-
1
-
-
0033077324
-
The space complexity of approximating the frequency moments
-
N. Alon, Y. Matias, and M. Szegedy, The space complexity of approximating the frequency moments, J. Comput. System Sci., 58 (1999), pp. 137-147.
-
(1999)
J. Comput. System Sci.
, vol.58
, pp. 137-147
-
-
Alon, N.1
Matias, Y.2
Szegedy, M.3
-
2
-
-
0036042175
-
Models and issues in data stream systems
-
B. Babcock, S. Babu, M. Datar, R. Motwani, and J. Widom, Models and issues in data stream systems, in Proceedings of the 21st ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2002, pp. 1-16. (Pubitemid 35017047)
-
(2002)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 1-16
-
-
Babcock, B.1
Babu, S.2
Datar, M.3
Motwani, R.4
Widom, J.5
-
3
-
-
32144448619
-
Graph and hashing algorithms for modern architectures: Design and performance
-
MPI Saarbrücken
-
J. R. Black, C. U. Martel, and H. Qi, Graph and hashing algorithms for modern architectures: Design and performance, in Proceedings of the 2nd International Workshop on Algorithm Engineering, MPI Saarbrücken, 1998, pp. 37-48.
-
(1998)
Proceedings of the 2nd International Workshop on Algorithm Engineering
, pp. 37-48
-
-
Black, J.R.1
Martel, C.U.2
Qi, H.3
-
4
-
-
0003471197
-
-
Technical Report TR-95-048, ICSI, Berkeley, CA, available online at
-
J. Bloemer, M. Kalfane, M. Karpinski, R. Karp, M. Luby, and D. Zuckerman, An XOR-based Erasure-resilient Coding Scheme, Technical Report TR-95-048, ICSI, Berkeley, CA, 1995; available online at http://www.icsi.berkeley.edu/~luby/ PAPERS/ cauchypap.ps.
-
(1995)
An XOR-based Erasure-resilient Coding Scheme
-
-
Bloemer, J.1
Kalfane, M.2
Karpinski, M.3
Karp, R.4
Luby, M.5
Zuckerman, D.6
-
6
-
-
0018456171
-
Universal classes of hash functions
-
J. L. Carter and M. N. Wegman, Universal classes of hash functions, J. Comput. System Sci., 18 (1979), pp. 143-154.
-
(1979)
J. Comput. System Sci.
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
7
-
-
84869158135
-
Finding frequent items in data streams
-
Springer, New York
-
M. Charikar, K. Chen, and M. Farach-Colton, Finding frequent items in data streams, in Proceedings of the 29th ICALP, Lecture Notes in Comput. Sci. 2380, Springer, New York, 2002, pp. 693-703.
-
(2002)
Proceedings of the 29th ICALP, Lecture Notes in Comput. Sci.
, vol.2380
, pp. 693-703
-
-
Charikar, M.1
Chen, K.2
Farach-Colton, M.3
-
8
-
-
1142267334
-
Gigascope: A stream database for network applications
-
C. D. Cranor, T. Johnson, O. Spatscheck, and V. Shkapenyuk, Gigascope: A stream database for network applications, in Proceedings of the 22nd ACM SIGMOD Conference, 2003, pp. 647-651.
-
(2003)
Proceedings of the 22nd ACM SIGMOD Conference
, pp. 647-651
-
-
Cranor, C.D.1
Johnson, T.2
Spatscheck, O.3
Shkapenyuk, V.4
-
9
-
-
84941339354
-
Universal Hashing and k-wise Independent Random Variables via Integer Arithmetic without Primes
-
M. Dietzfelbinger, Universal hashing and k-wise independent random variables via integer arithmetic without primes, in Proceedings of the 13th STACS, Lecture Notes in Comput. Sci. 1046, Springer, New York, 1996, pp. 569-580. (Pubitemid 126040206)
-
(1996)
Lecture Notes in Computer Science
, Issue.1046
, pp. 569-580
-
-
Dietzfelbinger, M.1
-
10
-
-
84860839700
-
Polynomial hash functions are reliable
-
Springer, New York
-
M. Dietzfelbinger, J. Gil, Y. Matias, and N. Pippenger, Polynomial hash functions are reliable, in Proceedings of the 19th ICALP, Lecture Notes in Comput. Sci. 623, Springer, New York, 1992, pp. 235-246.
-
(1992)
Proceedings of the 19th ICALP, Lecture Notes in Comput. Sci.
, vol.623
, pp. 235-246
-
-
Dietzfelbinger, M.1
Gil, J.2
Matias, Y.3
Pippenger, N.4
-
11
-
-
0002540034
-
A reliable randomized algorithm for the closest-pair problem
-
M. Dietzfelbinger, T. Hagerup, J. Katajainen, and M. Penttonen, A reliable randomized algorithm for the closest-pair problem, J. Algorithms, 25 (1997), pp. 19-51. (Pubitemid 127451249)
-
(1997)
Journal of Algorithms
, vol.25
, Issue.1
, pp. 19-51
-
-
Dietzfelbinger, M.1
Hagerup, T.2
Katajainen, J.3
Penttonen, M.4
-
14
-
-
84869061183
-
Algorithm 64: Quicksort
-
C. A. R. Hoare, Algorithm 64: Quicksort, Comm. ACM, 4 (1961), p. 321.
-
(1961)
Comm. ACM
, vol.4
, pp. 321
-
-
Hoare, C.A.R.1
-
15
-
-
0027626844
-
Randomized algorithms and pseudorandom numbers
-
DOI 10.1145/174130.174132
-
H. J. Karloff and P. Raghavan, Randomized algorithms and pseudorandom numbers, J. ACM, 40 (1993), pp. 454-476. (Pubitemid 23707890)
-
(1993)
Journal of the ACM
, vol.40
, Issue.3
, pp. 454-476
-
-
Raghavan, P.1
Karlof, H.2
-
16
-
-
0007508325
-
-
unpublished memorandum, available online at
-
D. E. Knuth, Notes on "Open" Addressing, unpublished memorandum, 1963; available online at http://citeseer.ist.psu.edu/knuth63notes. html.
-
(1963)
Notes on "Open" Addressing
-
-
Knuth, D.E.1
-
17
-
-
77950860356
-
-
Addison-Wesley, Reading, MA
-
D. E. Knuth, The Art of Computer Programming, Volume 3: Sorting and Searching, Addison-Wesley, Reading, MA, 1973.
-
(1973)
The Art of Computer Programming, Volume 3: Sorting and Searching
-
-
Knuth, D.E.1
-
18
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
Proceedings of the 2003 ACM SIGCOMM Internet Measurement Conference, IMC 2003
-
B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, Sketch-based change detection: Methods, evaluation, and applications, in Proceedings of the ACM Internet Measurement Conference (IMC-03), 2003, pp. 234-247. (Pubitemid 40730656)
-
(2003)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 234-247
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
21
-
-
35448970585
-
Linear probing with constant independence
-
DOI 10.1145/1250790.1250839, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing
-
A. Pagh, R. Pagh, and M. Ruzic, Linear probing with constant independence, in Proceedings of the 39th Annual ACM Symposium on Theory of Computing, 2007, pp. 318-327. (Pubitemid 47630750)
-
(2007)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 318-327
-
-
Pagh, A.1
Pagh, R.2
Ruzic, M.3
-
22
-
-
77955323479
-
Linear probing with constant independence
-
A. Pagh, R. Pagh, and M. Ruzić, Linear probing with constant independence, SIAM J. Comput., 39 (2009), pp. 1107-1120.
-
(2009)
SIAM J. Comput.
, vol.39
, pp. 1107-1120
-
-
Pagh, A.1
Pagh, R.2
Ruzić, M.3
-
23
-
-
77955322325
-
On the k-independence required by linear probing and minwise independence
-
M. Patrascu and M. Thorup, On the k-independence required by linear probing and minwise independence, in Proceedings of the 37th International Colloquium on Automata, Languages, and Programming, 2010, pp. 715-726.
-
(2010)
Proceedings of the 37th International Colloquium on Automata, Languages, and Programming
, pp. 715-726
-
-
Patrascu, M.1
Thorup, M.2
-
24
-
-
79959686848
-
The power of simple tabulation hashing
-
ACM, New York, J. ACM, to appear
-
M. P̌atrasçu and M. Thorup, The power of simple tabulation hashing, in Proceedings of the 43rd Annual ACM Symposium on Theory of Computing, ACM, New York, 2011, pp. 1-10; J. ACM, to appear.
-
(2011)
Proceedings of the 43rd Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
P̌atrasçu, M.1
Thorup, M.2
-
25
-
-
0031122982
-
Effective erasure codes for reliable computer communication protocols
-
L. Rizzo, Effective erasure codes for reliable computer communication protocols, ACM Comput. Comm. Rev., 27 (1997), pp. 24-36. (Pubitemid 127566056)
-
(1997)
Computer Communication Review
, vol.27
, Issue.2
, pp. 24-36
-
-
Rizzo, L.1
-
26
-
-
34250459760
-
Schnelle multiplication großer zahlen
-
A. Schönhage and V. Strassen, Schnelle multiplication großer zahlen, Computing, 7 (1971), pp. 281-292.
-
(1971)
Computing
, vol.7
, pp. 281-292
-
-
Schönhage, A.1
Strassen, V.2
-
27
-
-
3142708934
-
On universal classes of extremely random constant-time hash functions
-
A. Siegel, On universal classes of extremely random constant-time hash functions, SIAM J. Comput., 33 (2004), pp. 505-543.
-
(2004)
SIAM J. Comput.
, vol.33
, pp. 505-543
-
-
Siegel, A.1
-
31
-
-
84860819837
-
Tabulation based 5-universal hashing and linear probing
-
SIAM, Philadelphia
-
M. Thorup and Y. Zhang, Tabulation based 5-universal hashing and linear probing, in Proceedings of the Twelfth Workshop on Algorithm Engineering and Experiments (ALENEX10), SIAM, Philadelphia, 2010, pp. 62-76.
-
Proceedings of the Twelfth Workshop on Algorithm Engineering and Experiments (ALENEX10
, vol.2010
, pp. 62-76
-
-
Thorup, M.1
Zhang, Y.2
-
33
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
DOI 10.1016/0022-0000(81)90033-7
-
M. N. Wegman and J. L. Carter, New hash functions and their use in authentication and set equality, J. Comput. System Sci., 22 (1981), pp. 265-279. (Pubitemid 12444638)
-
(1981)
Journal of Computer and System Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman Mark, N.1
Carter J.Lawrence2
|