Results 31 to 40 of about 167,829 (332)

SAHA: A String Adaptive Hash Table for Analytical Databases

open access: yesApplied Sciences, 2020
Hash tables are the fundamental data structure for analytical database workloads, such as aggregation, joining, set filtering and records deduplication. The performance aspects of hash tables differ drastically with respect to what kind of data are being
Tianqi Zheng, Zhibin Zhang, Xueqi Cheng
doaj   +1 more source

Cuckoo++ hash tables

open access: yesProceedings of the 2018 Symposium on Architectures for Networking and Communications Systems, 2018
Hash tables are an essential data-structure for numerous networking applications (e.g., connection tracking, firewalls, network address translators). Among these, cuckoo hash tables provide excellent performance by allowing lookups to be processed with very few memory accesses (2 to 3 per lookup). Yet, for large tables, cuckoo hash tables remain memory
openaire   +2 more sources

Ordered hash tables [PDF]

open access: yesThe Computer Journal, 1974
Abstract : Some variants of the traditional hash method, making use of the numerical or alphabetical order of the keys, lead to faster searching at the expense of a little extra work when items are inserted. The paper presents the new algorithms and analyzes their average running time. (Author)
Amble, O., Knuth, D. E.
openaire   +2 more sources

Novel distributed Hash table——BChord

open access: yesTongxin xuebao, 2008
A novel distributed Hash table(DHT) BChord was presented. BChord adopts bi-directional search mechanism of Chord. Though query items of finger table in BChord almost double to Chord, compared with Chord, BChord evi- dently increases speed at searching of
ZHENG Yan1   +3 more
doaj   +2 more sources

Research of a Scheduling Optimization algorithm based on Hash Adapter

open access: yesMATEC Web of Conferences, 2017
The performance of hash-based Scheduling optimization algorithm for network flow cannot be bounded under the worst-case because of hash conflicts. To make up for the shortage of the above algorithm, a multiple-hash algorithm based on counting Hash ...
Yang Wenchuan, Fu Zhen, Zuo Wen
doaj   +1 more source

ESH: Design and Implementation of an Optimal Hashing Scheme for Persistent Memory

open access: yesApplied Sciences, 2023
Recent advancements in memory technology have opened up a wealth of possibilities for innovation in data structures. The emergence of byte-addressable persistent memory (PM) with its impressive capacity and low latency has accelerated the adoption of PM ...
Dereje Regassa   +2 more
doaj   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

On the Insertion Time of Cuckoo Hashing

open access: yes, 2013
Cuckoo hashing is an efficient technique for creating large hash tables with high space utilization and guaranteed constant access times. There, each item can be placed in a location given by any one out of k different hash functions.
Fountoulakis, Nikolaos   +2 more
core   +1 more source

SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function

open access: yes, 2020
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.   +5 more
core   +1 more source

An Indictment of Bright Line Tests for Honest Services Mail Fraud [PDF]

open access: yes, 2004
Sparse matrix-matrix multiplication (SpGEMM) is a computational primitive that is widely used in areas ranging from traditional numerical applications to recent big data analysis and machine learning.
Azad, A   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy