Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Implementations for coalesced hashing

View through CrossRef
The coalesced hashing method is one of the faster searching methods known today. This paper is a practical study of coalesced hashing for use by those who intend to implement or further study the algorithm. Techniques are developed for tuning an important parameter that relates the sizes of the address region and the cellar in order to optimize the average running times of different implementations. A value for the parameter is reported that works well in most cases. Detailed graphs explain how the parameter can be tuned further to meet specific needs. The resulting tuned algorithm outperforms several well-known methods including standard coalesced hashing, separate (or direct) chaining, linear probing, and double hashing. A variety of related methods are also analyzed including deletion algorithms, a new and improved insertion strategy called varied-insertion, and applications to external searching on secondary storage devices.
Association for Computing Machinery (ACM)
Title: Implementations for coalesced hashing
Description:
The coalesced hashing method is one of the faster searching methods known today.
This paper is a practical study of coalesced hashing for use by those who intend to implement or further study the algorithm.
Techniques are developed for tuning an important parameter that relates the sizes of the address region and the cellar in order to optimize the average running times of different implementations.
A value for the parameter is reported that works well in most cases.
Detailed graphs explain how the parameter can be tuned further to meet specific needs.
The resulting tuned algorithm outperforms several well-known methods including standard coalesced hashing, separate (or direct) chaining, linear probing, and double hashing.
A variety of related methods are also analyzed including deletion algorithms, a new and improved insertion strategy called varied-insertion, and applications to external searching on secondary storage devices.

Related Results

Deep Supervised Hashing for Fast Multi-Label Image
Deep Supervised Hashing for Fast Multi-Label Image
In this paper, most of the existing Hashing methods is mapping the hand extracted features to binary code, and designing the loss function with the label of images. However, hand-c...
Convolutional Neural Network Copy Detection with Neural Network Perceptual Hashing
Convolutional Neural Network Copy Detection with Neural Network Perceptual Hashing
In recent years, many model intellectual property (IP) proof methods for IP protection have been proposed, such as model watermarking and model fingerprinting. However, as an impor...
Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection
Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection
<p>This paper has been accepted by ACM TOMM. https://dl.acm.org/doi/pdf/10.1145/3572777</p> <p><br></p> <p>In recent years, many model intellect...
Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection
Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection
<p>This paper has been accepted by ACM TOMM. https://dl.acm.org/doi/pdf/10.1145/3572777</p> <p><br></p> <p>In recent years, many model intellect...
HW/SW Design Space Exploration on the Production Cell Setup
HW/SW Design Space Exploration on the Production Cell Setup
This paper describes and compares five CSP based and two CSP related process-oriented motion control system implementations that are made for our Production Cell demonstration setu...
Adaptive Binary Quantization for Fast Nearest Neighbor Search
Adaptive Binary Quantization for Fast Nearest Neighbor Search
Hashing has been proved an attractive technique for fast nearest neighbor search over big data. Compared to the projection based hashing methods, prototype based ones own stronger ...
Privacy Preserving EEG-based Authentication Using Perceptual Hashing
Privacy Preserving EEG-based Authentication Using Perceptual Hashing
The use of electroencephalogram (EEG), an electrophysiological monitoring method for recording the brain activity, for authentication has attracted the interest of researchers for ...
PROLEAD
PROLEAD
Even today, Side-Channel Analysis attacks pose a serious threat to the security of cryptographic implementations fabricated with low-power and nanoscale feature technologies. Fortu...

Back to Top