Results 1 to 10 of about 452,547 (170)

Error Correcting Codes, Perfect Hashing Circuits, and Deterministic Dynamic Dictionaries

open access: hybridBRICS Report Series, 1997
We consider dictionaries of size n over the finite universe U ={0, 1}^w and introduce a new technique for their implementation: error correcting codes. The use of such codes makes it possible to replace the use of strong forms of hashing, such as universal hashing, with much weaker forms, such as clustering.<br />We use our approach to construct,
Peter Bro Miltersen
semanticscholar   +7 more sources

Memory-efficient and Ultra-fast Network Lookup and Forwarding using Othello Hashing [PDF]

open access: yesarXiv, 2016
Network algorithms always prefer low memory cost and fast packet processing speed. Forwarding information base (FIB), as a typical network processing component, requires a scalable and memory-efficient algorithm to support fast lookups. In this paper, we present a new network algorithm, Othello Hashing, and its application of a FIB design called ...
Ye Yu   +3 more
arxiv   +2 more sources

Distributing hash families with few rows [PDF]

open access: yesTheoret. Comput. Sci. 800 (2019), 31-41, 2021
Column replacement techniques for creating covering arrays rely on the construction of perfect and distributing hash families with few rows, having as many columns as possible for a specified number of symbols. To construct distributing hash families in which the number of rows is less than the strength, we examine a method due to Blackburn and extend ...
arxiv   +1 more source

Simple, compact and robust approximate string dictionary [PDF]

open access: yes, 2014
This paper is concerned with practical implementations of approximate string dictionaries that allow edit errors. In this problem, we have as input a dictionary $D$ of $d$ strings of total length $n$ over an alphabet of size $\sigma$.
Belazzougui, Djamal, Chegrane, Ibrahim
core   +1 more source

Ludo Hashing

open access: yesMeasurement and Modeling of Computer Systems, 2020
Key-value lookup engines running in fast memory are crucial components of many networked and distributed systems such as packet forwarding, virtual network functions, content distribution networks, distributed storage, and cloud/edge computing.
Shouqian Shi, Chen Qian
semanticscholar   +1 more source

Performance analysis of a hardware accelerator of dependence management for taskbased dataflow programming models [PDF]

open access: yes, 2016
Along with the popularity of multicore and manycore, task-based dataflow programming models obtain great attention for being able to extract high parallelism from applications without exposing the complexity to programmers.
Ayguadé Parra, Eduard   +5 more
core   +1 more source

Low Thread-Count Gustavson: A Multithreaded Algorithm for Sparse Matrix-Matrix Multiplication Using Perfect Hashing

open access: yesACM SIGPLAN Symposium on Scala, 2018
Sparse matrix-matrix multiplication is a critical kernel for several scientific computing applications, especially the setup phase of algebraic multigrid.
James J. Elliott, C. Siefert
semanticscholar   +1 more source

Cuckoo Hashing

open access: yesEncyclopedia of Algorithms, 2001
We present a simple dictionary with worst case constant lookup time, equaling the theoretical performance of the classic dynamic perfect hashing scheme of Dietzfelbinger et al. [SIAM J. Comput. 23 (4) (1994) 738-761].
R. Pagh, Flemming Friche Rodler
semanticscholar   +1 more source

Revocation management in vehicular ad-hoc networks [PDF]

open access: yes2015 IEEE Trustcom/BigDataSE/ISPA 1, 1210-1217, 2015, 2022
This paper describes a solution for the efficient management of revocation in vehicular ad-hoc networks, for both certificate-based and identity-based authentication. It proposes the use of an authenticated data structure based on a dynamic hash tree, which is a perfect $k$-ary tree, together with a new version of the SHA-3 hash function.
arxiv  

A comprehensive evaluation of alignment algorithms in the context of RNA-seq. [PDF]

open access: yes, 2012
Transcriptome sequencing (RNA-Seq) overcomes limitations of previously used RNA quantification methods and provides one experimental framework for both high-throughput characterization and quantification of transcripts at the nucleotide level.
Friedel, Caroline C., Lindner, Robert
core   +2 more sources

Home - About - Disclaimer - Privacy