search
HomeBackend DevelopmentPython TutorialA brief discussion on dictionaries and hash tables in Python and the resolution of hash conflicts

The content of this article is about a brief discussion of dictionaries and hash tables in Python and the resolution of hash conflicts. It has certain reference value. Friends in need can refer to it. I hope it will be helpful to you.

Python uses hash tables to implement dict.

A hash table is actually a sparse array (an array that always has blank elements is called a sparse array). In general books, the units in a hash table are usually called buckets. exist dict In the hash table, each key-value pair occupies a table element, and each table element has two parts, one is a reference to the key, and the other is a reference to the value. Because each table cell is the same size, you can read a table cell by offset.

Python will try to ensure that about one-third of the table elements are empty. When this threshold is almost reached, it will expand and copy the original hash table to a larger hash table. .

If you want to put an object into a hash table, you must first calculate the hash value of the element key. This requires that the key must be hashable.

A hashable object must meet the following conditions:

Support the hash() function, and the hash value obtained through the __hash__() method is unchanged.

Supports equality detection through the __eq__() method.

If a == b is true, then hash(a) == hash(b) is also true.

The following mainly explains the hash table algorithm.

To get the key The value search_value corresponding to search_key, Python will first call hash(search_key) to calculate search_key The hash value of the value, the lowest few digits of this value are used as offsets, and the table element is searched in the hash table (the specific number depends on the size of the current hash table). If the found table element is empty, KeyError is thrown Exception; if it is not empty, there will be a pair of found_key:found_value in the table element, check search_key and found_key Whether they are equal, if so, return found_value. If they are not equal, this situation is called a hash collision.

In order to solve the hash conflict, the algorithm will take a few more bits in the hash value, then process it with a special method, and use the new value obtained as an offset to search in the hash table table element, if the found table element is empty, a KeyError exception will also be thrown; if it is not empty, compare the keys to see if they are consistent, and return the corresponding value if they are consistent; if a hash conflict is found, repeat the above steps.

Adding a new element is almost the same as the above process, except that when an empty table element is found, the new element will be put in. If it is not empty, the hash will be repeated and the search will continue.

When to go When a new element is added to the dict and a hash conflict occurs, the new element may be arranged to be stored in another location. So the following situation will happen: dict([key1, value1], [key2, value2]) and dict([key2, value2], [key1, value1]) Two dictionaries are equal when compared, but if the hashes of key1 and key2 conflict, the order of the two keys in the dictionary is different.

Whenever, go Add new keys to dict, python The parser may decide to expand the dictionary. The result of expansion is to create a larger hash table and add existing elements in the dictionary to the new hash table. New hash conflicts may occur during this process, causing the order of keys in the new hash table to change. What happens if you iterate over a dictionary while adding new keys to it? Unfortunately, the capacity was expanded. Unfortunately, the order of the keys changed, and then orz.

Since the hash table must be sparse, its space consumption must be much larger. This is a typical space-for-time trade-off.

The above is the detailed content of A brief discussion on dictionaries and hash tables in Python and the resolution of hash conflicts. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:博客园. If there is any infringement, please contact admin@php.cn delete
Merging Lists in Python: Choosing the Right MethodMerging Lists in Python: Choosing the Right MethodMay 14, 2025 am 12:11 AM

TomergelistsinPython,youcanusethe operator,extendmethod,listcomprehension,oritertools.chain,eachwithspecificadvantages:1)The operatorissimplebutlessefficientforlargelists;2)extendismemory-efficientbutmodifiestheoriginallist;3)listcomprehensionoffersf

How to concatenate two lists in python 3?How to concatenate two lists in python 3?May 14, 2025 am 12:09 AM

In Python 3, two lists can be connected through a variety of methods: 1) Use operator, which is suitable for small lists, but is inefficient for large lists; 2) Use extend method, which is suitable for large lists, with high memory efficiency, but will modify the original list; 3) Use * operator, which is suitable for merging multiple lists, without modifying the original list; 4) Use itertools.chain, which is suitable for large data sets, with high memory efficiency.

Python concatenate list stringsPython concatenate list stringsMay 14, 2025 am 12:08 AM

Using the join() method is the most efficient way to connect strings from lists in Python. 1) Use the join() method to be efficient and easy to read. 2) The cycle uses operators inefficiently for large lists. 3) The combination of list comprehension and join() is suitable for scenarios that require conversion. 4) The reduce() method is suitable for other types of reductions, but is inefficient for string concatenation. The complete sentence ends.

Python execution, what is that?Python execution, what is that?May 14, 2025 am 12:06 AM

PythonexecutionistheprocessoftransformingPythoncodeintoexecutableinstructions.1)Theinterpreterreadsthecode,convertingitintobytecode,whichthePythonVirtualMachine(PVM)executes.2)TheGlobalInterpreterLock(GIL)managesthreadexecution,potentiallylimitingmul

Python: what are the key featuresPython: what are the key featuresMay 14, 2025 am 12:02 AM

Key features of Python include: 1. The syntax is concise and easy to understand, suitable for beginners; 2. Dynamic type system, improving development speed; 3. Rich standard library, supporting multiple tasks; 4. Strong community and ecosystem, providing extensive support; 5. Interpretation, suitable for scripting and rapid prototyping; 6. Multi-paradigm support, suitable for various programming styles.

Python: compiler or Interpreter?Python: compiler or Interpreter?May 13, 2025 am 12:10 AM

Python is an interpreted language, but it also includes the compilation process. 1) Python code is first compiled into bytecode. 2) Bytecode is interpreted and executed by Python virtual machine. 3) This hybrid mechanism makes Python both flexible and efficient, but not as fast as a fully compiled language.

Python For Loop vs While Loop: When to Use Which?Python For Loop vs While Loop: When to Use Which?May 13, 2025 am 12:07 AM

Useaforloopwheniteratingoverasequenceorforaspecificnumberoftimes;useawhileloopwhencontinuinguntilaconditionismet.Forloopsareidealforknownsequences,whilewhileloopssuitsituationswithundeterminediterations.

Python loops: The most common errorsPython loops: The most common errorsMay 13, 2025 am 12:07 AM

Pythonloopscanleadtoerrorslikeinfiniteloops,modifyinglistsduringiteration,off-by-oneerrors,zero-indexingissues,andnestedloopinefficiencies.Toavoidthese:1)Use'i

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor