Zobrazeno 1 - 10
of 64
pro vyhledávání: '"Tabulation hashing"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Kevin A. Wortman, Shekhar Palit
Publikováno v:
CCWC
We present an algorithm for generating perfect tabulation hashing functions by reduction to Boolean satisfaction (SAT). Tabulation hashing is a high-performance family of hash functions for hash tables that involves computing the XOR of random lookup
Autor:
Peter M. R. Rasmussen, Mikkel Thorup, Mathias Bæk Tejs Knudsen, Anders Aamand, Jakob Bæk Tejs Knudsen
Publikováno v:
Aamand, A, Knudsen, J B T, Knudsen, M B T, Rasmussen, P M R & Thorup, M 2020, Fast hashing with strong concentration bounds . in K Makarychev, Y Makarychev, M Tulsiani, G Kamath & J Chuzhoy (eds), STOC 2020-Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing . Association for Computing Machinery, Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 1265-1278, 52nd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2020, Chicago, United States, 22/06/2020 . https://doi.org/10.1145/3357713.3384259
STOC
STOC
Previous work on tabulation hashing by Patrascu and Thorup from STOC'11 on simple tabulation and from SODA'13 on twisted tabulation offered Chernoff-style concentration bounds on hash based sums, e.g., the number of balls/keys hashing to a given bin,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b32f2d2ca37fd4e9fbcbde8c0a5da07d
http://arxiv.org/abs/1905.00369
http://arxiv.org/abs/1905.00369
Autor:
Pic Sonia, Surender Kumar Grewal
Publikováno v:
International Journal of Computer Network and Information Security. 8:44-51
Publikováno v:
Multimedia Tools and Applications. 76:2441-2466
Hashing is a binary-code encoding method which tries to preserve the neighborhood structures in the original feature space, in order to realize efficient approximate nearest neighbor search in large-scale databases. Existing hashing methods usually a
Publikováno v:
Proceedings of the VLDB Endowment. 9:96-107
Hashing is a solved problem. It allows us to get constant time access for lookups. Hashing is also simple. It is safe to use an arbitrary method as a black box and expect good performance, and optimizations to hashing can only improve it by a negligi
Autor:
Keon Myung Lee
Publikováno v:
Applied Mechanics and Materials. :804-807
Locality-sensitive hashing is a technique to allow approximate nearest search for large volume of data in a fast manner. Binary code locality-sensitive hashing distributes a data set into buckets labeled with binary code, where binary codes are deter
Publikováno v:
IEEE transactions on neural networks and learning systems. 29(1)
Hashing-based semantic similarity search is becoming increasingly important for building large-scale content-based retrieval system. The state-of-the-art supervised hashing techniques use flexible two-step strategy to learn hash functions. The first
Autor:
Jürgen Bierbrauer
Publikováno v:
Introduction to Coding Theory ISBN: 9781315371993
Introduction to Coding Theory
Introduction to Coding Theory ISBN: 9781315273082
Introduction to Coding Theory
Introduction to Coding Theory ISBN: 9781315273082
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4dbe8c40da7cbcb3b063c92b5084d297
https://doi.org/10.1201/9781315371993-7
https://doi.org/10.1201/9781315371993-7
Autor:
Dongvu Tonien, Reihaneh Safavi-Naini
Publikováno v:
Discrete Mathematics, Algorithms and Applications. :587-607
Traditional data authentication systems are sensitive to single bit changes and so are unsuitable for message spaces that are naturally "fuzzy" where "similar" messages are considered "the same" or indistinguishable. In this paper, we study unconditi