Pre-PrintIn this paper an efficient open addressing hash function called exponential hashing is developed using concepts from dynamical systems theory and number theory. A comparison of exponential hashing versus a widely used double hash function is performed using an analysis based on Lyapunov exponents and entropy. Proofs of optimal table parameter choices are provided for a number of hash functions. We also demonstrate experimentally that exponential hashing nearly matches the performance of an optimal double hash function for uniform data distributions and performs significantly better for nonuniform data distributions. We show that exponential hashing exhibits a higher integer Lyapunov exponent and entropy than double hashing for ...
A number of recent papers have considered the influence of modern computer memory hierarchies on the...
We generalize Cuckoo Hashing \cite{PagRod01} to \emph{$d$-ary Cuckoo Hashing} and show how this yiel...
Abstract—This paper presents a compact and effective chaos-based keyed hash function implemented by ...
Pre-PrintIn this paper an efficient open address hash function called exponential hashing is develop...
In this paper an efficient open addressing hash function called exponential hashing is developed usi...
This paper demonstrates how a broad collection of hash function families can be expressed as dynamic...
Abstract Hash functions are among the oldest and most widely used data structures in computer scienc...
AbstractIn this paper we analyze the performance of double hashing, a well-known hashing algorithm i...
Abstract. We consider open addressing hashing, and implement it by using the Robin Hood strategy, th...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
Information security, reliability of data transfer are today an important component of the globaliza...
Information security, reliability of data transfer are today an important component of the globaliza...
This paper gives an i, put independe, t average linear time algorithm for storage and retrieval on ...
In this paper new families of strongly universal hash functions, or equivalently, authentication cod...
A number of recent papers have considered the influence of modern computer memory hierarchies on the...
We generalize Cuckoo Hashing \cite{PagRod01} to \emph{$d$-ary Cuckoo Hashing} and show how this yiel...
Abstract—This paper presents a compact and effective chaos-based keyed hash function implemented by ...
Pre-PrintIn this paper an efficient open address hash function called exponential hashing is develop...
In this paper an efficient open addressing hash function called exponential hashing is developed usi...
This paper demonstrates how a broad collection of hash function families can be expressed as dynamic...
Abstract Hash functions are among the oldest and most widely used data structures in computer scienc...
AbstractIn this paper we analyze the performance of double hashing, a well-known hashing algorithm i...
Abstract. We consider open addressing hashing, and implement it by using the Robin Hood strategy, th...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
Information security, reliability of data transfer are today an important component of the globaliza...
Information security, reliability of data transfer are today an important component of the globaliza...
This paper gives an i, put independe, t average linear time algorithm for storage and retrieval on ...
In this paper new families of strongly universal hash functions, or equivalently, authentication cod...
A number of recent papers have considered the influence of modern computer memory hierarchies on the...
We generalize Cuckoo Hashing \cite{PagRod01} to \emph{$d$-ary Cuckoo Hashing} and show how this yiel...
Abstract—This paper presents a compact and effective chaos-based keyed hash function implemented by ...