-
2
-
-
0016382963
-
Ordered hash tables
-
O. Amble and D. E. Knuth, Ordered hash tables, Comput. J., 17(2), 135-142 (1974).
-
(1974)
Comput. J.
, vol.17
, Issue.2
, pp. 135-142
-
-
Amble, O.1
Knuth, D.E.2
-
3
-
-
0015587773
-
Reducing the retrieval time of scatter storage techniques
-
R. P. Brent, Reducing the retrieval time of scatter storage techniques, Commun. ACM, 16(2), 105-109 (1973).
-
(1973)
Commun. ACM
, vol.16
, Issue.2
, pp. 105-109
-
-
Brent, R.P.1
-
4
-
-
0347836114
-
Two counting problems solved via string encodings
-
A. Apostolico and Z. Galil, Eds., NATO Advance Science Institute Series. Series F: Computer and System Sciences, Springer-Verlag, New York
-
A. Broder, Two counting problems solved via string encodings, in Combinatorial Algorithms on Words, A. Apostolico and Z. Galil, Eds., NATO Advance Science Institute Series. Series F: Computer and System Sciences, Springer-Verlag, New York, 1985, Vol. 12, pp. 229-240.
-
(1985)
Combinatorial Algorithms on Words
, vol.12
, pp. 229-240
-
-
Broder, A.1
-
7
-
-
0345944769
-
-
Ph.D. thesis, Technical Report CS-86-14, Computer Science Department, University of Waterloo, Waterloo, ON, Canada, April
-
P. Celis, Robin Hood hashing, Ph.D. thesis, Technical Report CS-86-14, Computer Science Department, University of Waterloo, Waterloo, ON, Canada, April 1986.
-
(1986)
Robin Hood Hashing
-
-
Celis, P.1
-
8
-
-
0022250374
-
-
JP. Celis, P.-Å. Larson, and J. I. Munro, Robin Hood hashing, 26th IEEE Symposium on the Foundations of Computer Science, 1985, pp. 281-288.
-
(1985)
26th IEEE Symposium on the Foundations of Computer Science
, pp. 281-288
-
-
Celis, J.P.1
Larson, P.-Å.2
Munro, J.I.3
Hashing, R.H.4
-
9
-
-
0004061872
-
-
Springer-Verlag, New York
-
B. W. Char, K. O. Geddes, G. H. Gonnet, B. L. Leong, M. B. Monagan, and S. M. Watt, MAPLE V Reference Manual, Springer-Verlag, New York, 1991.
-
(1991)
MAPLE V Reference Manual
-
-
Char, B.W.1
Geddes, K.O.2
Gonnet, G.H.3
Leong, B.L.4
Monagan, M.B.5
Watt, S.M.6
-
10
-
-
0029299248
-
Expected deadlock time in a multiprocessing system
-
K. J. Compton and C. Ravishankar, Expected deadlock time in a multiprocessing system, J. ACM, 42(3), 562-583 (1995).
-
(1995)
J. ACM
, vol.42
, Issue.3
, pp. 562-583
-
-
Compton, K.J.1
Ravishankar, C.2
-
14
-
-
0018517078
-
Extendible hashing - A fast access method for dynamic files
-
R. Fagin, J. Nievergelt, N. Pippenger, and H. R. Strong, Extendible hashing - a fast access method for dynamic files, ACM Trans. Database Syst., 4(3), 315-344 (1979).
-
(1979)
ACM Trans. Database Syst.
, vol.4
, Issue.3
, pp. 315-344
-
-
Fagin, R.1
Nievergelt, J.2
Pippenger, N.3
Strong, H.R.4
-
15
-
-
0345944768
-
-
personal communication
-
P. Flajolet, personal communication, 1995.
-
(1995)
-
-
Flajolet, P.1
-
16
-
-
0029326388
-
Mellin transforms and asymptotics; harmonic sums
-
P. Flajolet, X. Gourdon, and P. Dumas, Mellin transforms and asymptotics; harmonic sums, Theor. Comput. Sci., 144(1-2), 3-58 (1995).
-
(1995)
Theor. Comput. Sci.
, vol.144
, Issue.1-2
, pp. 3-58
-
-
Flajolet, P.1
Gourdon, X.2
Dumas, P.3
-
17
-
-
0004476491
-
On Ramanujan's Q-function
-
P. Flajolet, P. Grabner, P. Kirschenhofer, and H. Prodinger, On Ramanujan's Q-function, J. Comput. Appl. Math., 58(1), 103-116 (1995).
-
(1995)
J. Comput. Appl. Math.
, vol.58
, Issue.1
, pp. 103-116
-
-
Flajolet, P.1
Grabner, P.2
Kirschenhofer, P.3
Prodinger, H.4
-
18
-
-
0001107358
-
The first cycles in an evolving graph
-
P. Flajolet, D. E. Knuth, and B. Pittel, The first cycles in an evolving graph, Discrete Math. 75, 167-215 (1989).
-
(1989)
Discrete Math.
, vol.75
, pp. 167-215
-
-
Flajolet, P.1
Knuth, D.E.2
Pittel, B.3
-
19
-
-
0020192603
-
The average height of binary trees and other simple trees
-
P. Flajolet and A. M. Odlyzko, The average height of binary trees and other simple trees, J. Comput. Syst. Sci., 25, 171-213 (1982).
-
(1982)
J. Comput. Syst. Sci.
, vol.25
, pp. 171-213
-
-
Flajolet, P.1
Odlyzko, A.M.2
-
20
-
-
84915939958
-
Random mapping statistics
-
J.-J. Quisquater and J. Vandewalle, Eds., Lecture Notes in Computer Science 434, Proceedings of EUROCRYPT'89, Houtalen, Belgium, April Springer-Verlag, New York
-
P. Flajolet and A. M. Odlyzko, Random mapping statistics, in Advances in Cryptology, J.-J. Quisquater and J. Vandewalle, Eds., Lecture Notes in Computer Science 434, Proceedings of EUROCRYPT'89, Houtalen, Belgium, April 1989, Springer-Verlag, New York, pp. 329-354.
-
(1989)
Advances in Cryptology
, pp. 329-354
-
-
Flajolet, P.1
Odlyzko, A.M.2
-
21
-
-
0000640693
-
Singularity analysis of generating functions
-
J. Flajolet and A. M. Odlyzko, Singularity analysis of generating functions, SIAM J. Discrete Math., 3(2), 216-240 (1990).
-
(1990)
SIAM J. Discrete Math.
, vol.3
, Issue.2
, pp. 216-240
-
-
Flajolet, J.1
Odlyzko, A.M.2
-
24
-
-
0003915740
-
-
Addison-Wesley, Reading, MA
-
G. H. Gonnet and R. Baeza-Yates, Handbook of Algorithms and Data Structure, 2nd ed., Addison-Wesley, Reading, MA, 1991.
-
(1991)
Handbook of Algorithms and Data Structure, 2nd Ed.
-
-
Gonnet, G.H.1
Baeza-Yates, R.2
-
25
-
-
0346575965
-
Efficient ordering of hash tables
-
G. H. Gonnet and J. I. Munro, Efficient ordering of hash tables, SIAM J. Comput., 8(3), 463-478 (1979).
-
(1979)
SIAM J. Comput.
, vol.8
, Issue.3
, pp. 463-478
-
-
Gonnet, G.H.1
Munro, J.I.2
-
26
-
-
0039936094
-
The analysis of linear probing sort by the use of a new mathematical transform
-
G. H. Gonnet and J. I. Munro, The analysis of linear probing sort by the use of a new mathematical transform, J. Alg., 5, 451-470 (1984).
-
(1984)
J. Alg.
, vol.5
, pp. 451-470
-
-
Gonnet, G.H.1
Munro, J.I.2
-
28
-
-
0004155526
-
-
Addison-Wesley, Reading, MA
-
R. L. Graham, D. E. Knuth, and O. Patashnik, Concrete Mathematics, Addison-Wesley, Reading, MA, 1989.
-
(1989)
Concrete Mathematics
-
-
Graham, R.L.1
Knuth, D.E.2
Patashnik, O.3
-
30
-
-
84941436061
-
Trie partitioning process: Limiting distributions
-
P. Franchi-Zanetacchi, Ed., Nice, France, March LNCS
-
P. Jacquet and M. Régnier, Trie partitioning process: limiting distributions, CAAP'86, Proc. 11th Colloquium on Trees in Algebra and Programming, P. Franchi-Zanetacchi, Ed., Nice, France, March 1986, LNCS Vol. 214, pp. 196-210.
-
(1986)
CAAP'86, Proc. 11th Colloquium on Trees in Algebra and Programming
, vol.214
, pp. 196-210
-
-
Jacquet, P.1
Régnier, M.2
-
31
-
-
0024715729
-
Ultimate characterizations of the burst response of an interval searching algorithm: A study of a functional equation
-
P. Jacquet and W. Szpankowski, Ultimate characterizations of the burst response of an interval searching algorithm: a study of a functional equation, SIAM J. Comput., 8, 777-791 (1989).
-
(1989)
SIAM J. Comput.
, vol.8
, pp. 777-791
-
-
Jacquet, P.1
Szpankowski, W.2
-
33
-
-
0029327379
-
Asymptotic behaviour of the Lempel-Ziv parsing scheme and digital search trees
-
P. Jacquet and W. Szpankowski, Asymptotic behaviour of the Lempel-Ziv parsing scheme and digital search trees, Theor. Comput. Sci., 144, 161-197 (1995).
-
(1995)
Theor. Comput. Sci.
, vol.144
, pp. 161-197
-
-
Jacquet, P.1
Szpankowski, W.2
-
34
-
-
0029229766
-
Bounds for the worst case probability of undetected error
-
T. Kløve, Bounds for the worst case probability of undetected error, IEEE Inf. Theory, 41, 298-300 (1995).
-
(1995)
IEEE Inf. Theory
, vol.41
, pp. 298-300
-
-
Kløve, T.1
-
35
-
-
0003657590
-
-
Addison-Wesley, Reading, MA
-
D. E. Knuth, The Art of Computer Programming, Vol. 1. Fundamental Algorithms, Addison-Wesley, Reading, MA, 1968.
-
(1968)
The Art of Computer Programming, Vol. 1. Fundamental Algorithms
, vol.1
-
-
Knuth, D.E.1
-
36
-
-
0003657590
-
-
Addison-Wesley, Reading, MA
-
D. E. Knuth, The Art of Computer Programming, Vol. 2. Seminumerical Algorithms, Addison-Wesley, Reading, MA, 1969.
-
(1969)
The Art of Computer Programming, Vol. 2. Seminumerical Algorithms
, vol.2
-
-
Knuth, D.E.1
-
37
-
-
0003657590
-
-
Addison-Wesley, Reading, MA
-
D. E. Knuth, The Art of Computer Programming, Vol. 3. Sorting and Searching, Addison-Wesley, Reading, MA, 1973.
-
(1973)
The Art of Computer Programming, Vol. 3. Sorting and Searching
, vol.3
-
-
Knuth, D.E.1
-
38
-
-
0004502641
-
Analysis of optimum caching
-
D. E. Knuth, Analysis of optimum caching, J. Alg. 6, 181-199 (1985).
-
(1985)
J. Alg.
, vol.6
, pp. 181-199
-
-
Knuth, D.E.1
-
39
-
-
84990671427
-
The birth of the giant component
-
D. E. Knuth, S. Janson, T. Łuczak, and B. Pittel, The birth of the giant component, Random Struct. Alg., 4, 233-358 (1993).
-
(1993)
Random Struct. Alg.
, vol.4
, pp. 233-358
-
-
Knuth, D.E.1
Janson, S.2
Łuczak, T.3
Pittel, B.4
-
41
-
-
0016556972
-
Activity in an interleaved memory
-
D. E. Knuth and G. S. Rao, Activity in an interleaved memory, IEEE Trans. Comput., C-24, 943-944 (1975).
-
(1975)
IEEE Trans. Comput.
, vol.C-24
, pp. 943-944
-
-
Knuth, D.E.1
Rao, G.S.2
-
42
-
-
0000789133
-
The expected linearity of a simple equivalence algorithm
-
D. E. Knuth and A. Schönhage, The expected linearity of a simple equivalence algorithm, Theor. Comput. Sci., 6, 281-315 (1978).
-
(1978)
Theor. Comput. Sci.
, vol.6
, pp. 281-315
-
-
Knuth, D.E.1
Schönhage, A.2
-
43
-
-
0029277039
-
Average profile and limiting distribution for a phrase size in the Lempel-Ziv parsing algorithm
-
G. Louchard and W. Szpankowski, Average profile and limiting distribution for a phrase size in the Lempel-Ziv parsing algorithm, IEEE Inf. Theory, 41, 478-488 (1995).
-
(1995)
IEEE Inf. Theory
, vol.41
, pp. 478-488
-
-
Louchard, G.1
Szpankowski, W.2
-
44
-
-
0039672693
-
-
Canadian Mathematical Monographs, Montreal
-
J. W. Moon, Counting Labelled Trees, Canadian Mathematical Monographs, Montreal, 1970.
-
(1970)
Counting Labelled Trees
-
-
Moon, J.W.1
-
45
-
-
0001725943
-
Periodic oscillations of coefficients of power series that satisfy functional equations
-
A. M. Odlyzko, Periodic oscillations of coefficients of power series that satisfy functional equations, Adv. Math., 44, 180-205 (1982).
-
(1982)
Adv. Math.
, vol.44
, pp. 180-205
-
-
Odlyzko, A.M.1
-
47
-
-
0022796304
-
Approximating functions by their Poisson transform
-
P. V. Poblete, Approximating functions by their Poisson transform, Inf. Process. Lett., 23, 127-130 (1986).
-
(1986)
Inf. Process. Lett.
, vol.23
, pp. 127-130
-
-
Poblete, P.V.1
-
48
-
-
38249021763
-
Last-come-first-served hashing
-
P. V. Poblete and J. I. Munro, Last-come-first-served hashing, J. Alg. 10, 228-248 (1989).
-
(1989)
J. Alg.
, vol.10
, pp. 228-248
-
-
Poblete, P.V.1
Munro, J.I.2
-
49
-
-
85020094334
-
The analysis of a hashing scheme by a new transform
-
Lecture Notes in Computer Science
-
P. V. Poblete, A. Viola, and J. I. Munro, The analysis of a hashing scheme by a new transform, 2nd European Symposium on Algorithms, Lecture Notes in Computer Science 434, 1994, pp. 94-105.
-
(1994)
2nd European Symposium on Algorithms
, vol.434
, pp. 94-105
-
-
Poblete, P.V.1
Viola, A.2
Munro, J.I.3
-
53
-
-
0029409881
-
On asymptotics of certain sums arising in coding theory
-
W. Szpankowski, On asymptotics of certain sums arising in coding theory, IEEE Trans. Inf. Theory, 41, 2087-2090 (1995).
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, pp. 2087-2090
-
-
Szpankowski, W.1
-
55
-
-
0345944765
-
-
Ph.D. thesis, Technical Report CS-95-50, Computer Science Department, University of Waterloo, Waterloo, ON, Canada, November
-
A. Viola, Analysis of hashing algorithms and a new mathematical transform. Ph.D. thesis, Technical Report CS-95-50, Computer Science Department, University of Waterloo, Waterloo, ON, Canada, November 1995.
-
(1995)
Analysis of Hashing Algorithms and a New Mathematical Transform
-
-
Viola, A.1
|