Search

Your search keyword '"Cuckoo hashing"' showing total 332 results

Search Constraints

Start Over You searched for: Descriptor "Cuckoo hashing" Remove constraint Descriptor: "Cuckoo hashing"
332 results on '"Cuckoo hashing"'

Search Results

1. Compact Parallel Hash Tables on the GPU

2. Popularity Cuckoo Filter: Always Keeping Popular Items in Mind

3. CostCounter: A Better Method for Collision Mitigation in Cuckoo Hashing.

4. Load Thresholds for Cuckoo Hashing with Overlapping Blocks.

5. Accelerated Parallel Hybrid GPU/CPU Hash Table Queries with String Keys

6. Linear Complexity Private Set Intersection for Secure Two-Party Protocols

7. Fast lightweight accurate xenograft sorting

8. Data De-duplication Using Cuckoo Hashing in Cloud Storage

9. Data Deduplication and Fine-Grained Auditing on Big Data in Cloud Storage

10. Fast lightweight accurate xenograft sorting.

11. Adaptive Cuckoo Filters.

13. Millions of Low-latency State Insertions on ASIC Switches

14. A Faster Algorithm for Cuckoo Insertion and Bipartite Matching in Large Graphs.

15. Dynamic Space Efficient Hashing.

16. On the insertion time of random walk cuckoo hashing.

17. Hardness-Preserving Reductions via Cuckoo Hashing.

18. An Analysis of Random-Walk Cuckoo Hashing

19. Weaknesses of Cuckoo Hashing with a Simple Universal Hash Class: The Case of Large Universes

20. KCOSS: an ultra-fast k-mer counter for assembled genome analysis

22. FPGA-Based Cuckoo Hashing for Pattern Matching in NIDS/NIPS

23. Fast Gapped k-mer Counting with Subdivided Multi-Way Bucketed Cuckoo Hash Tables

24. GPU-accelerated SPH fluids surface reconstruction using two-level spatial uniform grids.

25. A Collision-Mitigation Cuckoo Hashing Scheme for Large-Scale Storage Systems.

27. Insertion Time of Random Walk Cuckoo Hashing below the Peeling Threshold

28. Fast Gapped k-mer Counting with Subdivided Multi-Way Bucketed Cuckoo Hash Tables

29. Palmprint template protection scheme based on randomized cuckoo hashing and MinHash

30. Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications

31. A protocol for detecting missing target tags in RFID systems

32. RHKV: An RDMA and HTM friendly key–value store for data-intensive computing

33. Incremental Edge Orientation in Forests

34. Supporting Insertion in Encrypted Multi-Maps with Volume Hiding

35. Incremental Edge Orientation in Forests

36. Parallel d-Pipeline: A Cuckoo Hashing Implementation for Increased Throughput.

37. Towards Optimal Degree Distributions for Left-Perfect Matchings in Random Bipartite Graphs.

38. High-Throughput Cuckoo Hashing Accelerator on FPGA Using One-Step BFS

39. Hardness-Preserving Reductions via Cuckoo Hashing

40. DyCuckoo: Dynamic Hash Tables on GPUs

41. A Cuckoo Hashing Variant with Improved Memory Utilization and Insertion Time.

42. A FPGA-based deep packet inspection engine for Network Intrusion Detection System.

43. Design and Evaluation of Cascading Cuckoo Filters for Zero-False-Positive Membership Services

44. Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps

46. Explicit and Efficient Hash Families Suffice for Cuckoo Hashing with a Stash.

47. OEBSA-Sketch: a Combination of Sketch and Hash Table for the Measurement of Stream Data

48. Efficient Flow Sampling With Back-Annotated Cuckoo Hashing.

49. Enhanced chained and Cuckoo hashing methods for multi-core CPUs.

50. Cuckoo Prefix: A Hash Set for Compressed IP Blocklists

Catalog

Books, media, physical & digital resources