2009
DOI: 10.1007/978-3-642-00975-4_20
|View full text |Cite
|
Sign up to set email alerts
|

Empirical Evaluation of Hash Functions for PacketID Generation in Sampled Multipoint Measurements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 5 publications
0
10
0
Order By: Relevance
“…Note that this comparison strictly depends on the specific filter size employed; large filters would yield further performance reduction for the windowbased construction, whose performance linearly depends on plete telephony traffic in most operator network. This is a very promising result, as our SW implementation is still far from being optimized and, particularly, it is still based on a slow cryptographic hash (SHA-1, which performs at least one to two orders of magnitude less than state of the art non cryptographic hashes [14]). Figures 1 and 2 show how close the stream operation of VoIPSTREAM succeeds in approaching the VoIP SEAL's classification performance.…”
Section: Experimental Evaluationmentioning
confidence: 98%
“…Note that this comparison strictly depends on the specific filter size employed; large filters would yield further performance reduction for the windowbased construction, whose performance linearly depends on plete telephony traffic in most operator network. This is a very promising result, as our SW implementation is still far from being optimized and, particularly, it is still based on a slow cryptographic hash (SHA-1, which performs at least one to two orders of magnitude less than state of the art non cryptographic hashes [14]). Figures 1 and 2 show how close the stream operation of VoIPSTREAM succeeds in approaching the VoIP SEAL's classification performance.…”
Section: Experimental Evaluationmentioning
confidence: 98%
“…Henke et al [16] have extensively studied the collision performance of a set of hash functions and found that the Bob hash function overall provides the best performance. In this paper, we choose the Bob hash function to create the identifier of each packet and to compute the bucket indexes.…”
Section: A Architecturementioning
confidence: 99%
“…Hash functions in these applications are designed to be as uniform as possible to avoid collisions. Numerous empirical studies establish that many commonly applied hash functions (e.g., Linear, SDBM, MD5, SHA) have negligible differences with a true uniform random variable [25,32]. Cryptographic hashes work particularly well and are supported by most commercial and open source systems, for example MySQL provides MD5 and SHA1.…”
Section: Hashing Operatormentioning
confidence: 99%