Hash table

Results: 1003



#Item
141File sharing / BitTorrent / Virtualization / Peer-to-peer / Node / Computer cluster / Distributed computing / Scalability / Distributed hash table / Operating-system-level virtualization

Lightweight Emulation to Study Peer-to-Peer Systems ∗ Lucas Nussbaum and Olivier Richard Laboratoire Informatique et Distribution - IMAG

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2011-10-12 09:35:39
142Concurrency control / Information science / Computing / Information retrieval / Transaction processing / Hashing / Search algorithms / Error detection and correction / Software transactional memory / Lock / Hash table / Linearizability

adaptSTM - An Online Fine-grained Adaptive STM System Mathias Payer Thomas R. Gross ETH Zurich, Switzerland

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
143

BASUG Half-Day Training Announcement The DATA step hash object can be used for a surprising variety of tasks, including table look-ups, joins, and aggregation. This course offers an introduction to the hash object, as we

Add to Reading List

Source URL: www.basug.org

Language: English - Date: 2016-05-16 19:40:59
    144Search algorithms / Information science / Information retrieval / Hashing / Computer programming / Hash table / Hash function / Trie / Judy array / Hash / Cuckoo hashing / 2-choice hashing

    Application Note: Scalable HashingProblem How can you use Judy to create a scalable hash table with outstanding performance and automatic scaling, while avoiding the complexity of dynamic hashing?

    Add to Reading List

    Source URL: judy.sourceforge.net

    Language: English - Date: 2004-09-10 16:20:39
    145Computer architecture / Computing / GPGPU / Video cards / Parallel computing / Graphics hardware / Computer engineering / Kepler / General-purpose computing on graphics processing units / Graphics processing unit / Hash table / Tesla

    MemcachedGPU: Scaling-up Scale-out Key-value Stores Mike O’Connor NVIDIA / UT-Austin There is a continuously growing demand for higher

    Add to Reading List

    Source URL: acmsocc.github.io

    Language: English - Date: 2016-02-21 03:10:51
    146Computing / Concurrent computing / Computer architecture / Routing algorithms / Distributed data storage / Network architecture / File sharing / Routing protocols / Overlay network / Distributed hash table / Routing / Link-state routing protocol

    Practical Intrusion-Tolerant Networks Daniel Obenshain∗ , Thomas Tantillo∗ , Amy Babay, John Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, and Cristina Nita-Rotaru Johns Hopkins University — {dano, tantillo

    Add to Reading List

    Source URL: www.dsn.jhu.edu

    Language: English - Date: 2016-04-28 20:17:25
    147Computing / Distributed data storage / Concurrent computing / File sharing / Distributed computing / Gnutella / Peer-to-peer / Distributed hash table / Overlay network / Routing / Chord / Freenet

    Digital Library Curriculum Development Module 7-d: Routing 1. Module Name: Routing 2. Scope This module presents an overview of models and practices of Routing, leading to better

    Add to Reading List

    Source URL: curric.dlib.vt.edu

    Language: English - Date: 2009-12-22 08:27:01
    148Computing / Analysis of algorithms / Cache / Models of computation / Oblivious ram / Oram / Hash table / Internet Relay Chat / Sorting algorithm

    Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM Christopher Fletcher MIT

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-11-03 22:42:00
    149Search algorithms / Sorting algorithms / Data types / Binary trees / Binary search tree / Heap / Merge sort / Set / Best /  worst and average case / Insertion sort / Hash table / Binary search algorithm

    October 15, Fall 2008 Quiz 1 Introduction to Algorithms Massachusetts Institute of Technology

    Add to Reading List

    Source URL: courses.csail.mit.edu

    Language: English - Date: 2009-05-07 21:09:20
    150Computing / Internet / Internet Standards / Internet protocols / Network architecture / DNSSEC / Domain Name System Security Extensions / Key management / Public-key cryptography / Domain Name System / Hash table / Namespace

    Design of a Secure and Decentralized Location Service for Agent Platforms B.J. Overeinder1 , M.A. Oey1 , R.J. Timmer1 , R. van Schouwen1 , E. Rozendaal2 , and F.M.T. Brazier1 1

    Add to Reading List

    Source URL: www.nlnetlabs.nl

    Language: English - Date: 2009-06-27 06:06:52
    UPDATE