blob: 3db2e70b71b08cf9760161afa2ab75832210981c [file] [log] [blame]
------------------------------------------------------------------------------
-- --
-- GNAT COMPILER COMPONENTS --
-- --
-- G N A T . P E R F E C T _ H A S H . G E N E R A T O R S --
-- --
-- S p e c --
-- --
-- Copyright (C) 2002 Ada Core Technologies, Inc. --
-- --
-- GNAT is free software; you can redistribute it and/or modify it under --
-- terms of the GNU General Public License as published by the Free Soft- --
-- ware Foundation; either version 2, or (at your option) any later ver- --
-- sion. GNAT is distributed in the hope that it will be useful, but WITH- --
-- OUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY --
-- or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License --
-- for more details. You should have received a copy of the GNU General --
-- Public License distributed with GNAT; see file COPYING. If not, write --
-- to the Free Software Foundation, 59 Temple Place - Suite 330, Boston, --
-- MA 02111-1307, USA. --
-- --
-- As a special exception, if other files instantiate generics from this --
-- unit, or you link this unit with other files to produce an executable, --
-- this unit does not by itself cause the resulting executable to be --
-- covered by the GNU General Public License. This exception does not --
-- however invalidate any other reasons why the executable file might be --
-- covered by the GNU Public License. --
-- --
-- GNAT was originally developed by the GNAT team at New York University. --
-- Extensive contributions were provided by Ada Core Technologies Inc. --
-- --
------------------------------------------------------------------------------
-- This package provides a single generator of static minimal perfect
-- hash functions. No collisions occur and each item can be retrieved
-- from the table in one probe (perfect property). The hash table
-- size corresponds to the exact size of W and *no larger* (minimal
-- property). The key set has to be know in advance (static
-- property). The hash functions are also order preservering. If w2
-- is inserted after w1 in the generator, then f (w1) < f (w2). These
-- hashing functions are convenient for use with realtime applications.
package GNAT.Perfect_Hash.Generators is
Default_K_To_V : constant Float := 2.05;
-- Default ratio for the algorithm. When K is the number of keys,
-- V = (K_To_V) * K is the size of the main table of the hash function.
Default_Pkg_Name : constant String := "Perfect_Hash";
-- Default package name in which the hash function is defined.
Default_Position : constant String := "";
-- The generator allows selection of the character positions used
-- in the hash function. By default, all positions are selected.
type Optimization is (Memory_Space, CPU_Time);
Default_Optimization : constant Optimization := CPU_Time;
-- Optimize either the memory space or the execution time.
Verbose : Boolean := False;
procedure Initialize
(Seed : Natural;
K_To_V : Float := Default_K_To_V;
Optim : Optimization := CPU_Time);
-- Initialize the generator and its internal structures. Set the
-- ratio of vertices over keys in the random graphs. This value
-- has to be greater than 2.0 in order for the algorithm to succeed.
procedure Finalize;
-- Deallocate the internal structures.
procedure Insert (Value : String);
-- Insert a new key in the table.
procedure Compute (Position : String := Default_Position);
-- Compute the hash function. Position allows to define a
-- selection of character positions used in the keywords hash
-- function. Positions can be separated by commas and range like
-- x-y may be used. Character '$' represents the final character
-- of a key. With an empty position, the generator automatically
-- produces positions to reduce the memory usage.
procedure Produce (Pkg_Name : String := Default_Pkg_Name);
-- Generate the hash function package Pkg_Name. This package
-- includes the minimal perfect Hash function.
-- The routines and structures defined below allow producing the
-- hash function using a different way from the procedure above.
-- The procedure Define returns the lengths of an internal table
-- and its item type size. The function Value returns the value of
-- each item in the table.
-- The hash function has the following form:
-- h (w) = (g (f1 (w)) + g (f2 (w))) mod m
-- G is a function based on a graph table [0,n-1] -> [0,m-1]. m is
-- the number of keys. n is an internally computed value and it
-- can be obtained as the length of vector G.
-- F1 and F2 are two functions based on two function tables T1 and
-- T2. Their definition depends on the chosen optimization mode.
-- Only some character positions are used in the keys because they
-- are significant. They are listed in a character position table
-- (P in the pseudo-code below). For instance, in {"jan", "feb",
-- "mar", "apr", "jun", "jul", "aug", "sep", "oct", "nov", "dec"},
-- only positions 2 and 3 are significant (the first character can
-- be ignored). In this example, P = {2, 3}
-- When Optimization is CPU_Time, the first dimension of T1 and T2
-- corresponds to the character position in the key and the second
-- to the character set. As all the character set is not used, we
-- define a used character table which associates a distinct index
-- to each used character (unused characters are mapped to
-- zero). In this case, the second dimension of T1 and T2 is
-- reduced to the used character set (C in the pseudo-code
-- below). Therefore, the hash function has the following:
-- function Hash (S : String) return Natural is
-- F : constant Natural := S'First - 1;
-- L : constant Natural := S'Length;
-- F1, F2 : Natural := 0;
-- J : <t>;
-- begin
-- for K in P'Range loop
-- exit when L < P (K);
-- J := C (S (P (K) + F));
-- F1 := (F1 + Natural (T1 (K, J))) mod <n>;
-- F2 := (F2 + Natural (T2 (K, J))) mod <n>;
-- end loop;
-- return (Natural (G (F1)) + Natural (G (F2))) mod <m>;
-- end Hash;
-- When Optimization is Memory_Space, the first dimension of T1
-- and T2 corresponds to the character position in the key and the
-- second dimension is ignored. T1 and T2 are no longer matrices
-- but vectors. Therefore, the used character table is not
-- available. The hash function has the following form:
-- function Hash (S : String) return Natural is
-- F : constant Natural := S'First - 1;
-- L : constant Natural := S'Length;
-- F1, F2 : Natural := 0;
-- J : <t>;
-- begin
-- for K in P'Range loop
-- exit when L < P (K);
-- J := Character'Pos (S (P (K) + F));
-- F1 := (F1 + Natural (T1 (K) * J)) mod <n>;
-- F2 := (F2 + Natural (T2 (K) * J)) mod <n>;
-- end loop;
-- return (Natural (G (F1)) + Natural (G (F2))) mod <m>;
-- end Hash;
type Table_Name is
(Character_Position,
Used_Character_Set,
Function_Table_1,
Function_Table_2,
Graph_Table);
procedure Define
(Name : Table_Name;
Item_Size : out Natural;
Length_1 : out Natural;
Length_2 : out Natural);
-- Return the definition of the table Name. This includes the
-- length of dimensions 1 and 2 and the size of an unsigned
-- integer item. When Length_2 is zero, the table has only one
-- dimension. All the ranges start from zero.
function Value
(Name : Table_Name;
J : Natural;
K : Natural := 0)
return Natural;
-- Return the value of the component (I, J) of the table
-- Name. When the table has only one dimension, J is ignored.
end GNAT.Perfect_Hash.Generators;