Results 251 to 260 of about 168,960 (287)
Some of the next articles are maybe not open access.

Hash Table Methods

ACM Computing Surveys, 1975
W. Douglas Maurer, Ted G. Lewis
openaire   +2 more sources

On the design of special hash functions for multiple hash tables

2012 9th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), 2012
One disadvantage of bitstate hashing, the traditional probabilistic state space analysis method, is the possible large amount of wasted memory for achieving a high probability of no address collision in hashing. We look at tradeoff between hashing speed and memory assigned for hashing. This paper presents a method using multiple hash tables and special
openaire   +1 more source

An Experimental Investigation Into the Hash Functions Used in Blockchains

IEEE Transactions on Engineering Management, 2020
Emmanuel Bugingo, Wei Zheng, Jinjun Chen
exaly  

Cuckoo Hashing with Three Hash Tables

Journal of the Institute of Electronics and Information Engineers, 2020
Saeyoung Jang, Hayoung Byun, Hyesook Lim
openaire   +1 more source

Efficient chameleon hash functions in the enhanced collision resistant model

Information Sciences, 2020
Mohammad Dakhilalian, Willy Susilo
exaly  

Hash Tables

2007
Mark D. LeBlanc, Betsey Dexter Dyer
openaire   +1 more source

Self-adjusting hash tables

Information Processing Letters, 1985
openaire   +1 more source

Home - About - Disclaimer - Privacy