The hashtables package
This package provides a couple of different implementations of mutable hash tables in the ST monad, as well as a typeclass abstracting their common operations, and a set of wrappers to use the hash tables in the IO monad.
QUICK START: documentation for the hash table operations is provided in the Data.HashTable.Class module, and the IO wrappers (which most users will probably prefer) are located in the Data.HashTable.IO module.
This package currently contains three hash table implementations:
Data.HashTable.ST.Basic contains a basic open-addressing hash table using linear probing as the collision strategy. On a pure speed basis it should currently be the fastest available Haskell hash table implementation for lookups, although it has a higher memory overhead than the other tables and can suffer from long delays when the table is resized because all of the elements in the table need to be rehashed.
Data.HashTable.ST.Cuckoo contains an implementation of "cuckoo hashing" as introduced by Pagh and Rodler in 2001 (see http://en.wikipedia.org/wiki/Cuckoo_hashing). Cuckoo hashing has worst-case O(1) lookups and can reach a high "load factor", in which the table can perform acceptably well even when more than 90% full. Randomized testing shows this implementation of cuckoo hashing to be slightly faster on insert and slightly slower on lookup than Data.Hashtable.ST.Basic, while being more space efficient by about a half-word per key-value mapping. Cuckoo hashing, like the basic hash table implementation using linear probing, can suffer from long delays when the table is resized.
Data.HashTable.ST.Linear contains a linear hash table (see http://en.wikipedia.org/wiki/Linear_hashing), which trades some insert and lookup performance for higher space efficiency and much shorter delays when expanding the table. In most cases, benchmarks show this table to be currently slightly faster than
Data.HashTablefrom the Haskell base library.
It is recommended to create a concrete type alias in your code when using this package, i.e.:
import qualified Data.HashTable.IO as H type HashTable k v = H.BasicHashTable k v foo :: IO (HashTable Int Int) foo = do ht <- H.new H.insert ht 1 1 return ht
Firstly, this makes it easy to switch to a different hash table implementation, and secondly, using a concrete type rather than leaving your functions abstract in the HashTable class should allow GHC to optimize away the typeclass dictionaries.
This package accepts a couple of different cabal flags:
unsafe-tricks, default ON. If this flag is enabled, we use some unsafe GHC-specific tricks to save indirections (namely
reallyUnsafePtrEquality#. These techniques rely on assumptions about the behaviour of the GHC runtime system and, although they've been tested and should be safe under normal conditions, are slightly dangerous. Caveat emptor. In particular, these techniques are incompatible with HPC code coverage reports.
sse41, default OFF. If this flag is enabled, we use some SSE 4.1 instructions (see http://en.wikipedia.org/wiki/SSE4, first available on Intel Core 2 processors) to speed up cache-line searches for cuckoo hashing.
bounds-checking, default OFF. If this flag is enabled, array accesses are bounds-checked.
debug, default OFF. If turned on, we'll rudely spew debug output to stdout.
portable, default OFF. If this flag is enabled, we use only pure Haskell code and try not to use unportable GHC extensions. Turning this flag on forces
This package has been tested with GHC 7.0.3, on:
a MacBook Pro running Snow Leopard with an Intel Core i5 processor, running GHC 7.0.3 in 64-bit mode.
an Arch Linux desktop with an AMD Phenom II X4 940 quad-core processor.
a MacBook Pro running Snow Leopard with an Intel Core 2 Duo processor, running GHC 6.12.3 in 32-bit mode.
Please send bug reports to https://github.com/gregorycollins/hashtables/issues.
[Skip to Readme]
|Versions||18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124|
|Dependencies||base (>=4 && <4.7), ghc-prim, hashable (>=1.1 && <2), primitive, vector (>=0.7 && <0.10) [details]|
|Copyright||(c) 2011, Google, Inc.|
|Uploaded||Tue Dec 13 18:29:13 UTC 2011 by GregoryCollins|
|Updated||Sun Dec 11 09:32:44 UTC 2016 by HerbertValerioRiedel to revision 1|
|Distributions||Arch:126.96.36.199, Debian:188.8.131.52, Fedora:184.108.40.206, FreeBSD:220.127.116.11, LTSHaskell:18.104.22.168, NixOS:22.214.171.124, Stackage:126.96.36.199, Tumbleweed:188.8.131.52|
|Downloads||42093 total (2288 in the last 30 days)|
|Status||Docs uploaded by user
Build status unknown [no reports yet]
Hackage Matrix CI
turn on unsafe GHC tricks
if on, use bounds-checking array accesses
if on, spew debugging output to stdout
if on, use SSE 4.1 extensions to search cache lines very efficiently. The portable flag forces this off.
if on, use only pure Haskell code and no GHC extensions.
Use -f <flag> to enable a flag, or -f -<flag> to disable that flag. More info
For package maintainers and hackage trustees