Results 21 to 30 of about 647,966 (230)

Practical minimal perfect hash functions for large databases [PDF]

open access: bronzeCommunications of the ACM, 1992
We describe the first practical algorithms for finding minimal perfect hash functions that have been used to access very large databases (i.e., having over 1 million keys). This method extends earlier work wherein an 0(n-cubed) algorithm was devised, building upon prior work by Sager that described an 0(n-to the fourth) algorithm.
Edward A. Fox   +3 more
openalex   +3 more sources

Perfect hashing functions [PDF]

open access: bronzeCommunications of the ACM, 1977
A refinement of hashing which allows retrieval of an item in a static table with a single probe is considered. Given a set I of identifiers, two methods are presented for building, in a mechanical way, perfect hashing functions, i.e. functions transforming the elements of I into unique addresses.
Renzo Sprugnoli
openalex   +3 more sources

Parallel and External-Memory Construction of Minimal Perfect Hash Functions With PTHash [PDF]

open access: greenIEEE Transactions on Knowledge and Data Engineering, 2023
Accepted by IEEE ...
Giulio Ermanno Pibiri, Roberto Trani
openalex   +6 more sources

Order-preserving minimal perfect hash functions and information retrieval [PDF]

open access: bronzeACM Transactions on Information Systems, 1991
Rapid access to information is essential for a wide variety of retrieval systems and applications. Hashing has long been used when the fastest possible direct search is desired, but is generally not appropriate when sequential or range searches are also required.
Edward A. Fox   +3 more
openalex   +4 more sources

Constructing Minimal Perfect Hash Functions Using SAT Technology

open access: goldProceedings of the AAAI Conference on Artificial Intelligence, 2020
Minimal perfect hash functions (MPHFs) are used to provide efficient access to values of large dictionaries (sets of key-value pairs). Discovering new algorithms for building MPHFs is an area of active research, especially from the perspective of storage efficiency. The information-theoretic limit for MPHFs is 1/ln 2 ≈ 1.44 bits per key.
Sean Weaver, Marijn J. H. Heule
openalex   +4 more sources

A new lattice-based password authenticated key exchange scheme with anonymity and reusable key [PDF]

open access: yesPeerJ Computer Science
In this article, we propose a novel bilateral generalization inhomogenous short integer solution (BiGISIS)-based password-authenticated key exchange (PAKE) scheme for post-quantum era security.
Kübra Seyhan, Sedat Akleylek
doaj   +3 more sources

Fault tolerant graphs, perfect hash functions and disjoint paths [PDF]

open access: greenProceedings., 33rd Annual Symposium on Foundations of Computer Science, 1992
Given a graph G on n nodes the authors say that a graph T on n + k nodes is a k-fault tolerant version of G, if one can embed G in any n node induced subgraph of T. Thus T can sustain k faults and still emulate G without any performance degradation. They show that for a wide range of values of n, k and d, for any graph on n nodes with maximum degree d ...
Miklós Ajtai   +6 more
openalex   +6 more sources

GPERF : a perfect hash function generator [PDF]

open access: yes, 1992
gperf is a widely available perfect hash function generator written in C++. It automates a common system software operation: keyword recognition. gperf translates an n element user-specified keyword list keyfile into source code containing a k element ...
Schmidt, Douglas C., Suda, Tatsuya
core   +2 more sources

Minimal perfect hash functions in large scale bioinformatics Problem [PDF]

open access: green, 2016
. Genomic and metagenomic fields, generating huge sets ofshort genomic sequences, brought their own share of high performanceproblems. To extract relevant pieces of information from the huge datasets generated by current sequencing techniques, one must rely on extremelyscalable methods and solutions. Indexing billions of objects isa task considered too
Antoine Limasset   +3 more
openalex   +5 more sources

Home - About - Disclaimer - Privacy