Results 321 to 330 of about 1,648,250 (343)
Some of the next articles are maybe not open access.

Concurrent Hash Tables for Haskell

2016
This paper presents seven hash table Haskell implementations, ranging from low-level synchronization mechanisms to high-level ones such as transactional memories. The result of the comparison between the algorithms showed that the implementation using the STM Haskell transactional memory library and fine-grain synchronization presented the best ...
Rodrigo Medeiros Duarte   +4 more
openaire   +2 more sources

Interactive creation of hash tables

2016 International Conference on Emerging eLearning Technologies and Applications (ICETA), 2016
The aim of this work is to design and implement program, which is able to do basic operations and to interactively create hash tables. It describes principles of hashing, behavior of hash tables with the use of various methods, which deal with conflicts when inserting values into tables and analyzes selected hash functions.
Eva Chovancová   +2 more
openaire   +2 more sources

7. Distributed Hash Tables [PDF]

open access: possible, 2005
In the last few years, an increasing number of massively distributed systems with millions of participants has emerged within very short time frames. Applications, such as instant messaging, file-sharing, and content distribution have attracted countless numbers of users.
Simon Rieche, Klaus Wehrle, Stefan Götz
openaire   +1 more source

Lock-free Hash Table on Graphics Processors

2012 Symposium on Application Accelerators in High Performance Computing, 2012
Lock-free data structures guarantee higher throughput than lock-based implementations in parallel architectures. This paper presents the first CAS-based lock-free hash table that is based on chaining on GPUs.
Maryam Moazeni, Majid Sarrafzadeh
semanticscholar   +1 more source

On the design of special hash functions for multiple hash tables

2012 9th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), 2012
One disadvantage of bitstate hashing, the traditional probabilistic state space analysis method, is the possible large amount of wasted memory for achieving a high probability of no address collision in hashing. We look at tradeoff between hashing speed and memory assigned for hashing. This paper presents a method using multiple hash tables and special
openaire   +2 more sources

Realizing sets by hash tables

1995
One of the crucial operations on the path from specification to implementation is the modification of data structures. In this paper we demonstrate how this task can be accomplished constructively.
Peter Pepper   +3 more
openaire   +2 more sources

Affinity-based hash tables

Proceedings of the workshop on Memory Systems Performance and Correctness, 2014
From a trace of data accesses, it is possible to calculate an affinity hierarchy that groups related data together. Combining this hierarchy with the extremely common hash table, there is an opportunity to both improve cache performance and enable novel applications.
Brian Gernhardt   +2 more
openaire   +2 more sources

The reallocation of hash-coded tables

Communications of the ACM, 1973
When the space allocation for a hash-coded table is altered, the table entries must be rescattered over the new space. A technique for accomplishing this rescattering is presented. The technique is independent of both the length of the table and the hashing function used, and can be utilized in conjunction with a linear reallocation of the table being ...
openaire   +2 more sources

Hash Tables and Associative Arrays

2019
If you want to get a book from the central library of the Karlsruhe Institute of Technology (KIT), you have to order the book in advance. The library personnel fetch the book from the stacks and deliver it to a room with 100 shelves. You find your book on a shelf numbered with the last two digits of your library card.
Roman Dementiev   +3 more
openaire   +2 more sources

Hash Table

Data Structures and Algorithms in Swift, 2020
Elshad Karimov
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy