Author:
Dolev Shlomi,Lahiani Limor,Haviv Yinnon
Subject
General Computer Science,Theoretical Computer Science
Reference14 articles.
1. Y. Arbitman, M. Naor, G. Segev, Backyard Cuckoo hashing: constant worst case operations with a succinct representation, in: Annual Symposium on Foundations of Computer Science, FOCS, 2010.
2. Generating permutations and combinations in lexicographical order;Alon;Journal of the Brazilian Society,2001
3. Balanced allocations;Azar;SIAM Journal on Computing,1999
4. Introduction to Algorithms;Cormen,2001
5. P. Celis, P.-A. Larson, J. Munro, Robin Hood hashing, in: 26th IEEE Symposium on the Foundations of Computer Science, 1985, pp. 281–288.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Single Instance Self–masking via Permutations;Cyber Security, Cryptology, and Machine Learning;2023
2. An IPv6 Routing Lookup Algorithm Based on Hash Table and HOT;2022 5th International Conference on Information Communication and Signal Processing (ICICSP);2022-11-26
3. Generating and Numbering Permutations With the Use of Chaotic Maps;2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS);2021-09-22