Learn More
Exact and approximate membership lookups are among the most widely used primitives in a number of network applications. Hash tables are commonly used to implement these primitive functions as they provide <i>O</i>(1) operations at moderate load (table occupancy). However, at high load, collisions become prevalent in the table, which makes lookup highly(More)
Hash functions are vital in networking. Hash-based algorithms are increasingly deployed in mission-critical, high speed network devices. These devices will need small, quick, hardware hash functions to keep up with Internet growth. There are many hardware hash functions used in this situation, foremost among them CRC-32. We develop parametrized methods for(More)
The Johnson Foundation at Wingspread is dedicated to serving as a catalyst for innovative public and private solutions in two spheres – one global and one regional – that reflect the Johnson Family's longstanding passions: healthy environments and healthy local communities. Over the course of 50 years the Johnson Foundation has hosted leading thinkers and(More)
  • 1