Hash table

Results: 1003



#Item
631Cache / Cache algorithms / Linked list / Hash table / Binomial heap / Lookup table / Trie / Heap / Binary heap / Computing / Computer programming / Least frequently used

An O(1) algorithm for implementing the LFU cache eviction scheme Prof. Ketan Shah Anirban Mitra

Add to Reading List

Source URL: dhruvbird.com

Language: English - Date: 2011-04-04 04:36:14
632Concurrent computing / Software / File sharing / Cross-platform software / Distributed hash table / Gnutella / Peer-to-peer / Kademlia / GiFT / File sharing networks / Computing / Distributed data storage

Making Gnutella-like P2P Systems Scalable Yatin Chawathe Sylvia Ratnasamy Lee Breslau

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2003-07-24 11:26:27
633Information retrieval / Hash function / Locality-sensitive hashing / K-nearest neighbor algorithm / Nearest neighbor search / Hash table / Cryptographic hash function / Machine learning / Search algorithms / Information science / Artificial intelligence

In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June[removed]Fast Image Search for Learned Metrics Prateek Jain Brian Kulis Kristen Grauman Department of Computer Sciences Universi

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2008-08-10 18:06:43
634Trusted computing / Cryptography / Hashing / Monolithic kernels / Next-Generation Secure Computing Base / Trusted Platform Module / Procfs / Kernel / Hash table / Computer architecture / Computing / Computer security

Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

Add to Reading List

Source URL: sigops.org

Language: English - Date: 2011-09-20 03:37:00
635Distributed hash table / Content addressable network / Tapestry / Peer-to-peer / Pastry / BATON Overlay / Distributed data storage / Computing / Chord

Analysis of the Evolution of Peer-to-Peer Systems David Liben-Nowell, Hari Balakrishnan, David Karger Laboratory for Computer Science Massachusetts Institute of Technology 200 Technology Square Cambridge, MA[removed]USA

Add to Reading List

Source URL: nms.lcs.mit.edu

Language: English - Date: 2004-10-06 14:57:07
636Hash table / Sequence container / Lookup table / Trie / Memory / In-place algorithm / Extensible Storage Engine / Computing / Computer programming / Software optimization

Deterministic History-Independent Strategies for Storing Information on Write-Once Memories Tal Moran∗ Moni Naor∗†

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2009-05-01 08:47:26
637Gnutella / Peer-to-peer / Tapestry / Chord / Breadth-first search / Privacy in file sharing networks / Distributed hash table / File sharing networks / Distributed data storage / Computing

Improving Search in Peer-to-Peer Networks Beverly Yang Hector Garcia-Molina fbyang, [removed] Computer Science Department, Stanford University

Add to Reading List

Source URL: infolab.stanford.edu

Language: English - Date: 2002-06-05 19:59:19
638Hashing / Quadratic probing / Software engineering / Associative arrays / Hash table / Sequence container / Hash function / Set / Lookup table / Computing / Search algorithms / Computer programming

Microsoft Word - Hash.h.docx

Add to Reading List

Source URL: digital.cs.usu.edu

Language: English - Date: 2010-10-05 14:53:24
639Information retrieval / Artificial intelligence / Hash table / Hash function / Heap / Big O notation / Linear probing / Search algorithms / Hashing / Information science

Introduction to Algorithms: 6.006 Massachusetts Institute of Technology Professors Srini Devadas and Erik Demaine March 7, 2008 Handout 6

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2008-03-07 01:43:43
640File sharing networks / Distributed data storage / File sharing / Intellectual property law / Peer-to-peer computing / Peer-to-peer / Social peer-to-peer processes / Distributed hash table / Scalability / Concurrent computing / Computing / Distributed computing

On the Topologies Formed by Selfish Peers Thomas Moscibroda, Stefan Schmid, Roger Wattenhofer {moscitho, schmiste, wattenhofer}@tik.ee.ethz.ch Computer Engineering and Networks Laboratory, ETH Zurich, Switzerland ABSTRAC

Add to Reading List

Source URL: drops.dagstuhl.de

Language: English - Date: 2006-11-30 05:48:01
UPDATE