Results 301 to 310 of about 1,648,250 (343)
Some of the next articles are maybe not open access.

Use of a novel hash-table for speeding-up suggestions for misspelt Tamil words

International Conference on Industrial and Information Systems, 2017
Spell checker is a tool that finds and corrects misspelt words in a text document. Spelling error detection and correction techniques are widely used by text editing systems, machine translation systems, optical character recognition systems, search ...
Ratnasingam Sakuntharaj, S. Mahesan
semanticscholar   +1 more source

Revisiting Hash Table Design for Phase Change Memory

OPSR, 2016
Phase Change Memory (PCM) is emerging as an attractive alternative to Dynamic Random Access Memory (DRAM) in building data-intensive computing systems. PCM offers read/write performance asymmetry that makes it necessary to revisit the design of in-memory
Biplob K. Debnath   +4 more
semanticscholar   +1 more source

Hash table reorganization

Journal of Algorithms, 1985
Abstract We consider the operation of permuting in place the records of an open address hash table in order to correspond to a different hashing function. Our emphasis is primarily on minimizing the amount of work space used. Lower and upper bounds are derived on the unrestricted problem, that is, without making any assumptions about the probing ...
openaire   +2 more sources

A scalable lock-free hash table with open addressing

ACM SIGPLAN Symposium on Principles & Practice of Parallel Programming, 2016
Concurrent data structures synchronized with locks do not scale well with the number of threads. As more scalable alternatives, concurrent data structures and algorithms based on widely available, however advanced, atomic operations have been proposed ...
Jesper Puge Nielsen, Sven Karlsson
semanticscholar   +1 more source

Deterministic and Efficient Hash Table Lookup Using Discriminated Vectors

Global Communications Conference, 2016
Hash table is used in many areas of networking such as route lookup, packet classification, per-flow state management and network monitoring for its constant access time latency at moderate loads.
Dagang Li, Junmao Li, Zheng Du
semanticscholar   +1 more source

Decoding of binary quadratic residue codes with hash table

IET Communications, 2016
An efficient decoding of quadratic residue (QR) codes utilising hashing search to find error patterns is presented in this study. The key idea behind the proposed decoding method is theoretically based on the existence of a one-to-one mapping between the
Yan-Haw Chen, Ching-Fu Huang, J. Chang
semanticscholar   +1 more source

A Hash Table for Line-Rate Data Processing

TRETS, 2015
FPGA-based data processing is becoming increasingly relevant in data centers, as the transformation of existing applications into dataflow architectures can bring significant throughput and power benefits.
Z. István   +3 more
semanticscholar   +1 more source

HATCH: Hash Table Caching in Hardware for Efficient Relational Join on FPGA

2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines, 2015
In this paper we present HATCH, a novel hash join engine. We follow a new design point which enables us to effectively cache the hash table entries in fast BRAM resources, meanwhile supporting collision resolution in hardware.
Behzad Salami   +2 more
semanticscholar   +1 more source

High-Throughput Online Hash Table on FPGA

2015 IEEE International Parallel and Distributed Processing Symposium Workshop, 2015
Hash tables are widely used in many network applications such as packet classification, traffic classification, and heavy hitter detection, etc. In this paper, we present a pipelined architecture for high throughput online hash table on FPGA.
Da Tong, Shijie Zhou, V. Prasanna
semanticscholar   +1 more source

Social Distributed Hash Table

2007 IEEE Wireless Communications and Networking Conference, 2007
This paper presents an architecture called social distributed hash table (SDHT) that combines strengths of distributed hash table (DHT) algorithms and social networks making mobile search fast and context oriented. The paper presents possible implementations of the proposed architecture in the IP multimedia subsystem (IMS) and as a standalone SIP based
Marcin Matuszewski, M.A. Garcia-Martin
openaire   +2 more sources

Home - About - Disclaimer - Privacy