Perfect hashing for network applications (2006)

by Yi Lu , Balaji Prabhakar , Flavio Bonomi
Venue:IN IEEE SYMPOSIUM ON INFORMATION THEORY
Citations:10 - 1 self

Active Bibliography

Hash-Based Data Structures for Extreme Conditions – Adam Lavitt Kirsch - 2008
6 Simple Summaries for Hashing with Choices – Adam Kirsch, Michael Mitzenmacher - 2008
31 Beyond Bloom Filters: From Approximate Membership Checks to Approximate State Machines – Flavio Bonomi, Michael Mitzenmacher, Rina Panigrahy, Sushil Singh, George Varghese - 2006
9 Hash-Based Techniques for High-Speed Packet Processing – Adam Kirsch, Michael Mitzenmacher, George Varghese
10 Simple Summaries for Hashing with Multiple Choices – Adam Kirsch , Michael Mitzenmacher
7 Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation – Yuriy Arbitman, Moni Naor, Gil Segev - 2010
125 Cuckoo hashing – Rasmus Pagh, Flemming Friche Rodler - 2001
1 Perfect hashing for data management applications – Fabiano C. Botelho - 2007
14 Simple and space-efficient minimal perfect hash functions – Fabiano C. Botelho, Rasmus Pagh, Nivio Ziviani - 2007
14 External perfect hashing for very large key sets – Fabiano C. Botelho, Daniel Galinkin, Wagner Meira, Jr. Nivio Ziviani - 2007
2 An Efficient Hardware-based Multi-hash Scheme for High Speed IP Lookup – Socrates Demetriades, Michel Hanna, Sangyeun Cho, Rami Melhem
17 Cuckoo hashing: Further analysis – Luc Devroye, Pat Morin, Communicated F. Dehne - 2003
On Worst Case Robin-Hood Hashing – Luc Devroye, Pat Morin, Alfredo Viola - 2004
PACKET CLASSIFICATION SYSTEMS by – Haoyu Song, Haoyu Song, Advisor Professor, Jonathan S. Turner - 2006
57 Fast hash table lookup using extended Bloom filter: an aid to network processing – Haoyu Song, Sarang Dharmapurikar, Jonathan Turner, John Lockwood - 2005
Concise Lookup Tables for IPv4 and IPv6 Longest Prefix MatchinginScalableRouters – Fong Pong, Senior Member, Nian-feng Tzeng
5 A Multi-attribute Data Structure with Parallel Bloom Filters for Network Services ⋆ – Yu Hua, Bin Xiao
3 Some Open Questions Related to Cuckoo Hashing – Michael Mitzenmacher
34 Why simple hash functions work: Exploiting the entropy in a data stream – Michael Mitzenmacher, Salil Vadhan - 2008