Fix typo
Fix typos introduces more
This commit is contained in:
@@ -38,7 +38,7 @@ Answer: The adversary can make the runtime of each operation $\Theta(n)$ by simp
|
||||
|
||||
We don't want the adversary to know the hash function based on just looking at the code.
|
||||
|
||||
Idea: Randomize the choice of the hash function.
|
||||
Ideas: Randomize the choice of the hash function.
|
||||
|
||||
### Randomized Algorithm
|
||||
|
||||
@@ -57,7 +57,7 @@ $$O(n)=E[T(n)]$$ or some other probabilistic quantity.
|
||||
|
||||
#### Randomization can help
|
||||
|
||||
Idea: Randomize the choice of hash function $h$ from a family of hash functions, $H$.
|
||||
Ideas: Randomize the choice of hash function $h$ from a family of hash functions, $H$.
|
||||
|
||||
If we randomly pick a hash function from this family, then the probability that the hash function is bad on **any particular** set $S$ is small.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user