2001
DOI: 10.1016/s0020-0190(01)00239-3
|View full text |Cite
|
Sign up to set email alerts
|

In-memory hash tables for accumulating text vocabularies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2001
2001
2015
2015

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 38 publications
(22 citation statements)
references
References 7 publications
0
22
0
Order By: Relevance
“…The key goal of our experiments is to investigate how our algorithm improves the flow state lookup efficiency. The hash function we use is the bit-wise hash function from Zobel et al [7]. …”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The key goal of our experiments is to investigate how our algorithm improves the flow state lookup efficiency. The hash function we use is the bit-wise hash function from Zobel et al [7]. …”
Section: Discussionmentioning
confidence: 99%
“…The conventional approach only focuses on organizing the hash chain according to the first packet of each flow, and fails to exploit the locality within each burst. To address this shortcoming and inspired by Zobel's idea in accumulating text vocabularies [7], we propose three different algorithms focusing on exploiting the locality within a burst. All of these three schemes share the same feature that each matched flow will trigger a restructure of the hash chain, i.e., moving the matched flow to the beginning of the list.…”
Section: Proposed Schemes For Flow State Table Managementmentioning
confidence: 99%
“…We have recently investigated variations of hashing for accumulating vocabularies and reported these results elsewhere [26]. With other string hashing functions, all versions of trees were faster.…”
Section: Comparison Of Structures 11cmmentioning
confidence: 99%
“…Hashed Index, imposes a constraint of load factor which limits the performance of hashing beyond certain pick value. In addition, enormous amount of hashing in case of collision, to find the right bucket to map the key to be retrieved or to be placed, is also the limiting factor in hashing technique [7][8][9][10][11][12][13][14][15][16][17][18][19][20].…”
Section: Introductionmentioning
confidence: 99%
“…Though hash table can offer rapid insertion, deletion, and search of both strings and integers, it requires a form of collision resolution to resolve cases where two or more keys are hashed to the same bucket. To resolve this, various mechanisms have been proposed like, linked lists [7] -used when number of keys is not known in advance, array hash [8] -a cache conscious scheme for previous method, open addressing -stores homogenous keys directly within bucket & gives better usage of CPU & cache [9,10]. Open addressing schemes: Linear probing, where the interval between probes is fixed [18]; quadratic probing [12] where probe interval is increased by addition of successive outputs of a polynomial to the starting value; and double hashing [12] where probe interval is computed by second hash function.…”
Section: Introductionmentioning
confidence: 99%