2008
DOI: 10.1145/1384609.1384614
|View full text |Cite
|
Sign up to set email alerts
|

Empirical evaluation of hash functions for multipoint measurements

Abstract: A broad spectrum of network measurement applications demand passive multipoint measurements in which data from multiple observation points has to be correlated. Examples are the passive measurement of one-way delay or the observation of the path that a packet takes through a network. Nevertheless, due to high data rates and the need for fine granular measurements, the resource consumption for passive measurements can be immense. Furthermore, the resource consumption depends on the traffic in the network, which… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 59 publications
(27 citation statements)
references
References 22 publications
0
26
0
Order By: Relevance
“…As shown for instance in [Henk08], the computation times for MD5 and SHA are about 7-10 times higher compared to non-cryptographic functions. The difference increases for small hash input lengths.…”
Section: Choice Of Hash Functionmentioning
confidence: 96%
See 2 more Smart Citations
“…As shown for instance in [Henk08], the computation times for MD5 and SHA are about 7-10 times higher compared to non-cryptographic functions. The difference increases for small hash input lengths.…”
Section: Choice Of Hash Functionmentioning
confidence: 96%
“…In accordance to considerations in [MoND05] and [Henk08], we define the following desired properties of Hash Functions used for packet selection:…”
Section: Requirements For Packet Selectionmentioning
confidence: 99%
See 1 more Smart Citation
“…First, we compute each point's signature S(p). Second, we use BKDRhash [12] function to compute the hash-values of each point's signature S(p) by which all points will be distributed to different buckets. Third, we do the groups of buckets by merging two different buckets to one.…”
Section: Algorithm Overviewmentioning
confidence: 99%
“…In this paper, we use the BKDRhash [12] function BH() as the hash method because of its higher speed and less collision. With the hash function, the map(BH) transformation maps the key-value pairs < , S(p i ) > into key-value pairs < (S(p i )), p i >by performing hash calculation over each signature S(p i ) for each point p i .…”
Section: Data Divisionmentioning
confidence: 99%