Showing 1 - 8 results of 8 for search '"cuckoo hashing"', query time: 0.25s Refine Results
  1. 1

    Bipartite Random Graphs and Cuckoo Hashing by Reinhard Kutzelnigg

    Published 2006-01-01
    “…The aim of this paper is to extend the analysis of Cuckoo Hashing of Devroye and Morin in 2003. In particular we make several asymptotic results much more precise. …”
    Get full text
    Article
  2. 2

    Hardness-Preserving Reductions via Cuckoo Hashing by Berman, Itay, Haitner, Iftach, Komargodski, Ilan, Naor, Moni

    Published 2021
    “…In this work, we show how to go beyond the aforementioned birthday attack barrier by replacing the above simple hashing approach with a variant of cuckoo hashing, a hashing paradigm that resolves collisions in a table by using two hash functions and two tables, cleverly assigning each element to one of the two tables. …”
    Get full text
    Article
  3. 3
  4. 4

    Analysing the Performance of GPU Hash Tables for State Space Exploration by Nathan Cassee, Anton Wijs

    Published 2017-12-01
    “…We conclude that Cuckoo hashing is three times faster than GPUexplore hashing for random data, and that Cuckoo hashing is five to nine times faster for non-random data. …”
    Get full text
    Article
  5. 5

    Detection and Mitigation of SYN Flooding Attacks through SYN/ACK Packets and Black/White Lists by Chun-Hao Yang, Jhen-Ping Wu, Fang-Yi Lee, Ting-Yu Lin, Meng-Hsun Tsai

    Published 2023-04-01
    “…We combine those modules, which have evolved from the cuckoo hashing method and innovative whitelist, to get better performance compared to current methods Our approach reduces the traffic through the switch and improves detection accuracy, also the required register size is reduced by half for the same accuracy.…”
    Get full text
    Article
  6. 6

    CoDi$: Randomized Caches Through Confusion and Diffusion by Luis Fiolhais, Manuel Goulao, Leonel Sousa

    Published 2023-01-01
    “…CoDi<inline-formula> <tex-math notation="LaTeX">$\$ $ </tex-math></inline-formula> is able to evict any cached address by allowing addresses to be displaced in two levels of freedom, through hopscotch (local state) and cuckoo hashing (global state), without increasing the hit latency. …”
    Get full text
    Article
  7. 7

    IcebergHT: High Performance Hash Tables Through Stability and Low Associativity by Pandey, Prashant, Bender, Michael A., Conway, Alex, Farach-Colton, Martin, Kuszmaul, William, Tagliavini, Guido, Johnson, Rob

    Published 2023
    “…In contrast, existing hash-tables either modify numerous cache lines during insertions (e.g. cuckoo hashing), access numerous cache lines during queries (e.g. linear probing), or waste space (e.g. chaining). …”
    Get full text
    Article
  8. 8

    Comparison on Search Failure between Hash Tables and a Functional Bloom Filter by Hayoung Byun, Hyesook Lim

    Published 2020-07-01
    “…In search failure rates, we theoretically compare the FBF with hash-based data structures, such as multi-hash table, cuckoo hash table, and <i>d</i>-left hash table. We also provide simulation results to prove the validity of our theoretical results. …”
    Get full text
    Article