Journal articles on the topic 'Cuckcoo hashing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 30 journal articles for your research on the topic 'Cuckcoo hashing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Pagh, Rasmus, and Flemming Friche Rodler. "Cuckoo hashing." Journal of Algorithms 51, no. 2 (May 2004): 122–44. http://dx.doi.org/10.1016/j.jalgor.2003.12.002.
Full textJang, Rhong-ho, Chang-hun Jung, Keun-young Kim, Dae-hun Nyang, and Kyung-Hee Lee. "Enhancing RCC(Recyclable Counter With Confinement) with Cuckoo Hashing." Journal of Korean Institute of Communications and Information Sciences 41, no. 6 (June 30, 2016): 663–71. http://dx.doi.org/10.7840/kics.2016.41.6.663.
Full textMin, Dae-hong, Rhong-ho Jang, Dae-hun Nyang, and Kyung-hee Lee. "Sorting Cuckoo: Enhancing Lookup Performance of Cuckoo Hashing Using Insertion Sort." Journal of Korean Institute of Communications and Information Sciences 42, no. 3 (March 31, 2017): 566–76. http://dx.doi.org/10.7840/kics.2017.42.3.566.
Full textTran, Thinh Ngoc. "CPM: CUCKOO-BASED PATTERN MATCHING APPLIED FOR NIDS." Science and Technology Development Journal 14, no. 2 (June 30, 2011): 53–61. http://dx.doi.org/10.32508/stdj.v14i2.1909.
Full textDevroye, Luc, and Pat Morin. "Cuckoo hashing: Further analysis." Information Processing Letters 86, no. 4 (May 2003): 215–19. http://dx.doi.org/10.1016/s0020-0190(02)00500-8.
Full textKirsch, Adam, Michael Mitzenmacher, and Udi Wieder. "More Robust Hashing: Cuckoo Hashing with a Stash." SIAM Journal on Computing 39, no. 4 (January 2010): 1543–61. http://dx.doi.org/10.1137/080728743.
Full textJang, Saeyoung, Hayoung Byun, and Hyesook Lim. "Cuckoo Hashing with Three Hash Tables." Journal of the Institute of Electronics and Information Engineers 57, no. 8 (August 31, 2020): 91–99. http://dx.doi.org/10.5573/ieie.2020.57.8.91.
Full textFountoulakis, Nikolaos, and Konstantinos Panagiotou. "Sharp load thresholds for cuckoo hashing." Random Structures & Algorithms 41, no. 3 (May 12, 2012): 306–33. http://dx.doi.org/10.1002/rsa.20426.
Full textDrmota, Michael, and Reinhard Kutzelnigg. "A precise analysis of Cuckoo hashing." ACM Transactions on Algorithms 8, no. 2 (April 2012): 1–36. http://dx.doi.org/10.1145/2151171.2151174.
Full textBerman, Itay, Iftach Haitner, Ilan Komargodski, and Moni Naor. "Hardness-Preserving Reductions via Cuckoo Hashing." Journal of Cryptology 32, no. 2 (May 7, 2018): 361–92. http://dx.doi.org/10.1007/s00145-018-9293-0.
Full textFrieze, Alan, Páll Melsted, and Michael Mitzenmacher. "An Analysis of Random-Walk Cuckoo Hashing." SIAM Journal on Computing 40, no. 2 (January 2011): 291–308. http://dx.doi.org/10.1137/090770928.
Full textFountoulakis, Nikolaos, Konstantinos Panagiotou, and Angelika Steger. "On the Insertion Time of Cuckoo Hashing." SIAM Journal on Computing 42, no. 6 (January 2013): 2156–81. http://dx.doi.org/10.1137/100797503.
Full textPontarelli, S., P. Reviriego, and J. A. Maestro. "Efficient Flow Sampling With Back-Annotated Cuckoo Hashing." IEEE Communications Letters 18, no. 10 (October 2014): 1695–98. http://dx.doi.org/10.1109/lcomm.2014.2347959.
Full textFrieze, Alan, and Tony Johansson. "On the insertion time of random walk cuckoo hashing." Random Structures & Algorithms 54, no. 4 (September 21, 2018): 721–29. http://dx.doi.org/10.1002/rsa.20808.
Full textSeethalakshmi, D., and Dr G. M. Nasira. "Intrusion Detection and Defense Implementation (IDDI) in Cuckoo Hashing." IOSR Journal of Computer Engineering 19, no. 03 (June 2017): 49–52. http://dx.doi.org/10.9790/0661-1903064952.
Full textPontarelli, Salvatore, Pedro Reviriego, and Juan Antonio Maestro. "Parallel d-Pipeline: A Cuckoo Hashing Implementation for Increased Throughput." IEEE Transactions on Computers 65, no. 1 (January 1, 2016): 326–31. http://dx.doi.org/10.1109/tc.2015.2417524.
Full textKim, Euihyeok, and Min-Soo Kim. "Enhanced chained and Cuckoo hashing methods for multi-core CPUs." Cluster Computing 17, no. 3 (January 28, 2014): 665–80. http://dx.doi.org/10.1007/s10586-013-0343-y.
Full textSun, Yuanyuan, Yu Hua, Dan Feng, Ling Yang, Pengfei Zuo, Shunde Cao, and Yuncheng Guo. "A Collision-Mitigation Cuckoo Hashing Scheme for Large-Scale Storage Systems." IEEE Transactions on Parallel and Distributed Systems 28, no. 3 (March 1, 2017): 619–32. http://dx.doi.org/10.1109/tpds.2016.2594763.
Full textReviriego, P., S. Pontarelli, and J. A. Maestro. "Energy Efficient Exact Matching for Flow Identification with Cuckoo Affinity Hashing." IEEE Communications Letters 18, no. 5 (May 2014): 885–88. http://dx.doi.org/10.1109/lcomm.2014.040214.140506.
Full textLi, Hengjian, Jian Qiu, and Andrew Beng Jin Teoh. "Palmprint template protection scheme based on randomized cuckoo hashing and MinHash." Multimedia Tools and Applications 79, no. 17-18 (January 10, 2020): 11947–71. http://dx.doi.org/10.1007/s11042-019-08446-8.
Full textAumüller, Martin, Martin Dietzfelbinger, and Philipp Woelfel. "Explicit and Efficient Hash Families Suffice for Cuckoo Hashing with a Stash." Algorithmica 70, no. 3 (October 8, 2013): 428–56. http://dx.doi.org/10.1007/s00453-013-9840-x.
Full textFOUNTOULAKIS, NIKOLAOS, MEGHA KHOSLA, and KONSTANTINOS PANAGIOTOU. "The Multiple-Orientability Thresholds for Random Hypergraphs." Combinatorics, Probability and Computing 25, no. 6 (December 28, 2015): 870–908. http://dx.doi.org/10.1017/s0963548315000334.
Full textDeeds, Kyle, Brian Hentschel, and Stratos Idreos. "Stacked filters." Proceedings of the VLDB Endowment 14, no. 4 (December 2020): 600–612. http://dx.doi.org/10.14778/3436905.3436919.
Full textKutzelnigg, Reinhard. "An Improved Version of Cuckoo Hashing: Average Case Analysis of Construction Cost and Search Operations." Mathematics in Computer Science 3, no. 1 (November 27, 2009): 47–60. http://dx.doi.org/10.1007/s11786-009-0005-x.
Full textByun, Hayoung, and Hyesook Lim. "Comparison on Search Failure between Hash Tables and a Functional Bloom Filter." Applied Sciences 10, no. 15 (July 29, 2020): 5218. http://dx.doi.org/10.3390/app10155218.
Full textPagh, Rasmus, and Flemming Friche Rodler. "Cuckoo Hashing." BRICS Report Series 8, no. 32 (August 4, 2001). http://dx.doi.org/10.7146/brics.v8i32.21692.
Full textKutzelnigg, Reinhard. "Bipartite Random Graphs and Cuckoo Hashing." Discrete Mathematics & Theoretical Computer Science DMTCS Proceedings vol. AG,..., Proceedings (January 1, 2006). http://dx.doi.org/10.46298/dmtcs.3486.
Full text"High-speed data deduplication using parallelized cuckoo hashing." TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 26, no. 3 (May 30, 2018). http://dx.doi.org/10.3906/elk-1708-336.
Full textKutzelnigg, Reinhard. "A further analysis of Cuckoo Hashing with a Stash and Random Graphs of Excess r." Discrete Mathematics & Theoretical Computer Science Vol. 12 no. 3, Analysis of Algorithms (January 1, 2010). http://dx.doi.org/10.46298/dmtcs.495.
Full textZentgraf, Jens, and Sven Rahmann. "Fast lightweight accurate xenograft sorting." Algorithms for Molecular Biology 16, no. 1 (April 2, 2021). http://dx.doi.org/10.1186/s13015-021-00181-w.
Full text