-
1
-
-
0040198183
-
Balanced allocations
-
Y. Azar, A. Z. Broder, A. R. Karlin, and E. Upfal, Balanced allocations, SIAM J. Comput., 29 (1999), pp. 180-200. (Pubitemid 30588356)
-
(2000)
SIAM Journal on Computing
, vol.29
, Issue.1
, pp. 180-200
-
-
Azar, Y.1
Broder, A.Z.2
Karlin, A.R.3
Upfal, E.4
-
3
-
-
0035015894
-
Using multiple hash functions to improve IP lookups
-
A. Broder and M. Mitzenmacher, Using multiple hash functions to improve IP lookups, in Proceedings of the 20th IEEE International Conference on Computer Communications (INFOCOM), 2001, pp. 1454-1463. (Pubitemid 32485792)
-
(2001)
Proceedings - IEEE INFOCOM
, vol.3
, pp. 1454-1463
-
-
Broder, A.1
Mitzenmacher, M.2
-
4
-
-
0037475191
-
Cuckoo hashing: Further analysis
-
L. Devroye and P. Morin, Cuckoo hashing: Further analysis, Inform. Process. Lett., 86 (2003), pp. 215-219.
-
(2003)
Inform. Process. Lett.
, vol.86
, pp. 215-219
-
-
Devroye, L.1
Morin, P.2
-
5
-
-
34248592076
-
Balanced allocation and dictionaries with tightly packed constant size bins
-
DOI 10.1016/j.tcs.2007.02.054, PII S0304397507001570, Automata, Languages and Programming
-
M. Dietzfelbinger and C. Weidling, Balanced allocation and dictionaries with tightly packed constant size bins, Theoret. Comput. Sci., 380 (2007), pp. 47-68. (Pubitemid 46754593)
-
(2007)
Theoretical Computer Science
, vol.380
, Issue.1-2
, pp. 47-68
-
-
Dietzfelbinger, M.1
Weidling, C.2
-
6
-
-
23944434027
-
Space efficient hash tables with worst case constant access time
-
DOI 10.1007/s00224-004-1195-x
-
D. Fotakis, R. Pagh, P. Sanders, and P. Spirakis, Space efficient hash tables with worst case constant access time, Theory Comput. Syst., 38 (2005), pp. 229-248. (Pubitemid 41201577)
-
(2005)
Theory of Computing Systems
, vol.38
, Issue.2
, pp. 229-248
-
-
Fotakis, D.1
Pagh, R.2
Sanders, P.3
Spirakis, P.4
-
8
-
-
70350350133
-
Using a queue to de-amortize cuckoo hashing in hardware
-
A. Kirsch and M. Mitzenmacher, Using a queue to de-amortize cuckoo hashing in hardware, in Proceedings of the 45th Annual Allerton Conference on Communication, Control, and Computing, 2007, pp. 751-758.
-
(2007)
Proceedings of the 45th Annual Allerton Conference on Communication, Control, and Computing
, pp. 751-758
-
-
Kirsch, A.1
Mitzenmacher, M.2
-
10
-
-
57749207669
-
More robust hashing: Cuckoo hashing with a stash
-
A. Kirsch, M. Mitzenmacher, and U. Wieder, More robust hashing: Cuckoo hashing with a stash, in Proceedings of the 16th Annual European Symposium on Algorithms, 2008, pp. 611-622.
-
(2008)
Proceedings of the 16th Annual European Symposium on Algorithms
, pp. 611-622
-
-
Kirsch, A.1
Mitzenmacher, M.2
Wieder, U.3
-
13
-
-
2442420008
-
Cuckoo hashing
-
R. Pagh and F. Rodler, Cuckoo hashing, J. Algorithms, 51 (2004), pp. 122-144.
-
(2004)
J. Algorithms
, vol.51
, pp. 122-144
-
-
Pagh, R.1
Rodler, F.2
-
14
-
-
33244463908
-
How asymmetry helps load balancing
-
DOI 10.1145/792538.792546
-
B. Vöcking, How asymmetry helps load balancing, J. ACM, 50 (2003), pp. 568-589. (Pubitemid 43906338)
-
(2003)
Journal of the ACM
, vol.50
, Issue.4
, pp. 568-589
-
-
Vocking, B.1
|