-
2
-
-
0016382963
-
Ordered hash tables
-
Amble, O., and Knuth, D. E. 1974. Ordered hash tables. Comput. J. 17, 2, 135-142.
-
(1974)
Comput. J.
, vol.17
, Issue.2
, pp. 135-142
-
-
Amble, O.1
Knuth, D.E.2
-
4
-
-
0015587773
-
Reducing the retrieval time of scatter storage techniques
-
Brent, R. 1973. Reducing the retrieval time of scatter storage techniques. Commun. ACM 16, 2, 105-109.
-
(1973)
Commun. ACM
, vol.16
, Issue.2
, pp. 105-109
-
-
Brent, R.1
-
5
-
-
0347836114
-
Two counting problems solved via string encodings
-
A. Apostolico and Z. Galil Eds. NATO Advance Science Institute Series. Series F: Computer and System Sciences. Springer-Verlag, New York
-
Broder, A. 1985. Two counting problems solved via string encodings. In Combinatorial Algorithms on Words. A. Apostolico and Z. Galil, Eds. Vol. 12 of NATO Advance Science Institute Series. Series F: Computer and System Sciences. Springer-Verlag, New York. 229-240.
-
(1985)
Combinatorial Algorithms on Words.
, vol.12
, pp. 229-240
-
-
Broder, A.1
-
7
-
-
0345944769
-
Robin Hood hashing
-
Ph.D. dissertation, Computer Science Department, University of Waterloo
-
CELIS, P. 1986. Robin Hood hashing. Ph.D. dissertation, Computer Science Department, University of Waterloo. Tech. Rep. CS-86-14.
-
(1986)
Tech. Rep. CS-86-14.
-
-
CELIS, P.1
-
8
-
-
0022250374
-
Robin Hood hashing
-
IEEE Computer Society Press, Los Alamitos, CA
-
Celis, P., Larson, P.-A., and Munro, J. 1985. Robin Hood hashing. In Proceedings of the 26th IEEE Sympusium on the Foundations of Computer Science. IEEE Computer Society Press, Los Alamitos, CA, 281-288.
-
(1985)
Proceedings of the 26th IEEE Sympusium on the Foundations of Computer Science.
, pp. 281-288
-
-
Celis, P.1
Larson, P.-A.2
Munro, J.3
-
9
-
-
0018517078
-
Extendible hashing-a fast access method for dynamic files
-
Fagin, R., Nievergelt, J., Pippenger, N., and Strong, H. R. 1979. Extendible hashing-a fast access method for dynamic files. ACM Trans. Datab. Syst. 4, 3, 315-344.
-
(1979)
ACM Trans. Datab. Syst.
, vol.4
, Issue.3
, pp. 315-344
-
-
Fagin, R.1
Nievergelt, J.2
Pippenger, N.3
Strong, H.R.4
-
10
-
-
0029326388
-
Mellin transforms and asymptotics: Harmonic sums
-
Flajolet, P., Gourdon, X., and Dumas, P. 1995a. Mellin transforms and asymptotics: Harmonic sums. Theoret. Comput. Sci. 144, 1-2, 3-58.
-
(1995)
Theoret. Comput. Sci.
, vol.144
, Issue.1-2
, pp. 3-58
-
-
Flajolet, P.1
Gourdon, X.2
Dumas, P.3
-
11
-
-
0004476491
-
On Ramanujan's function
-
Flajolet, p., Grabner, p., Kirschenhofer, p., and Prodinger, H. 1995b. On Ramanujan's function. J. Comput. Appl. Math. 58, 1, 103-116.
-
(1995)
J. Comput. Appl. Math.
, vol.58
, Issue.1
, pp. 103-116
-
-
Flajolet, p.1
Grabner, p.2
Kirschenhofer, p.3
Prodinger, H.4
-
12
-
-
84915939958
-
Random mapping statistics Advances in Cryptology
-
(Houtalen, Belgium, Apr.), J.-J. Quisquater and J. Vandewalle Eds. Lecture Notes in Computer Science Springer-Verlag, New York
-
Flajolet, P., and Odlyzko, A. M. 1990a. Random mapping statistics. In Advances in Cryptology. Proceedings of EUROCRYPT 89 (Houtalen, Belgium, Apr.), J.-J. Quisquater and J. Vandewalle, Eds. Lecture Notes in Computer Science Vol. 434. Springer-Verlag, New York, 329-354.
-
(1990)
Proceedings of EUROCRYPT 89
, vol.434
, pp. 329-354
-
-
Flajolet, P.1
Odlyzko, A.M.2
-
13
-
-
0000640693
-
Singularity analysis of generating functions
-
Flajolet, P., and Odlyzko, A. M. 1990b. Singularity analysis of generating functions. SIAM J. Disc. Math. 3, 2, 216-240.
-
(1990)
SIAM J. Disc. Math.
, vol.3
, Issue.2
, pp. 216-240
-
-
Flajolet, P.1
Odlyzko, A.M.2
-
14
-
-
19544388116
-
On the analysis of linear probing hashing
-
Flajolet, P., Poblete, P., and Viola, A. 1998. On the analysis of linear probing hashing. Algorithmica 22, 4, 490-515.
-
(1998)
Algorithmica
, vol.22
, Issue.4
, pp. 490-515
-
-
Flajolet, P.1
Poblete, P.2
Viola, A.3
-
15
-
-
0004323528
-
Analytic combinatorics. Book in preparation
-
A preprint can be found http://pauillac.inria.fr/algo/flajolet/Publications/books.html.
-
Flajolet, P., and Sedgewick, R. 2005. Analytic combinatorics. Book in preparation. A preprint can be found in http://pauillac.inria.fr/algo/flajolet/Publications/books.html.
-
(2005)
-
-
Flajolet, P.1
Sedgewick, R.2
-
16
-
-
0346575965
-
Efficient ordering of hash tables
-
Gönnet, G., and Munro, J. 1979. Efficient ordering of hash tables. SIAM. J. Comput. 8, 3, 463-478.
-
(1979)
SIAM. J. Comput.
, vol.8
, Issue.3
, pp. 463-478
-
-
Gönnet, G.1
Munro, J.2
-
17
-
-
0039936094
-
The analysis of linear probing sort by the use of a new mathematical transform
-
Gönnet, G., and Munro, J. 1984. The analysis of linear probing sort by the use of a new mathematical transform. J. Algorithms 5, 451-470.
-
(1984)
J. Algorithms
, vol.5
, pp. 451-470
-
-
Gönnet, G.1
Munro, J.2
-
18
-
-
0003915740
-
-
Second Ed. Addison-Wesley, Reading, MA
-
Gonnet, G. H., and Baeza-Yates, R. 1991. Handbook of Algorithms and Data Structures: in Pascal and C, Second Ed. Addison-Wesley, Reading, MA.
-
(1991)
Handbook of Algorithms and Data Structures: in Pascal and C
-
-
Gonnet, G.H.1
Baeza-Yates, R.2
-
20
-
-
0004155526
-
-
Addison-Wesley, Reading, MA
-
Graham, R. L., Knuth, D. E., and Patashnik, O. 1989. Concrete Mathematics. Addison-Wesley, Reading, MA.
-
(1989)
Concrete Mathematics.
-
-
Graham, R.L.1
Knuth, D.E.2
Patashnik, O.3
-
21
-
-
84941436061
-
Trie partitioning process: Limiting distributions
-
P. Franchi-Zanetacchi, Ed. In Proceedings of the 11th Colloquium on Trees in Algebra and Programming (Nice, France, Mar.). Lecture Notes in Computer Science Springer-Verlag, New York
-
Jacquet, P., and Regnier, M. 1986. Trie partitioning process: Limiting distributions. In CAAP'86, P. Franchi-Zanetacchi, Ed. In Proceedings of the 11th Colloquium on Trees in Algebra and Programming (Nice, France, Mar.). Lecture Notes in Computer Science Vol. 214. Springer-Verlag, New York, 196-210.
-
(1986)
CAAP'86
, vol.214
, pp. 196-210
-
-
Jacquet, P.1
Regnier, M.2
-
22
-
-
85023626599
-
Individual displacements for linear probing hashing with different insertion policies
-
Oct.
-
Janson, S. 2005. Individual displacements for linear probing hashing with different insertion policies. ACM Trans. Algorithms 1, 2 (Oct.), 177-213.
-
(2005)
ACM Trans. Algorithms
, vol.1
, Issue.2
, pp. 177-213
-
-
Janson, S.1
-
23
-
-
85024255974
-
1963 With annotation “My first analysis of an algorithm, originally done during Summer 1962 in Madison
-
Unpublished memorandum. (Memo dated July 22
-
Knuth, D. E. 1963. Notes on “open” addressing. Unpublished memorandum. (Memo dated July 22, 1963 With annotation “My first analysis of an algorithm, originally done during Summer 1962 in Madison”.
-
(1963)
Notes on “open” addressing
-
-
Knuth, D.E.1
-
24
-
-
0004502641
-
Analysis of optimum caching
-
Knuth, D. E. 1985. Analysis of optimum caching. J. Algorithms 6, 181-199.
-
(1985)
J. Algorithms
, vol.6
, pp. 181-199
-
-
Knuth, D.E.1
-
25
-
-
0003657590
-
-
Fundamental Algorithms. Addison-Wesley, Reading, MA
-
Knuth, D. E. 1997. The Art of Computer Programming. Vol. 1: Fundamental Algorithms. Addison-Wesley, Reading, MA.
-
(1997)
The Art of Computer Programming.
, vol.1
-
-
Knuth, D.E.1
-
26
-
-
0003657590
-
-
Sorting andSearching. Addison-Wesley, Reading, MA
-
Knuth, D. E. 1998a. The Art of Computer Programming. Vol. 3: Sorting andSearching. Addison-Wesley, Reading, MA.
-
(1998)
The Art of Computer Programming.
, vol.3
-
-
Knuth, D.E.1
-
27
-
-
0003657590
-
-
Seminumerical Algorithms. Addison-Wesley, Reading, MA
-
Knuth, D. E. 1998b. The Art of Computer Programming. Vol. 2: Seminumerical Algorithms. Addison-Wesley, Reading, MA.
-
(1998)
The Art of Computer Programming.
, vol.2
-
-
Knuth, D.E.1
-
28
-
-
19544364512
-
Linear probing and graphs
-
Knuth, D. E. 1998c. Linear probing and graphs. Algorithmica 22, 4, 561-568.
-
(1998)
Algorithmica
, vol.22
, Issue.4
, pp. 561-568
-
-
Knuth, D.E.1
-
30
-
-
0000789133
-
The expected linearity of a simple equivalence algorithm
-
Knuth, D. E., and Schönhage, A. 1978. The expected linearity of a simple equivalence algorithm. Theoret. Comput. Sci. 6, 281-315.
-
(1978)
Theoret. Comput. Sci.
, vol.6
, pp. 281-315
-
-
Knuth, D.E.1
Schönhage, A.2
-
31
-
-
0001432804
-
An occupancy discipline and applications
-
Könheim, A. G., and Weiss, B. 1966. An occupancy discipline and applications. SIAM J. Appl. Math. 6, 14, 1266-1274.
-
(1966)
SIAM J. Appl. Math.
, vol.6
, Issue.14
, pp. 1266-1274
-
-
Könheim, A.G.1
Weiss, B.2
-
32
-
-
84976689948
-
Analysis of uniform hashing
-
Larson, P.-A. 1983. Analysis of uniform hashing. JACM 30, 4, 805-819.
-
(1983)
JACM
, vol.30
, Issue.4
, pp. 805-819
-
-
Larson, P.-A.1
-
33
-
-
0041049688
-
Counting labelled trees
-
Canadian Mathematical Congress
-
Moon, J. W. 1970. Counting labelled trees. In Canadian Mathematical Monographs. Vol. 1. Canadian Mathematical Congress.
-
(1970)
Canadian Mathematical Monographs.
, vol.1
-
-
Moon, J.W.1
-
34
-
-
0000278117
-
Asymptotic enumeration methods
-
M. G. R. Graham and L. Lovasz Eds. Vol. II. Elsevier, Amsterdam, the Netherlands
-
Odlyzko, A. M. 1995. Asymptotic enumeration methods. In Handbook of Combinatorics, M. G. R. Graham and L. Lovasz, Eds. Vol. II. Elsevier, Amsterdam, the Netherlands, 1063-1229.
-
(1995)
Handbook of Combinatorics
, pp. 1063-1229
-
-
Odlyzko, A.M.1
-
35
-
-
0009861027
-
Addressing for random-access storage
-
Peterson, W. W. 1957. Addressing for random-access storage. IBM J. Res. Devel. 1, 2, 130-146.
-
(1957)
IBM J. Res. Devel.
, vol.1
, Issue.2
, pp. 130-146
-
-
Peterson, W.W.1
-
36
-
-
0022796304
-
Approximating functions by their Poisson transform
-
Poblete, P. 1986. Approximating functions by their Poisson transform. Inf. Proc. Lett. 23, 127-130.
-
(1986)
Inf. Proc. Lett.
, vol.23
, pp. 127-130
-
-
Poblete, P.1
-
37
-
-
38249021763
-
Last-come-first-served hashing
-
Poblete, P., and Munro, J. 1989. Last-come-first-served hashing. J. Algorithms 10, 228-248.
-
(1989)
J. Algorithms
, vol.10
, pp. 228-248
-
-
Poblete, P.1
Munro, J.2
-
38
-
-
0031541995
-
The Diagonal Poisson Transform and its application to the analysis of a hashing scheme
-
Poblete, P., Viola, A., and Munro, J. 1997. The Diagonal Poisson Transform and its application to the analysis of a hashing scheme. Rand. Struct. Algorithms 10, 2, 221-255.
-
(1997)
Rand. Struct. Algorithms
, vol.10
, Issue.2
, pp. 221-255
-
-
Poblete, P.1
Viola, A.2
Munro, J.3
-
39
-
-
0003821547
-
-
Third ed. Addison-Wesley, Reading, MA
-
Sedgewick, R. 1997. Algorithms in C, Parts 1-4: Fundamentals, Data Structures, Sorting, Searching, Third ed. Addison-Wesley, Reading, MA.
-
(1997)
Algorithms in C, Parts 1-4: Fundamentals, Data Structures, Sorting, Searching
-
-
Sedgewick, R.1
-
41
-
-
0345944765
-
Analysis of hashing algorithms and a new mathematical transform
-
Ph.D. thesis, Computer Science Department, University of Waterloo Tech. Rep. CS-95-50
-
Viola, A. 1995. Analysis of hashing algorithms and a new mathematical transform. Ph.D. thesis, Computer Science Department, University of Waterloo. Tech. Rep. CS-95-50.
-
(1995)
-
-
Viola, A.1
|