How does Python implement dictionaries?

前端 未结 1 607
盖世英雄少女心
盖世英雄少女心 2021-01-07 00:56

I was wondering how python dictionaries work under the hood, particularly the dynamic aspect? When we create a dictionary, what is its initial size? If we update it with a l

相关标签:
1条回答
  • 2021-01-07 01:15

    (some of) The following answers are taken from Upgrade your Python skills: Examining the Dictionary. More information on Python hash tables can be found in Python Hash Tables Under The Hood:

    When we create a dictionary what is its initial size?

    1. As can be seen in the source code:
    /* PyDict_MINSIZE is the starting size for any new dict.
     * 8 allows dicts with no more than 5 active entries; experiments suggested
     * this suffices for the majority of dicts (consisting mostly of usually-small
     * dicts created to pass keyword arguments).
     * Making this 8, rather than 4 reduces the number of resizes for most
     * dictionaries, without any significant extra memory use.
     */
    #define PyDict_MINSIZE 8
    

    Imagine we update with a lot of key value pairs, i suppose we need to externe the hash table. I suppose we need to recompute the hash function to adapt the size of the new bigger hash table while keeping a kind of logic with the previous hash table....

    CPython checks the hash table size every time we add a key. If the table is two-thirds full, it would resize the hash table by GROWTH_RATE (which is currently set to 3), and insert all elements:

    /* GROWTH_RATE. Growth rate upon hitting maximum load.
     * Currently set to used*3.
     * This means that dicts double in size when growing without deletions,
     * but have more head room when the number of deletions is on a par with the
     * number of insertions.  See also bpo-17563 and bpo-33205.
     *
     * GROWTH_RATE was set to used*4 up to version 3.2.
     * GROWTH_RATE was set to used*2 in version 3.3.0
     * GROWTH_RATE was set to used*2 + capacity/2 in 3.4.0-3.6.0.
     */
    #define GROWTH_RATE(d) ((d)->ma_used*3)
    

    The USABLE_FRACTION is the two thirds I mentioned above:

    /* USABLE_FRACTION is the maximum dictionary load.
     * Increasing this ratio makes dictionaries more dense resulting in more
     * collisions.  Decreasing it improves sparseness at the expense of spreading
     * indices over more cache lines and at the cost of total memory consumed.
     *
     * USABLE_FRACTION must obey the following:
     *     (0 < USABLE_FRACTION(n) < n) for all n >= 2
     *
     * USABLE_FRACTION should be quick to calculate.
     * Fractions around 1/2 to 2/3 seem to work well in practice.
     */
    #define USABLE_FRACTION(n) (((n) << 1)/3)
    

    Furthermore, the index calculation is:

    i = (size_t)hash & mask;
    

    where mask is HASH_TABLE_SIZE-1.

    Here's how hash collisions are dealt:

    perturb >>= PERTURB_SHIFT;
    i = (i*5 + perturb + 1) & mask;
    

    Explained in the source code:

    
    The first half of collision resolution is to visit table indices via this
    recurrence:
        j = ((5*j) + 1) mod 2**i
    For any initial j in range(2**i), repeating that 2**i times generates each
    int in range(2**i) exactly once (see any text on random-number generation for
    proof).  By itself, this doesn't help much:  like linear probing (setting
    j += 1, or j -= 1, on each loop trip), it scans the table entries in a fixed
    order.  This would be bad, except that's not the only thing we do, and it's
    actually *good* in the common cases where hash keys are consecutive.  In an
    example that's really too small to make this entirely clear, for a table of
    size 2**3 the order of indices is:
        0 -> 1 -> 6 -> 7 -> 4 -> 5 -> 2 -> 3 -> 0 [and here it's repeating]
    If two things come in at index 5, the first place we look after is index 2,
    not 6, so if another comes in at index 6 the collision at 5 didn't hurt it.
    Linear probing is deadly in this case because there the fixed probe order
    is the *same* as the order consecutive keys are likely to arrive.  But it's
    extremely unlikely hash codes will follow a 5*j+1 recurrence by accident,
    and certain that consecutive hash codes do not.
    The other half of the strategy is to get the other bits of the hash code
    into play.  This is done by initializing a (unsigned) vrbl "perturb" to the
    full hash code, and changing the recurrence to:
        perturb >>= PERTURB_SHIFT;
        j = (5*j) + 1 + perturb;
        use j % 2**i as the next table index;
    Now the probe sequence depends (eventually) on every bit in the hash code,
    and the pseudo-scrambling property of recurring on 5*j+1 is more valuable,
    because it quickly magnifies small differences in the bits that didn't affect
    the initial index.  Note that because perturb is unsigned, if the recurrence
    is executed often enough perturb eventually becomes and remains 0.  At that
    point (very rarely reached) the recurrence is on (just) 5*j+1 again, and
    that's certain to find an empty slot eventually (since it generates every int
    in range(2**i), and we make sure there's always at least one empty slot).
    
    0 讨论(0)
提交回复
热议问题