Clocked adversaries for hashing
暂无分享,去创建一个
[1] Friedhelm Meyer auf der Heide,et al. Dynamic perfect hashing: upper and lower bounds , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[2] Eli Upfal,et al. How to Share Memory in a Distributed System (A Preliminary Version) , 1984, FOCS.
[3] Gregory F. Pfister,et al. “Hot spot” contention and combining in multistage interconnection networks , 1985, IEEE Transactions on Computers.
[4] Charles L. Seitz,et al. Multicomputers: message-passing concurrent computers , 1988, Computer.
[5] Abhiram G. Ranade,et al. How to emulate shared memory (Preliminary Version) , 1987, FOCS.
[6] Eli Upfal,et al. Parallel hashing: an efficient implementation of shared memory , 1988, JACM.
[7] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..