-
1
-
-
0028092498
-
Balanced allocations
-
Y. Azar, A. Broder, A. Karlin, E. Upfal. Balanced Allocations, Proc. 26th ACM Symp. on Theory of Computing, 1994, pp. 593-602.
-
(1994)
Proc. 26th ACM Symp. On Theory of Computing
, pp. 593-602
-
-
Azar, Y.1
Broder, A.2
Karlin, A.3
Upfal, E.4
-
3
-
-
0028092498
-
Balanced allocations (extended abstract)
-
May 23-25
-
Y. Azar, A. Z. Broder , A. R. Karlin , E. Upfal, Balanced allocations (extended abstract), Proc. ACM symposium on Theory of computing, May 23-25, 1994, pp. 593-602.
-
(1994)
Proc. ACM Symposium on Theory of Computing
, pp. 593-602
-
-
Azar, Y.1
Broder, A.Z.2
Karlin, A.R.3
Upfal, E.4
-
4
-
-
0040055173
-
Parallel randomized load balancing
-
M. Adler, S. Chakrabarti, M. Mitzenmacher, L. Rasmussen, Parallel randomized load balancing, Proc. 27th Annual ACM Symposium on Theory of Computing, 1995, pp. 238-247.
-
(1995)
Proc. 27th Annual ACM Symposium on Theory of Computing
, pp. 238-247
-
-
Adler, M.1
Chakrabarti, S.2
Mitzenmacher, M.3
Rasmussen, L.4
-
5
-
-
0019552967
-
Expected length of the longest probe sequence in hash code searching
-
G. H. Gonnet, Expected length of the longest probe sequence in hash code searching, Journal of ACM, 28 (1981), pp. 289-304.
-
(1981)
Journal of ACM
, vol.28
, pp. 289-304
-
-
Gonnet, G.H.1
-
6
-
-
0021467937
-
Storing a sparse table with O(1) worst case access time
-
M. L. Fredman, et al., Storing a sparse table with O(1) worst case access time, Journal of ACM, 31 (1984), pp. 538-544.
-
(1984)
Journal of ACM
, vol.31
, pp. 538-544
-
-
Fredman, M.L.1
-
7
-
-
0018456171
-
UNIVERSAL CLASSES OF HASH FUNCTIONS.
-
DOI 10.1016/0022-0000(79)90044-8
-
J. L. Carter, M. N. Wegman, Universal Classes of Hash Functions, JCSS 18, No. 2, 1979, pp. 143-154. (Pubitemid 9461408)
-
(1979)
Journal of Computer and System Sciences
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter J.Lawrence1
Wegman Mark, N.2
-
8
-
-
0028076573
-
On contention resolution protocols and associated probabilistic phenomena
-
P. D. Mackenzie, C. G. Plaxton, R. Rajaraman, On contention resolution protocols and associated probabilistic phenomena, Proc. 26th ACM Symp. on Theory of Computing, 1994, pp. 153-162.
-
(1994)
Proc. 26th ACM Symp. On Theory of Computing
, pp. 153-162
-
-
Mackenzie, P.D.1
Plaxton, C.G.2
Rajaraman, R.3
-
9
-
-
0032613750
-
Membership in constant time and almost-minimum space
-
A. Brodnik, I. Munro, Membership in constant time and almost-minimum space, SIAM J. Comput. 28 (1999) 1627- 1640. (Pubitemid 129304145)
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.5
, pp. 1627-1640
-
-
Brodnik, A.1
Munro, J.I.2
-
10
-
-
33749851941
-
Fast hash table lookup using extended bloom filter: An aid to network processing
-
Philadelphia PA, August 20-26
-
H. Song, S. Dharmapurikar, J. Turner, J. Lockwood, "Fast Hash Table Lookup Using Extended Bloom Filter: An Aid to Network Processing," SIGCOMM, Philadelphia PA, August 20-26, 2005.
-
(2005)
SIGCOMM
-
-
Song, H.1
Dharmapurikar, S.2
Turner, J.3
Lockwood, J.4
-
12
-
-
0002002496
-
Scalable high speed IP routing lookups
-
M. Wadvogel, G. Varghese, J. Turner, B. Plattner. Scalable High Speed IP Routing Lookups, Proc. of SIGCOMM 97, 1997.
-
(1997)
Proc. of SIGCOMM
, vol.97
-
-
Wadvogel, M.1
Varghese, G.2
Turner, J.3
Plattner, B.4
-
13
-
-
0035015894
-
Using multiple hash functions to improve IP lookups
-
A. Broder, M. Mitzenmacher, "Using Multiple Hash Functions to Improve IP Lookups", IEEE INFOCOM, 2001, pp. 1454-1463. (Pubitemid 32485792)
-
(2001)
Proceedings - IEEE INFOCOM
, vol.3
, pp. 1454-1463
-
-
Broder, A.1
Mitzenmacher, M.2
-
14
-
-
84888086608
-
Two hybrid methods for collision resolution in open addressing hashing
-
W. Cunto, P. V. Poblete: Two Hybrid Methods for Collision Resolution in Open Addressing Hashing, SWAT 1988, pp. 113-119.
-
(1988)
SWAT
, pp. 113-119
-
-
Cunto, W.1
Poblete, P.V.2
-
16
-
-
0023998205
-
Dynamic hash tables
-
P. Larson, Dynamic Hash Tables, CACM, 1988, 31 (4).
-
(1988)
CACM
, vol.31
, Issue.4
-
-
Larson, P.1
-
18
-
-
84943264134
-
Cuckoo Hashing
-
Algorithms - ESA 2001
-
R. Pagh, F. F. Rodler, Cuckoo Hashing, Proc. 9th Annual European Symposium on Algorithms, August 28-31, 2001, pp.121-133. (Pubitemid 33328952)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2161
, pp. 121-133
-
-
Pagh, R.1
Rodler, F.F.2
-
19
-
-
0003657590
-
-
Addison-Wesley Publishing Co, second edition
-
D. E. Knuth, The Art of Computer Programming, volume 3, Addison-Wesley Publishing Co, second edition, 1998.
-
(1998)
The Art of Computer Programming
, vol.3
-
-
Knuth, D.E.1
-
21
-
-
0005008833
-
Parallel hashing algorithms
-
Feb.
-
Goto, Ida, and Gunji, "Parallel hashing algorithms", Information Processing Letters, Vol. 6, No. 1, Feb. 1977.
-
(1977)
Information Processing Letters
, vol.6
, Issue.1
-
-
Goto, G.1
Ida, I.2
Gunji, G.3
-
22
-
-
0021493913
-
Evaluation of associative memory using parallel chained hashing
-
Sept.
-
Hiraki, Nishida, and Shimada, "Evaluation of associative memory using parallel chained hashing", IEEE Tran. On Software Engineering, Vol. 33, No. 9, pp. 851-855, Sept. 1984.
-
(1984)
IEEE Tran. On Software Engineering
, vol.33
, Issue.9
, pp. 851-855
-
-
Hiraki, H.1
Nishida, N.2
Shimada, S.3
-
25
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
July
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors", Comm. of the ACM, v.13 n.7, p.422-426, July 1970
-
(1970)
Comm. of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
26
-
-
0034206002
-
Summary cache: A scalable wide-area Web cache sharing protocol
-
DOI 10.1109/90.851975
-
Li Fan , et al., "Summary cache: a scalable wide-area web cache sharing protocol", IEEE/ACM Transactions on Networking (TON), v.8 n.3, p.281-293, June 2000. (Pubitemid 30893632)
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.3
, pp. 281-293
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.Z.4
-
27
-
-
0033295259
-
Bro: A system for detecting network intruders in real time
-
December
-
Vern Paxson, "Bro: A system for detecting network intruders in real time", Computer Networks, December 1999.
-
(1999)
Computer Networks
-
-
Paxson, V.1
-
28
-
-
33846589630
-
Architecture for a hardware-based TCP/IP content scanning system
-
Stanford, CA, August
-
David V. Schuehler, James Moscola, and John W. Lockwood, "Architecture for a hardware-based TCP/IP content scanning system", In IEEE Hot Interconnects, Stanford, CA, August 2003.
-
(2003)
IEEE Hot Interconnects
-
-
Schuehler, D.V.1
Moscola, J.2
Lockwood, J.W.3
-
29
-
-
0003672894
-
More analysis of double hashing
-
George S. Lueker, Mariko Molodowitch, "More analysis of double hashing," Combinatorica 13(1): 83-96 (1993).
-
(1993)
Combinatorica
, vol.13
, Issue.1
, pp. 83-96
-
-
Lueker, G.S.1
Molodowitch, M.2
-
30
-
-
67650497237
-
Cu-11 standard cell/gate array ASIC
-
Cu-11 standard cell/gate array ASIC, IBM.
-
IBM
-
-
-
31
-
-
67650487816
-
Virtex-4 FPGA
-
Virtex-4 FPGA, Xilinx.
-
Xilinx
-
-
-
32
-
-
8344263175
-
Longest prefix matching using bloom filters
-
Karlsruhe, Germanny. Aug.
-
Dharmapurikar, et al., "Longest Prefix matching using bloom filters." In Proc. of SIGCOMM, Karlsruhe, Germanny. Aug, 2003.
-
(2003)
In Proc. of SIGCOMM
-
-
Dharmapurikar, D.1
|