Hybrid hash tables
First Claim
1. A computer-implemented method for identifying a set of values associated with a selected key, the method comprising:
- providing, in a computer system having a processor, an in-memory hash table and a second hash table in a persistent storage;
computing, by the computer system, a first index for the selected key;
selecting first candidate elements from the in-memory hash table using the first index, the first candidate elements having associated first candidate keys;
computing, by the computer system, a second index for the selected key;
selecting second candidate elements from the second hash table using the second index, the second candidate elements having associated second candidate keys;
examining, by the computer system, the first candidate elements to determine whether a first candidate key matches the selected key, and, when the first candidate key matches the selected key, identifying, as a member of the set of values, a first value associated with a first candidate element that is associated with the first candidate key; and
examining, by the computer system, the second candidate elements to determine whether a second candidate key matches the selected key, and, when the second candidate key matches the selected key, identifying, as a member of the set of values, a second value associated with a second candidate element that is associated with the second candidate key.
2 Assignments
0 Petitions
Accused Products
Abstract
A hash table system having a first hash table and a second hash table is provided. The first hash table may be in-memory and the second hash table may be on-disk. Inserting an entry to the hash table system comprises inserting the entry into the first hash table, and, when the first hash table reaches a threshold load factor, flushing entries into the second hash table. Flushing the first hash table into the second hash table may comprise sequentially flushing the first hash table segments into corresponding second hash table segments. When looking up a key/value pair corresponding to a selected key in the hash table system, the system checks both the first and second hash tables for values corresponding to the selected key. The first and second hash tables may be divided into hash table segments and collision policies may be implemented within the hash table segments.
91 Citations
20 Claims
-
1. A computer-implemented method for identifying a set of values associated with a selected key, the method comprising:
-
providing, in a computer system having a processor, an in-memory hash table and a second hash table in a persistent storage; computing, by the computer system, a first index for the selected key; selecting first candidate elements from the in-memory hash table using the first index, the first candidate elements having associated first candidate keys; computing, by the computer system, a second index for the selected key; selecting second candidate elements from the second hash table using the second index, the second candidate elements having associated second candidate keys; examining, by the computer system, the first candidate elements to determine whether a first candidate key matches the selected key, and, when the first candidate key matches the selected key, identifying, as a member of the set of values, a first value associated with a first candidate element that is associated with the first candidate key; and examining, by the computer system, the second candidate elements to determine whether a second candidate key matches the selected key, and, when the second candidate key matches the selected key, identifying, as a member of the set of values, a second value associated with a second candidate element that is associated with the second candidate key. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A data storage system comprising:
-
a hash table system comprising an in-memory hash table and a second hash table in a persistent storage; and an identification module for identifying a set of values associated with a selected key, wherein identifying comprises; computing a first index for the selected key; selecting first candidate elements from the in-memory hash table using the first index, the first candidate elements having associated first candidate keys; computing a second index for the selected key; selecting second candidate elements from the second hash table using the second index, the second candidate elements having associated second candidate keys; examining the first candidate elements to determine whether a first candidate key matches the selected key, and when the first candidate key matches the selected key, identifying, as a first member of the set of values, a first value associated with a first candidate element that is associated with the first candidate key; and examining the second candidate elements to determine whether a second candidate key matches the selected key, and when the second candidate key matches the selected key, identifying, as a second member of the set of values, a second value associated with a second candidate element that is associated with the second candidate key. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer program product comprising a non-transitory computer usable medium having computer-executable instructions that control a computer to perform identifying of a set of values associated with a selected key, the instructions upon execution causing the computer to:
-
provide an in-memory hash table and a second hash table in a persistent storage; compute a first index for the selected key; select first candidate elements from the in-memory hash table using the first index, the first candidate elements having associated first candidate keys; compute a second index for the selected key; select second candidate elements from the second hash table using the second index, the second candidate elements having associated second candidate keys; examine the first candidate elements to determine whether a first candidate key matches the selected key, and, when the first candidate key matches the selected key, identifying, as a member of the set of values, a first value associated with a first candidate element that is associated with the first candidate key; and examine the second candidate elements to determine whether a second candidate key matches the selected key, and, when the second candidate key matches the selected key, identifying, as a member of the set of values, a second value associated with a second candidate element that is associated with the second candidate key. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer-implemented method for identifying a value associated with a selected key, the method comprising:
-
providing, in a computer system having a processor, an in-memory hash table and a second hash table in a persistent storage; computing, by the computer system, an index for the selected key; checking, by the computer system, the in-memory hash table for an entry corresponding to the selected key, wherein the checking comprises; selecting candidate elements from the in-memory hash table using the index, the candidate elements having associated candidate keys; for each of the candidate keys, determining whether the candidate key matches the selected key; in response to determining that the candidate key matches the selected key, identifying a value associated with the candidate key as a member of a set of values associated with the selected key; and in response to the candidate key not matching the selected key, rejecting a candidate element associated with the candidate key; and in response to determining that the entry corresponding to the selected key is not found in the in-memory hash table, checking, by the computer system, the second hash table for the entry corresponding to the selected key. - View Dependent Claims (17, 18)
-
-
19. A data storage system comprising:
-
a hash table system comprising an in-memory hash table and a second hash table in a persistent storage; and an identification module for identifying a value associated with a selected key, wherein the identifying comprises; checking the in-memory hash table for an entry corresponding to the selected key, wherein the checking comprises; selecting candidate elements from the in-memory hash table using the index, the candidate elements having associated candidate keys; for each of the candidate keys, determining whether the candidate key matches the selected key; in response to determining that the candidate key matches the selected key, identifying a value associated with the candidate key as a member of a set of values associated with the selected key; and in response to the candidate key not matching the selected key, rejecting a candidate element associated with the candidate key; and in response to determining that the entry corresponding to the selected key is not found in the in-memory hash table, checking the second hash table for the entry corresponding to the selected key. - View Dependent Claims (20)
-
Specification