Results 41 to 50 of about 1,756,456 (179)

Hash Table Design and Optimization for Software Virtual Switches

open access: yesKBNets@SIGCOMM, 2018
Flow classification is a common first step in various virtual network functions (VNFs), Software Defined Networking (SDN) applications, as well as network infrastructure components including virtual switches and routers.
Yipeng Wang   +4 more
semanticscholar   +1 more source

Novel distributed Hash table——BChord

open access: yesTongxin xuebao, 2008
A novel distributed Hash table(DHT) BChord was presented. BChord adopts bi-directional search mechanism of Chord. Though query items of finger table in BChord almost double to Chord, compared with Chord, BChord evi- dently increases speed at searching of
ZHENG Yan1   +3 more
doaj   +2 more sources

Improved Session Table Architecture for Denial of Stateful Firewall Attacks

open access: yesIEEE Access, 2018
Stateful firewalls keep track of the state of network connections. The performance of stateful firewalls depends mainly on the processing of session tables and the mechanism used for packet filtering.
Zouheir Trabelsi   +3 more
doaj   +1 more source

Better GPU Hash Tables [PDF]

open access: yesarXiv, 2021
We revisit the problem of building static hash tables on the GPU and design and build three bucketed hash tables that use different probing schemes. Our implementations are lock-free and offer efficient memory access patterns; thus, only the probing scheme is the factor affecting the performance of the hash table's different operations.
arxiv  

Towards a Highly Available Model for Processing Service Requests Based on Distributed Hash Tables

open access: yesMathematics, 2022
This work aims to identify techniques leading to a highly available request processing service by using the natural decentralization and the dispersion power of the hash function involved in a Distributed Hash Table (DHT).
Voichiţa Iancu, Nicolae Ţăpuş
doaj   +1 more source

On the Insertion Time of Cuckoo Hashing

open access: yes, 2013
Cuckoo hashing is an efficient technique for creating large hash tables with high space utilization and guaranteed constant access times. There, each item can be placed in a location given by any one out of k different hash functions.
Fountoulakis, Nikolaos   +2 more
core   +1 more source

Verifying a hash table and its iterators in higher-order separation logic

open access: yesCertified Programs and Proofs, 2017
We describe the specification and proof of an (imperative, sequential) hash table implementation. The usual dictionary operations (insertion, lookup, and so on) are supported, as well as iteration via folds and iterators. The code is written in OCaml and
F. Pottier
semanticscholar   +1 more source

Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie   +5 more
doaj  

Coverless VoIP Steganography Using Hash and Hash

open access: yesCybernetics and Information Technologies, 2020
Performing secure and robust embedding and extracting in real time voice streams without deteriorating the voice quality is a great challenge. This paper aims on hiding the secret data bits in the voice packets without modifying any data in the cover ...
Deepikaa S., Saravanan R.
doaj   +1 more source

An Indictment of Bright Line Tests for Honest Services Mail Fraud [PDF]

open access: yes, 2004
Sparse matrix-matrix multiplication (SpGEMM) is a computational primitive that is widely used in areas ranging from traditional numerical applications to recent big data analysis and machine learning.
Azad, A   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy