Learn More
  • Bill Lynch
  • The Journal of head trauma rehabilitation
  • 2002
OBJECTIVES This article details the introduction and development of the use of microcomputers as adjuncts to traditional cognitive rehabilitation of persons with acquired brain injury. SUMMARY The initial application of video games as therapeutic recreation in the late 1970s was soon followed in the early 1980s by the use of the first personal computers(More)
Hash functions are vital in networking. Hash-based algorithms are increasingly deployed in mission-critical, high speed network devices. These devices will need small, quick, hardware hash functions to keep up with Internet growth. There are many hardware hash functions used in this situation, foremost among them CRC-32. We develop parametrized methods for(More)
Exact and approximate membership lookups are among the most widely used primitives in a number of network applications. Hash tables are commonly used to implement these primitive functions as they provide <i>O</i>(1) operations at moderate load (table occupancy). However, at high load, collisions become prevalent in the table, which makes lookup highly(More)
  • 1