<--- Back to Details
First PageDocument Content
Hashing / Information retrieval / Information science / Search algorithms / Hash table / Open addressing / Linear probing / Quadratic probing / Hash function / Double hashing / Cryptographic hash function / Hash
Date: 2011-02-16 17:35:41
Hashing
Information retrieval
Information science
Search algorithms
Hash table
Open addressing
Linear probing
Quadratic probing
Hash function
Double hashing
Cryptographic hash function
Hash

6.006 Intro to Algorithms Recitation 05 February 16, 2011

Add to Reading List

Source URL: courses.csail.mit.edu

Download Document from Source Website

File Size: 125,75 KB

Share Document on Facebook

Similar Documents

Information retrieval / Information science / Hashing / Search algorithms / Universal hashing / Hash table / Linear probing / Hash function / Bloom filter / Cuckoo hashing / Randomness extractor / Cryptographic hash function

Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream∗ Michael Mitzenmacher† Salil Vadhan‡ School of Engineering & Applied Sciences Harvard University

DocID: 1r5sy - View Document

Information retrieval / Hashing / Information science / Search algorithms / Universal hashing / Hash table / Hash function / Linear probing / Cuckoo hashing / Bloom filter / Cryptographic hash function / Randomness extractor

Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream

DocID: 1qUBE - View Document

Hashing / Information retrieval / Information science / Search algorithms / Hash table / Hash function / Quadratic probing / Cryptographic hash function / Linear probing / Trie / Double hashing / Hash list

Introduction to Algorithms: 6.006 Massachusetts Institute of Technology Professors Erik Demaine, Piotr Indyk, and Manolis Kellis February 15, 2011 Problem Set 2 Solutions

DocID: 1qrSH - View Document

Information science / Information retrieval / Search algorithms / Hashing / Cuckoo hashing / Hash table / Perfect hash function / Hash function / Linear probing / Randomized algorithm / Big O notation / Double hashing

Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation Yuriy Arbitman∗ Moni Naor†

DocID: 1qrlz - View Document

Information science / Hashing / Information retrieval / Search algorithms / Computer programming / Bloom filter / Cuckoo hashing / Hash table / Hash function / Quotient filter / Hash / Linear probing

Cuckoo Filter: Practically Better Than Bloom Bin Fan, David G. Andersen, Michael Kaminsky† , Michael D. Mitzenmacher‡ Carnegie Mellon University, † Intel Labs, ‡ Harvard University {binfan,dga}@cs.cmu.edu, michae

DocID: 1pYMu - View Document