First Page | Document Content | |
---|---|---|
![]() Date: 2014-07-10 21:19:43Information science Artificial intelligence Error detection and correction Hash functions Hash table Cryptographic hash functions Trie Linked list Perfect hash function Hashing Search algorithms Information retrieval | Add to Reading List |
![]() | SILT: A Memory-Efficient, High-Performance Key-Value StoreDocID: 1qLCY - View Document |
![]() | Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation Yuriy Arbitman∗ Moni Naor†DocID: 1qrlz - View Document |
![]() | Microsoft Word - NLA-monographdocDocID: 1pwXw - View Document |
![]() | Optimal Hashing Schemes for Entity Matching Nilesh Dalvi Vibhor Rastogi Anirban DasguptaDocID: 1lrsK - View Document |
![]() | Cache-Oblivious Hashing∗ Rasmus Pagh IT University of Copenhagen Copenhagen, DenmarkDocID: 1aNzo - View Document |