The performance of hash-based Scheduling optimization algorithm for network flow cannot be bounded under the worst-case because of hash conflicts. To make up for the shortage of the above algorithm, a multiple-hash algorithm based on counting Hash Adapter, which stores the digest of flow needed to be adjusted in the Exact Stream Hash Adapter(ESHA) structure, is designed. Compared with the basic hash table, the integrity of the conversation is maintained and the query performance is improved due to the lower probability of conflict. An example is given as a validation of this method and the result data reflect the practical effect
The concept of error-tolerant hash function is introduced, which maps (as many as possible) data va...
In this paper we study parallel execution of multiple pipelined hash joins. Specifically, we deal wi...
Query processing in a distributed system requires the transmissions of data between computers in a n...
The performance of hash-based Scheduling optimization algorithm for network flow cannot be bounded u...
By investigating flow level characteristics of Internet traffic, we are able to trace the root of lo...
This paper has been withdrawed due to has major technical problems.---------------------------------...
Techniques are described herein that improve software network load balancers by enforcing optimal fa...
'Load Balancing' is a generic name given to a variety of algorithmic problems where a set of items n...
Abstract—Network applications often require large data stor-age resources, fast queries, and frequen...
. DDH extends the idea of dynamic hashing algorithms to distributed systems. DDH spreads data across...
Load balancing is a critical issue for the efficient operation of peer-to-peer networks. We give new...
Replication of resources is a key technique for improving Internet performance. Effective use of r...
Hash tables are a fundamental data structure in many network applications, including route lookups, ...
The administrative process carried out continuously produces large data. So the search process takes...
Hash routing reduces cache misses for a cluster of web proxies by eliminating the duplication of cac...
The concept of error-tolerant hash function is introduced, which maps (as many as possible) data va...
In this paper we study parallel execution of multiple pipelined hash joins. Specifically, we deal wi...
Query processing in a distributed system requires the transmissions of data between computers in a n...
The performance of hash-based Scheduling optimization algorithm for network flow cannot be bounded u...
By investigating flow level characteristics of Internet traffic, we are able to trace the root of lo...
This paper has been withdrawed due to has major technical problems.---------------------------------...
Techniques are described herein that improve software network load balancers by enforcing optimal fa...
'Load Balancing' is a generic name given to a variety of algorithmic problems where a set of items n...
Abstract—Network applications often require large data stor-age resources, fast queries, and frequen...
. DDH extends the idea of dynamic hashing algorithms to distributed systems. DDH spreads data across...
Load balancing is a critical issue for the efficient operation of peer-to-peer networks. We give new...
Replication of resources is a key technique for improving Internet performance. Effective use of r...
Hash tables are a fundamental data structure in many network applications, including route lookups, ...
The administrative process carried out continuously produces large data. So the search process takes...
Hash routing reduces cache misses for a cluster of web proxies by eliminating the duplication of cac...
The concept of error-tolerant hash function is introduced, which maps (as many as possible) data va...
In this paper we study parallel execution of multiple pipelined hash joins. Specifically, we deal wi...
Query processing in a distributed system requires the transmissions of data between computers in a n...