm, Annett | |
dc.contributor.author | Habich, Dirk | |
dc.contributor.author | Lehner, Wolfgang | |
dc.contributor.editor | Grust, Torsten | |
dc.contributor.editor | Naumann, Felix | |
dc.contributor.editor | Böhm, Alexander | |
dc.contributor.editor | Lehner, Wolfgang | |
dc.contributor.editor | Härder, Theo | |
dc.contributor.editor | Rahm, Erhard | |
dc.contributor.editor | Heuer, Andreas | |
dc.contributor.editor | Klettke, Meike | |
dc.contributor.editor | Meyer, Holger | |
dc.date.accessioned | 2019-04-11T07:21:32Z | |
dc.date.available | 2019-04-11T07:21:32Z | |
dc.date.issued | 2019 | |
dc.description.abstract | Hash tables are a core data structure in database systems, because they are fundamental for many database operators like hash-based join and aggregation. In recent years, the efficient vectorized implementation using SIMD (Single Instruction Multiple Data) instructions has attracted a lot of attention. Generally, all hash table implementations need to address what happens when collisions occur. In order to do that, the collisions have to be detected first. There are two types of collisions: (i) key duplicates and (ii) hash value duplicates. The second type is more complicated than the first type. In this paper, we investigate linear probing as a heavily applied hash table implementation and we present an extension of the state-of-the-art vectorized implementation with a hardware-supported duplicate or collision detection. For that, we use novel SIMD instructions which have been introduced with Intel’s SIMD instruction set extension AVX-512. As we are going to show, our approach outperforms the state-of-the-art vectorized version for the key handling, but introduces novel challenges for the value handling. We conclude the paper with some ideas how to tackle that challenge. | en |
dc.identifier.doi | 10.18420/btw2019-04 | |
dc.identifier.isbn | 978-3-88579-683-1 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/21726 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik, Bonn | |
dc.relation.ispartof | BTW 2019 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) – Proceedings, Volume P-289 | |
dc.subject | Hashing | |
dc.subject | Linear Probing | |
dc.subject | Vectorization | |
dc.subject | Conflict Detection | |
dc.title | Fighting the Duplicates in Hashing: Conflict Detection-aware Vectorization of Linear Probing | en |
gi.citation.endPage | 53 | |
gi.citation.startPage | 35 | |
gi.conference.date | 4.-8. März 2019 | |
gi.conference.location | Rostock | |
gi.conference.sessiontitle | Wissenschaftliche Beiträge |
Dateien
Originalbündel
1 - 1 von 1