Search Results

There are 8750 results for: content related to: Perfect class hashing and numbering for object-oriented implementation

  1. Coloring, a versatile technique for implementing object-oriented languages

    Software: Practice and Experience

    Volume 41, Issue 6, May 2011, Pages: 627–659, Roland Ducournau

    Version of Record online : 29 DEC 2010, DOI: 10.1002/spe.1022

  2. Dynamic information-based scalable hashing on a cluster of web cache servers

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 3, 10 March 2012, Pages: 322–340, Hukeun Kwak, Andrew Sohn and Kyusik Chung

    Version of Record online : 22 AUG 2011, DOI: 10.1002/cpe.1830

  3. AUTOMATIC DESIGN OF NONCRYPTOGRAPHIC HASH FUNCTIONS USING GENETIC PROGRAMMING

    Computational Intelligence

    Volume 30, Issue 4, November 2014, Pages: 798–831, César Estébanez, Yago Saez, Gustavo Recio and Pedro Isasi

    Version of Record online : 6 NOV 2014, DOI: 10.1111/coin.12033

  4. Sharp load thresholds for cuckoo hashing

    Random Structures & Algorithms

    Volume 41, Issue 3, October 2012, Pages: 306–333, Nikolaos Fountoulakis and Konstantinos Panagiotou

    Version of Record online : 12 MAY 2012, DOI: 10.1002/rsa.20426

  5. A Parallel SPH Implementation on Multi-Core CPUs

    Computer Graphics Forum

    Volume 30, Issue 1, March 2011, Pages: 99–112, Markus Ihmsen, Nadir Akinci, Markus Becker and Matthias Teschner

    Version of Record online : 4 NOV 2010, DOI: 10.1111/j.1467-8659.2010.01832.x

  6. Efficient implementation of Aho–Corasick pattern matching automata using Unicode

    Software: Practice and Experience

    Volume 37, Issue 6, May 2007, Pages: 669–690, Janne Nieminen and Pekka Kilpeläinen

    Version of Record online : 2 NOV 2006, DOI: 10.1002/spe.785

  7. A letter-oriented perfect hashing scheme based upon sparse table compression

    Software: Practice and Experience

    Volume 21, Issue 1, January 1991, Pages: 35–49, Chin-Chen Chang and Tzong-Chen Wu

    Version of Record online : 30 OCT 2006, DOI: 10.1002/spe.4380210104

  8. Optimum Hashing

    Hashing in Computer Science

    Alan G. Konheim, Pages: 227–245, 2010

    Published Online : 29 JUL 2010, DOI: 10.1002/9780470630617.ch15

  9. How to build an interference graph

    Software: Practice and Experience

    Volume 28, Issue 4, 10 April 1998, Pages: 425–444, Keith D. Cooper, Timothy J. Harvey and Linda Torczon

    Version of Record online : 8 JAN 1999, DOI: 10.1002/(SICI)1097-024X(19980410)28:4<425::AID-SPE160>3.0.CO;2-2

  10. Large-scale inter-system clone detection using suffix trees and hashing

    Journal of Software: Evolution and Process

    Volume 26, Issue 8, August 2014, Pages: 747–769, Rainer Koschke

    Version of Record online : 10 FEB 2013, DOI: 10.1002/smr.1592

  11. You have free access to this content
    Frontmatter

    Hashing in Computer Science

    Alan G. Konheim, Pages: i–xvii, 2010

    Published Online : 29 JUL 2010, DOI: 10.1002/9780470630617.fmatter

  12. The Uniform Hashing Model

    Hashing in Computer Science

    Alan G. Konheim, Pages: 167–173, 2010

    Published Online : 29 JUL 2010, DOI: 10.1002/9780470630617.ch12

  13. Hash-bucket search: A fast technique for searching an english spelling dictionary

    Software: Practice and Experience

    Volume 12, Issue 7, July 1982, Pages: 669–682, Douglas Comer and Vincent Y. Shen

    Version of Record online : 27 OCT 2006, DOI: 10.1002/spe.4380120708

  14. Tsunami: massively parallel homomorphic hashing on many-core GPUs

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 17, 10 December 2012, Pages: 2028–2039, Xiaowen Chu, Kaiyong Zhao and Zongpeng Li

    Version of Record online : 7 OCT 2011, DOI: 10.1002/cpe.1826

  15. Hash Functions

    Hashing in Computer Science

    Alan G. Konheim, Pages: 124–131, 2010

    Published Online : 29 JUL 2010, DOI: 10.1002/9780470630617.ch8

  16. The design and implementation of dynamic hashing for sets and tables in icon

    Software: Practice and Experience

    Volume 23, Issue 4, April 1993, Pages: 351–367, William G. Griswold and Gregg M. Townsend

    Version of Record online : 30 OCT 2006, DOI: 10.1002/spe.4380230402

  17. Perfect Hashing

    Hashing in Computer Science

    Alan G. Konheim, Pages: 164–166, 2010

    Published Online : 29 JUL 2010, DOI: 10.1002/9780470630617.ch11

  18. Hashing and the Secure Distribution of Digital Media

    Hashing in Computer Science

    Alan G. Konheim, Pages: 307–342, 2010

    Published Online : 29 JUL 2010, DOI: 10.1002/9780470630617.ch19

  19. Role-based and time-bound access and management of EHR data

    Security and Communication Networks

    Volume 7, Issue 6, June 2014, Pages: 994–1015, Rui Zhang, Ling Liu and Rui Xue

    Version of Record online : 21 JUN 2013, DOI: 10.1002/sec.817

  20. Selecting a hashing algorithm

    Software: Practice and Experience

    Volume 20, Issue 2, February 1990, Pages: 209–224, B. J. McKenzie, R. Harries and T. Bell

    Version of Record online : 30 OCT 2006, DOI: 10.1002/spe.4380200207