Pre-PrintIn this paper an efficient open address hash function called exponential hashing is developed. The motivation for this hash function resulted from our ongoing efforts to apply dynamical systems theory to the study of hashing; however, the analysis conducted in this paper is primarily based on traditional number theory. Proofs of optimal table parameter choices are provided for a number of hash functions. We also demonstrate experimentally that exponential hashing essentially matches the performance of a widely-used optimal double hash function for uniform data distributions, and performs significantly better for nonuniform data distributions. We show that exponential hashing exhibits a higher integer Lyapunov exponent and entro...
Abstract. In this paper, we introduce new hash function design principles with variable output lengt...
The article deals with the assesment of hashing with open addressing under the assumption of uniform...
Hash functions are widely used in Cryptography, and hardware implementations of hash functions are o...
Pre-PrintIn this paper an efficient open addressing hash function called exponential hashing is deve...
This paper demonstrates how a broad collection of hash function families can be expressed as dynamic...
Abstract Hash functions are among the oldest and most widely used data structures in computer scienc...
AbstractIn this paper we analyze the performance of double hashing, a well-known hashing algorithm i...
Abstract. We consider open addressing hashing, and implement it by using the Robin Hood strategy, th...
A number of recent papers have considered the influence of modern computer memory hierarchies on the...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
Abstract—Hashing is critical for high performance computer architecture. Hashing is used extensively...
In this paper new families of strongly universal hash functions, or equivalently, authentication cod...
This paper gives an i, put independe, t average linear time algorithm for storage and retrieval on ...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
Abstract. In this paper, we introduce new hash function design principles with variable output lengt...
The article deals with the assesment of hashing with open addressing under the assumption of uniform...
Hash functions are widely used in Cryptography, and hardware implementations of hash functions are o...
Pre-PrintIn this paper an efficient open addressing hash function called exponential hashing is deve...
This paper demonstrates how a broad collection of hash function families can be expressed as dynamic...
Abstract Hash functions are among the oldest and most widely used data structures in computer scienc...
AbstractIn this paper we analyze the performance of double hashing, a well-known hashing algorithm i...
Abstract. We consider open addressing hashing, and implement it by using the Robin Hood strategy, th...
A number of recent papers have considered the influence of modern computer memory hierarchies on the...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
Abstract—Hashing is critical for high performance computer architecture. Hashing is used extensively...
In this paper new families of strongly universal hash functions, or equivalently, authentication cod...
This paper gives an i, put independe, t average linear time algorithm for storage and retrieval on ...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
Abstract. In this paper, we introduce new hash function design principles with variable output lengt...
The article deals with the assesment of hashing with open addressing under the assumption of uniform...
Hash functions are widely used in Cryptography, and hardware implementations of hash functions are o...