-
1
-
-
0040198183
-
Balanced Allocations
-
Y. Azar, A. Z. Broder, A. R. Karlin, and E. Upfal. Balanced Allocations. SI AM Journal on Computing, 29(1):180-200, 2000.
-
(2000)
SI AM Journal on Computing
, vol.29
, Issue.1
, pp. 180-200
-
-
Azar, Y.1
Broder, A.Z.2
Karlin, A.R.3
Upfal, E.4
-
2
-
-
0023985539
-
Privacy amplification by public discussion
-
Special issue on cryptography
-
C. H. Bennett, G. Brassard, and J.-M. Robert. Privacy amplification by public discussion. SJAM Journal on Computing, 17(2):210-229, 1988. Special issue on cryptography.
-
(1988)
SJAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
3
-
-
0014814325
-
Space/Time Trade-offs in Hash Coding with Allowable Errors
-
B. H. Bloom. Space/Time Trade-offs in Hash Coding with Allowable Errors. Communications of the ACM, 13(7):422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
4
-
-
0001215301
-
Coloring random and semirandom k-colorable graphs
-
A. Blum and J. Spencer. Coloring random and semirandom k-colorable graphs. Journal of Algorithms, I9(2):204-234, 1995.
-
(1995)
Journal of Algorithms
, vol.I9
, Issue.2
, pp. 204-234
-
-
Blum, A.1
Spencer, J.2
-
6
-
-
70450232823
-
Network Applications of Bloom Filters: A Survey
-
A. Broder and M. Mitzenmacher. Network Applications of Bloom Filters: A Survey. Internet Mathematics, 1(4):485-509, 2005.
-
(2005)
Internet Mathematics
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
8
-
-
0023985259
-
Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity
-
Apr
-
B. Chor and O. Goldreich. Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity. SIAM J. Comput., 17(2):230-261, Apr. 1988.
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
9
-
-
1842478680
-
Deep packet inspection using parallel bloom filters
-
S. Dharmapurikar, P. Krishnamurthy, T. Sproull, and J. Lockwood. Deep packet inspection using parallel bloom filters. IEEE Micro, 24(1):52-61, 2004.
-
(2004)
IEEE Micro
, vol.24
, Issue.1
, pp. 52-61
-
-
Dharmapurikar, S.1
Krishnamurthy, P.2
Sproull, T.3
Lockwood, J.4
-
10
-
-
0038446821
-
Almost random graphs with simple hash functions
-
New York, NY, USA, ACM Press
-
M. Dietzfelbinger and P. Woelfel. Almost random graphs with simple hash functions. In STOC '03: Proceedings of the thirty-fifth annual A CM symposium on Theory of computing, pages 629-638, New York, NY, USA, 2003. ACM Press.
-
(2003)
STOC '03: Proceedings of the thirty-fifth annual A CM symposium on Theory of computing
, pp. 629-638
-
-
Dietzfelbinger, M.1
Woelfel, P.2
-
11
-
-
35048839833
-
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
-
M. K. Franklin, editor, CRYPTO, of, Springer
-
Y. Dodis, R. Gennaro, J. Håstad, H. Krawczyk, and T. Rabin. Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. In M. K. Franklin, editor, CRYPTO, volume 3152 of Lecture Notes in Computer Science, pages 494-510. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 494-510
-
-
Dodis, Y.1
Gennaro, R.2
Håstad, J.3
Krawczyk, H.4
Rabin, T.5
-
13
-
-
0024866111
-
Pseudorandom Generation from one-way functions (Extended Abstracts)
-
Seattle, Washington, 15-17 May
-
R. Impagliazzo, L. A. Levin, and M. Luby. Pseudorandom Generation from one-way functions (Extended Abstracts). In Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, pages 12-24, Seattle, Washington, 15-17 May 1989.
-
(1989)
Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
14
-
-
0024771884
-
How to Recycle Random Bits
-
Research Triangle Park, North Carolina, 30 Oct.-1 Nov, IEEE
-
R. Impagliazzo and D. Zuckerman. How to Recycle Random Bits. In 30th Annual Symposium on Foundations of Computer Science, pages 248-253, Research Triangle Park, North Carolina, 30 Oct.-1 Nov. 1989. IEEE.
-
(1989)
30th Annual Symposium on Foundations of Computer Science
, pp. 248-253
-
-
Impagliazzo, R.1
Zuckerman, D.2
-
16
-
-
0003294665
-
The Art of Computer Programming
-
Addison Wesley Longman Publishing Co, Inc. Redwood City, CA, USA
-
D. Knuth. 'The Art of Computer Programming, Volume 3: Sorting and Searching. Addison Wesley Longman Publishing Co., Inc. Redwood City, CA, USA, 1998.
-
(1998)
Sorting and Searching
, vol.3
-
-
Knuth, D.1
-
18
-
-
0033075850
-
Extracting Randomness: A Survey and New Constructions
-
N. Nisan and A. Ta-Shma. Extracting Randomness: A Survey and New Constructions. Journal of Computer and System Sciences, 58(1):148-173, 1999.
-
(1999)
Journal of Computer and System Sciences
, vol.58
, Issue.1
, pp. 148-173
-
-
Nisan, N.1
Ta-Shma, A.2
-
19
-
-
0030086632
-
Randomness is Linear in Space
-
Feb
-
N. Nisan and D. Zuckerman. Randomness is Linear in Space. J. Comput. Syst. Sci., 52(1):43-52, Feb. 1996.
-
(1996)
J. Comput. Syst. Sci
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
21
-
-
35448970585
-
Linear probing with constant independence
-
New York, NY, USA, ACM Press
-
A. Pagh, R. Pagh, and M. Ruzic. Linear probing with constant independence. In STOC '07: Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, pages 318-327, New York, NY, USA, 2007. ACM Press.
-
(2007)
STOC '07: Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
, pp. 318-327
-
-
Pagh, A.1
Pagh, R.2
Ruzic, M.3
-
23
-
-
33747035782
-
Hashing practice: Analysis of hashing and universal hashing
-
New York, NY, USA, ACM Press
-
M. V. Ramakrishna. Hashing practice: analysis of hashing and universal hashing. In SIGMOD '88: Proceedings of the 1988 ACM SIGMOD international conference on Management of data, pages 191-199, New York, NY, USA, 1988. ACM Press.
-
(1988)
SIGMOD '88: Proceedings of the 1988 ACM SIGMOD international conference on Management of data
, pp. 191-199
-
-
Ramakrishna, M.V.1
-
24
-
-
0024752323
-
Practical performance of Bloom filters and parallel free-text searching
-
M. V. Ramakrishna. Practical performance of Bloom filters and parallel free-text searching. Communications of the ACM, 32(10):1237-1239, 1989.
-
(1989)
Communications of the ACM
, vol.32
, Issue.10
, pp. 1237-1239
-
-
Ramakrishna, M.V.1
-
25
-
-
0031366315
-
Efficient Hardware Hashing Functions for High Performance Computers
-
M. V. Ramakrishna, E. Fu, and E. Bahcekapili. Efficient Hardware Hashing Functions for High Performance Computers. IEEE Trans. Comput., 46(12):1378-1381, 1997.
-
(1997)
IEEE Trans. Comput
, vol.46
, Issue.12
, pp. 1378-1381
-
-
Ramakrishna, M.V.1
Fu, E.2
Bahcekapili, E.3
-
26
-
-
0021469810
-
Generating Quasi-random Sequences from Semi-random Sources
-
Aug
-
M. Santha and U. V. Vazirani. Generating Quasi-random Sequences from Semi-random Sources. J. Comput. Syst. Sci., 33(1):75-87, Aug. 1986.
-
(1986)
J. Comput. Syst. Sci
, vol.33
, Issue.1
, pp. 75-87
-
-
Santha, M.1
Vazirani, U.V.2
-
27
-
-
0024984431
-
The Analysis of Closed Hashing under Limited Randomness (Extended Abstract)
-
ACM
-
J. P. Schmidt and A. Siegel. The Analysis of Closed Hashing under Limited Randomness (Extended Abstract). In STOC, pages 224-234. ACM, 1990.
-
(1990)
STOC
, pp. 224-234
-
-
Schmidt, J.P.1
Siegel, A.2
-
29
-
-
3142708934
-
On universal classes of extremely random constant-time hash functions
-
505-543 electronic
-
A. Siegel. On universal classes of extremely random constant-time hash functions. SI AM Journal on Computing, 33(3):505-543 (electronic), 2004.
-
(2004)
SI AM Journal on Computing
, vol.33
, Issue.3
-
-
Siegel, A.1
-
30
-
-
4243066295
-
Smoothed analysis of algorithms: Why the simplex algorithm usually takes polynomial time
-
385-463 electronic
-
D. A. Spielman and S.-H. Teng. Smoothed analysis of algorithms: why the simplex algorithm usually takes polynomial time. Journal of the ACM, 51(3):385-463 (electronic), 2004.
-
(2004)
Journal of the ACM
, vol.51
, Issue.3
-
-
Spielman, D.A.1
Teng, S.-H.2
-
32
-
-
33244463908
-
How asymmetry helps load balancing
-
B. Vöcking. How asymmetry helps load balancing. Journal of the ACM, 50(4):568-589, 2003.
-
(2003)
Journal of the ACM
, vol.50
, Issue.4
, pp. 568-589
-
-
Vöcking, B.1
-
33
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
Special issue dedicated to Michael Machtey
-
M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22(3):265-279, 1981. Special issue dedicated to Michael Machtey.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
-
34
-
-
33244455193
-
Asymmetric balanced allocation with simple hash functions
-
New York, NY, USA, ACM Press
-
P. Woelfel. Asymmetric balanced allocation with simple hash functions. In SODA '06: Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithms, pages 424-433, New York, NY, USA, 2006. ACM Press.
-
(2006)
SODA '06: Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithms
, pp. 424-433
-
-
Woelfel, P.1
-
35
-
-
0001023343
-
Simulating BPP Using a General Weak Random Source
-
Oct./Nov
-
D. Zuckerman. Simulating BPP Using a General Weak Random Source. Algorithmica, 16(4/5):367-391, Oct./Nov. 1996.
-
(1996)
Algorithmica
, vol.16
, Issue.4-5
, pp. 367-391
-
-
Zuckerman, D.1
|