1 Hash Tables
نویسنده
چکیده
Pat Morin Carleton University 1.
منابع مشابه
Cascade hash tables: a series of multilevel double hashing schemes with O(1) worst case lookup time
In this paper, the author proposes a series of multilevel double hashing schemes called cascade hash tables. They use several levels of hash tables. In each table, we use the common double hashing scheme. Higher level hash tables work as fail-safes of lower level hash tables. By this strategy, it could e ectively reduce collisions in hash insertion. Thus it gains a constant worst case lookup ti...
متن کاملAspect Oriented UML to ECORE Model Transformation
With the emerging concept of model transformation, information can be extracted from one or more source models to produce the target models. The conversion of these models can be done automatically with specific transformation languages. This conversion requires mapping between both models with the help of dynamic hash tables. Hash tables store reference links between the elements of the source...
متن کاملThe Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases
In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits. These functions are used in different levels of hash tables that are coded in Java Programming Language and a quite number of data records serve as primary data for testing the performances. The re...
متن کاملHash Tables in Logic Programming
The paper discusses diierent aspects of hash tables as a data structure in a Horn clause language such as Prolog, e.g., semantics, implementation and applications. Hash tables are a new concept in Prolog since they can not be eeciently implemented in the language itself. We give informal semantics for hash tables as partial functions on logical terms. We are careful to ensure that we can repres...
متن کاملCuckoo++ Hash Tables: High-Performance Hash Tables for Networking Applications
Hash tables are an essential data-structure for numerous networking applications (e.g., connection tracking, rewalls, network address translators). Among these, cuckoo hash tables provide excellent performance by allowing lookups to be processed with very few memory accesses (2 to 3 per lookup). Yet, for large tables, cuckoo hash tables remain memory bound and each memory access impacts perform...
متن کاملInterestingness measures for association rules: Combination between lattice and hash tables
There are many methods which have been developed for improving the time of mining frequent itemsets. However, the time for generating association rules were not put in deep research. In reality, if a database contains many frequent itemsets (from thousands up to millions), the time for generating association rules is more longer than the time for mining frequent itemsets. In this paper, we pres...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014