• Implementation
  • Non-destructivity
  • Handling of non-integer keys