Results 11 to 20 of about 1,654,513 (343)

An Efficient Wait-free Resizable Hash Table [PDF]

open access: greenProceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures (2018) 111-120, 2022
This paper presents an efficient wait-free resizable hash table. To achieve high throughput at large core counts, our algorithm is specifically designed to retain the natural parallelism of concurrent hashing, while providing wait-free resizing. An extensive evaluation of our hash table shows that in the common case where resizing actions are rare, our
Panagiota Fatourou   +2 more
arxiv   +10 more sources

Hyperdimensional hashing [PDF]

open access: yesProceedings of the 59th ACM/IEEE Design Automation Conference, 2022
Most cloud services and distributed applications rely on hashing algorithms that allow dynamic scaling of a robust and efficient hash table. Examples include AWS, Google Cloud and BitTorrent. Consistent and rendezvous hashing are algorithms that minimize key remapping as the hash table resizes.
Heddes, Mike   +4 more
openaire   +3 more sources

FASTHash: FPGA-Based High Throughput Parallel Hash Table [PDF]

open access: yesHigh Performance Computing35th International Conference, 2020
Hash table is a fundamental data structure that provides efficient data store and access. It is a key component in AI applications which rely on building a model of the environment using observations and performing lookups on the model for newer ...
Yang Y   +4 more
europepmc   +2 more sources

Iceberg Hashing: Optimizing Many Hash-Table Criteria at Once [PDF]

open access: yesJournal of the ACM, 2023
Despite being one of the oldest data structures in computer science, hash tables continue to be the focus of a great deal of both theoretical and empirical research. A central reason for this is that many of the fundamental properties that one desires from a hash table are difficult to achieve simultaneously; thus many variants offering different trade-
Michael A. Bender   +4 more
openaire   +4 more sources

Cascade hash tables: a series of multilevel double hashing schemes with O(1) worst case lookup time [PDF]

open access: greenarXiv, 2006
In this paper, the author proposes a series of multilevel double hashing schemes called cascade hash tables. They use several levels of hash tables. In each table, we use the common double hashing scheme. Higher level hash tables work as fail-safes of lower level hash tables.
Shaohua Li
arxiv   +3 more sources

Comparison on Search Failure between Hash Tables and a Functional Bloom Filter [PDF]

open access: goldApplied Sciences, 2020
Hash-based data structures have been widely used in many applications. An intrinsic problem of hashing is collision, in which two or more elements are hashed to the same value. If a hash table is heavily loaded, more collisions would occur. Elements that
Hayoung Byun, Hyesook Lim
doaj   +2 more sources

Analysing the Performance of GPU Hash Tables for State Space Exploration [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2017
In the past few years, General Purpose Graphics Processors (GPUs) have been used to significantly speed up numerous applications. One of the areas in which GPUs have recently led to a significant speed-up is model checking.
Nathan Cassee, Anton Wijs
doaj   +2 more sources

Dynamic hash tables [PDF]

open access: bronzeCommunications of the ACM, 1988
Linear hashing and spiral storage are two dynamic hashing schemes originally designed for external files. This paper shows how to adapt these two methods for hash tables stored in main memory. The necessary data structures and algorithms are described, the expected performance is analyzed mathematically, and actual execution times are obtained and ...
Per-Åke Larson
openalex   +3 more sources

Image Encryption Based on Hash Table Scrambling and DNA Substitution

open access: yesIEEE Access, 2020
This paper proposes an image encryption algorithm based on hash table structure scrambling and DNA substitution. The algorithm uses the classical `scrambling-diffusion' process, and the pseudo-random sequence used in each process is generated by the ...
Xingyuan Wang, Lin Liu
doaj   +2 more sources

SAHA: A String Adaptive Hash Table for Analytical Databases

open access: yesApplied Sciences, 2020
Hash tables are the fundamental data structure for analytical database workloads, such as aggregation, joining, set filtering and records deduplication. The performance aspects of hash tables differ drastically with respect to what kind of data are being
Tianqi Zheng, Zhibin Zhang, Xueqi Cheng
doaj   +2 more sources

Home - About - Disclaimer - Privacy